La bascule de ressources vers le travail à distance couplée à la demande de solutions basées sur le cloud renforcent le marché de la sécurité IT dans son ensemble. La société d’études prévoit désormai...
. Une enquête réalisée par l’ONG révèle que l’iPhone du journaliste et défenseur des droits de l’homme Omar Radi a été infiltré par le logiciel ultra-sophistiqué Pegasus, conçu par la société de cyber...
USA fuite de données Récemment aux États-Unis, des fuites sur des données personnelles de plus de 350 000 prisonniers ont été constatées. Selon les sources, la faille provenait du serveur informatique...
‘BlueLeaks’ Exposes policeHundreds of thousands of potentially sensitive files from police departments across the United States were leaked online last week. The collection, dubbed “BlueLeaks” and mad...
BENGALURU: Cognizant Technology Solutions has informed employees and California authorities that the majority of the personal information that was impacted by the Maze ransomware attack on the company...
Web Application Pentesting Tools are more often used by security industries to test the vulnerabilities of web-based applications. Here you can find the Comprehensive Web Application Pentesting ToolsW...
as a bait to steal personal and financial information. CERT-In says the potential phishing attackers could impersonate government agencies, departments and trade bodies tasked to oversee disbursement ...
A s cities across the globe begin to ease their COVID-19 restrictions, this year’s transition back to the office could take place in stages — or not at all. Prior to the pandemic, data had already sho...
Microcin is here In February 2020, we observed a Trojan injected into the system process memory on a particular host. The target turned out to be a diplomatic entity. What initially attracted our atte...
What if hackers can spy and record your conversation without a digital device? What if your conversations could be retrieved by a simple, dumb bygone old-fashioned light bulb? Well, it might so be tru...
hacked by China Defence Minister Linda Reynolds urged businesses to check their cyber security and take extra steps such as ensuring employees use multi-factor identification to use devices. She said:...
Ransomware explainedRansomware definition Ransomware is a form of malware that encrypts a victims files. The attacker then demands a ransom from the victim to restore access to the data upon payment. ...
Major cyber attack against Australian Government In an urgent press conference called this morning in Canberra, Mr Morrison said the ongoing, « large-scale » hack was being executed by a “sophisticate...
Mafia assiège World of Warcraft Classic avec des bots Blizzard, l’éditeur de WoW, a banni 74 000 comptes de bots. mais peine à endiguer le phénomène, qui bouscule le fonctionnement même du jeu e...
La Cnil a publié sa stratégie de contrôle pour l’année 2020. En complément de ses travaux, elle va se focaliser sur trois points : les données de santé, la géolocalisation et les cookies. La Cni...