What can businesses learn from the cyber threat landscape of 2017?

What can businesses learn from the cyber threat landscape of 2017?

What can businesses learn from the cyber threat landscape of 2017? Over the course of 2017, global cyber threats continued to evolve at pace, resulting in a dramatic reshaping of the cyber security landscape. Traditional threats such as generic Trojans, ransomware and spam bots were transformed Powered by military-grade code allegedly leaked from the NSA, […]

West Bengal is planning to introduce blockchain technology to protect documents from cyberattack

West Bengal is planning to introduce blockchain technology to protect documents from cyberattack

The West Bengal government is planning to introduce the to protect its documents from cyberattacks. The state proposed Cyber Security Centre of Excellence would be entrusted to execute the new blockchain mechanism at various departments, a senior official of the Information Technology Department told PTI. The blockchain is an online ledger of digitally recorded transactions […]

The Role of Cyber Security in Enterprise Maintenance

The Role of Cyber Security in Enterprise Maintenance

It’s undisputed: the future of enterprise maintenance is digital. In the near future, numerous internet-connected sensors and devices will be available in industrial plants, empowering maintenance technicians, plant managers, supervisors, and even business owners with timely and accurate information about the physical world. These devices will be used to provide insights about the status of […]

Cyber Security & Hacking News   – LeakVM – Research & Pentesting Framework For Android, Run Security Tests Instantly

Cyber Security & Hacking News – LeakVM – Research & Pentesting Framework For Android, Run Security Tests Instantly

LeakVM: Run security tests instantly. LeakVM fast security test on Android, by skipping the time-consuming build pen-testing laboratories, you can test on real devices or virtual devices. LeakVM makes researchers and pen-testers more productive since they can run the test on real time and with zero knowledge on malware develop or attacks. Our technology uses […]

UK Cyber Security Division Issues Warning on PC ‘Cryptojacking’

UK Cyber Security Division Issues Warning on PC ‘Cryptojacking’

Cryptojacking – the act of hijacking a user’s computer to mine cryptocurrencies – is likely to “become a regular source of income for website owners,” a British government agency warned Tuesday. The U.K.’s National Cyber Security Centre, the technology wing of the Government Communications Headquarters, highlighted cryptojacking as a “significant” concern in its latest “cyber […]

Top 5 Predictions for Cyber Security in 2018

Top 5 Predictions for Cyber Security in 2018

We reside in a world that is networked together. Companies rely on networked systems and their data is stored in the cloud. Thus, Cyber Security is one of the most crucial issues that need to be addressed in the present scenario. Cyber-attacks have become an international threat due to the occurrence of several high-profile breaches […]

US-UK Accuse Russia of “NotPetya” Cyberattack, Offer Zero Evidence

US-UK Accuse Russia of “NotPetya” Cyberattack, Offer Zero Evidence

The US and European press have both published stories accusing the Russian government, and in particular, the Russian military, of the so-called “NotPetya” cyberattack which targeted information technology infrastructure in Ukraine. The Washington Post in an article titled, “UK blames Russian military for ‘malicious’ cyberattack,” would report: Britain and the United States blamed the Russian […]

Cyber-Crimes Bill 2014 in Pakistan Will Be Approved Soon

Cyber-Crimes Bill 2014 in Pakistan Will Be Approved Soon

Cyber Crimes in Pakistan are rising very quickly. Not very long ago it was reported that Facebook friends kidnapped two girls in Multan. Even before that it was reported that Facebook friendship resulted in the kidnap of 13-years old boy. These are only two of the incidents that caught the media eye and the kidnapped […]