A new Cybersecurity Consultancy firm with intentions of providing quality service
Image courtesy; Forbes
ThreeTwoFour, a cyber security professional company, has introduced a new brand in the midst of tremendous growth. The new graphics are intended...
Schools in Singapore are educating students about cybersecurity
Image courtesy; ASEAN Technology & Security Magazine
Singapore is a city-state in Southeast Asia. How do you keep a robber out of your house?...
TSMC denied to provide customer data on US chip data request
In response to a U.S. chip data request, the world's biggest contract chipmaker Taiwan Semiconductor Manufacturing Co Ltd (TSMC), stated on Monday that it...
Newbies in cryptocurrency market are getting exploited by frauds
Image Courtesy; iNews
Those who are unfamiliar with bitcoin may not fully comprehend how the virtual currency operates. Many people will use Google and...
Investors of SolarWinds Corp is after it’s board of directors following a major hack
Image courtesy; The Guardian
Investors in SolarWinds Corp (SWI.N) have sued the software company's directors, alleging that they were aware of and failed to...
A bug has been found on a philips database used for storing sensitive information
Image courtesy; TechRepublic
The Philips Tasy EMR, a medical record solution and healthcare management system used by hundreds of institutions, is vulnerable to two serious...
Chain of cyberattacks on tribal owned casinos affected huge chunk of data
Image courtesy; Tribal Business News
Ransomware gangs have struck many tribal-owned casinos, knocking down their systems and disabling associated networks, according to the FBI's Cyber...
Google explains why the fingerprint scanner on the Pixel 6 may be slow
The Google Pixel 6 and 6 Pro have a lot to be excited about, but its fingerprint scanners aren't one of them. Users have...
Fingerprint biometrics users roped by gummy browser, a malicious website
Image courtesy; Medium.com
The Gummy Browsers attack aims to collect a person's fingerprint by tricking them into visiting a malicious website.
This attack approach can be...
Everything you need to know about JioPhone Next’s inbuilt ‘Device Lock’ functionality
The Reliance JioPhone Next has a function that ensures consumers who pick the EMI option for the phone complete their payments on time. If...














