It will soon be a year since we published our article exposing how Chrome extensions track their users. The research…
Daily news paper ‘The Philadelphia Inquirer’ has been apparently hit by a cyber attack of ran-somware attack and it is…
A system for rating how much AI was involved in the creation of a piece of art Created/Updated: May 15,…
Facebook, the popular social media platform owned by Meta, recently encountered a glitch that resulted in unintended friend requests being…
airBaltic, Latvia’s flag carrier has acknowledged that a ‘technical error’ exposed reservation details of some of its passengers to other airBaltic…
“As cliche as it sounds, customer success is everyone’s job. Everyone’s,” said Jeff McBride when we asked him about his…
A new ransomware group named ‘RA Group’ is targeting pharmaceutical, insurance, wealth management, and manufacturing firms in the United States…
May 15, 2023Ravie LakshmananNetwork Security / SCADA Several security vulnerabilities have been disclosed in cloud management platforms associated with three…
We have strengthened our security team with a crowdsourced bug bounty program (currently in beta phase). The initiative, known as…
Abstract: Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the external physical…
Increasing demand for IT talent is driving the IT outsourcing sector, with 63% of UK organisations planning to continue outsourcing…
It’s easy to think high-tech companies have a security advantage over other older, more mature industries. Most are unburdened by…