Security

Workplace Violence And Security Tech

We live in a world where workplace violence and security tech must go hand in hand. There are no two ways about it. Gone are the days when workplace violence was handled manually. Needless to say, companies are based on a hierarchy, and...

New Safari Bug Can Leak Apple Users’ Web History

A bug found in Apple’s Safari 15 can leak a user’s web browsing activity and potentially their identity. The vulnerability was first revealed by FingerprintJS which is a fraud detection service. Their report points out that the bug is in Safari’s implementation of...

Why You Shouldn’t Share Location on Social Media?

The advent of social media has put everyone in a rat race of sharing. From sharing their pictures, important milestones and even location on social media and the internet. People have become very fond of this practice to update their friends and followers...

Security Practices for Using USB’s and Other Devices

Modern technology sees an over reliance on USBs and other portable devices. Such devices include flash drives, external hard drives or even SD cards.  Many of us are still unaware of how to use said devices, often ignoring warning signs. The most common cause...

How to secure your phone from hackers?

Having a mobile phone always comes with its pros and cons but aren’t we already aware of this? Pretty much, yes! Regardless of this era marking history in the world of technology, owning and keeping your phone secure and safe isn’t an easy...

Microsoft says Russian hackers viewed its source code

Microsoft claims that the suspected Russian hackers might have accessed the Microsoft source code. This was done as part of the same act, which has diagnosed several renowned US companies being infiltrated by suspected Russian hackers.  Initially, Microsoft claimed that it was safe during the entire...

Russians using social media to interfere in upcoming American presidential election

A Russian group, Internet Research Agency, backed by the Kremlin, is reported to have made attempts to cause trouble in the upcoming presidential election in the US. This is believed to be the same group that interfered with the 2016 election and hacked the Hillary...

Twitter confirms hackers accessed DMs of 36 accounts in Bitcoin scam

Twitter has completed its research for 130 hacked accounts on its social network and discovered that the hackers behind the crypto scam had accessed the direct messages of as many as 36 high-profile accounts, including one elected official in the Netherlands.  The hackers who...

VMWare acquiring network security firm Lastline

VMware, a well known American publicly traded software company, has announced its intent to acquire Lastline, an anti-malware cybersecurity company, for research and to yield innovative security capabilities. The deal will close by July 31, and the startup has not disclosed much about...

Google bans employees from using Zoom on computers

Google has banned its employees from using Zoom, one of the popular video conferencing app, on laptops and computers over privacy and security concerns. The news came after NASA and SpaceX restricted their employees from using Zoom as the U.S. law enforcement warned...

Latest News

Sony’s PlayStation 5 (PS5) has already proven to be a powerhouse of a gaming console, with a lineup of incredible games. As we look at 2024, there are several highly...