Mozilla accused of tracking users in Firefox without consent
European digital rights group NOYB (None Of Your Business) has filed a privacy complaint with the Austrian data protection watchdog (DSB) against Mozilla, alleging the…
European digital rights group NOYB (None Of Your Business) has filed a privacy complaint with the Austrian data protection watchdog (DSB) against Mozilla, alleging the…
The highly anticipated 2025 Cybersecurity Excellence Awards are now open for nominations, honoring achievements and celebrating innovation, leadership, and excellence in the global cybersecurity industry.…
UEEx enhances user security with new compensation policies addressing abnormal market volatility and asset protection. Users can now recover losses from flash crashes and unauthorized…
Sep 25, 2024Ravie LakshmananSecure Coding / Mobile Security Google has revealed that its transition to memory-safe languages such as Rust as part of its secure-by-design…
CISA warned today of threat actors trying to breach critical infrastructure networks by targeting Internet-exposed industrial devices using “unsophisticated” methods like brute force attacks and…
Safebrowsing utilizes a cloud-based virtual browser environment to analyze potentially risky websites. This isolated environment protects the local system from malicious activity encountered during browsing. …
The FBI is warning timeshare owners to be wary of a prevalent telemarketing scam involving a violent Mexican drug cartel that tries to trick elderly…
A few months ago, the Biden administration imposed a trade and operations ban on Kaspersky, giving the company approximately 90 days to cease its activities…
Sep 25, 2024Ravie LakshmananPenetration Testing / Cyber Threat Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the…
A senior CrowdStrike executive has apologised in front of a United States government committee for the 19 July outage that caused IT systems around the…
Social media is no longer just an image sharing or content sharing medium. There is a darker underbelly to it. Its where the opportune cybercriminals…
Bug bounty programs have proven to be an effective strategy for companies looking to proactively enhance their security posture. As a result, more and more…