fbpx
Home Data security

Data security

Thales acquires Silicon Valley firm.

Thales Group a leading French based multinational has acquired a silicon valley firm 'Vormetric' this week.Thales paid $400 for this acquisition, Vormetric is a...

Security Agencies raise eyebrows over LINE Messenger security update

LINE becomes the first messenger app to introduce the the end-to-end encryption which makes it impossible for the all the top security agencies around...

Top 5 iPhone Security Apps

Hacking Smartphone's has become a primary case now a days, hackers are now more into targeting the smartphone devices than Computers. Every month we...

ICANN found the Exposure of Confidential Information over 300 times

ICANN has admitted  that confidential information had been exposed in a security error on at least 330 occasions. By conducting an audit it was...

SendGrid Encountered Data Breach

On April 9, the New York Times reported that the SendGrid account of Bitcoin wallet service Coinbase was hijacked and used to send out...

Silicon Valley has Increased Datacenter Connectivity Security

In the past week, US Homeland Security Secretary Jeh Johnson warned that encryption made it almost impossible to find criminals and terrorists and that...

FBI alerts Law Enforcement Officials of being Targeted by Hacktivists

The Federal Bureau of Investigation (FBI) and Crime Complaint Center (IC3) have notified the increasing threats to target law enforcement officials, officers, and agents...

IBM Designed X-Force Exchange to Foster Cyber Security Intelligence-sharing

Today, IBM has announced a new global cyber threat intelligence sharing platform to make its huge store of about two-decade worth of security and...

Target reached Settlement to Reimburse $20 million MasterCard Data Breach

Target Corp is about to reach a settlement with MasterCard Inc to reimburse financial institutions about $20 million for costs incurred from the retailer's...

Mass Surveillance Lawsuit against UK Government taken to Europe Highest Court

A lawsuit over the UK government's mass surveillance programs has been filed with the highest human rights court in Europe as it's public knowledge...

FCC levies $25 Million Civil Penalty on AT&T over Customer Data Breach

The Federal Communications Commission and AT&T Inc (T) have been involved in an aggressive debate and now they have reached a $25 million settlement...

Your data is open to Hackers when sending from SmartPhone to SmartWatch

The growing number of smart devices that interoperates with smartphones could leave text messages, calendar entries, biometric data, and other sensitive user information wide...
- Advertisment -

Most Read

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...