Login

Sign Up





Already have an account?Log In

By clicking "Sign Up" you agree to our terms of service and privacy policy


  • Username should be more than 3 characters.
  • Username cannot start with numeric character.
  • Username characters must be from {a-z,0-9}, special characters are not allowed.
  • Make sure the Email is working to receive verification code & password reset link.
  • Password should be more than 6 characters.

Forgot Password



Authentication


Sorry, you have been logged out
Please Login to proceed....

Cybersecurity

Newsletter

Stories

Nearly all Chinese keyboard apps have encryption flaws, exposing millions of users to keylogging

Anyone who types in Chinese using cloud-based apps from Baidu, Honor, iFlytek, Oppo, Samsung, Tencent, Vivo, and Xiaomi should update their software immediately. The Huawei service appears to be.....

Techspot

How to Recover from Ransomware in 5 Minutes

Dial Back to Just Seconds Before an Attack Zerto, a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data.....

Thehackernews

Reddit down in major outage blocking access to web, mobile apps

Reddit is investigating a major outage blocking users worldwide from accessing the social network's websites and mobile apps.

Bleepingcomputer

What is ransomware?

Ransomware attacks affect everything, including healthcare facilities, pharmaceutical companies, tech firms, and hotels and casinos in Las Vegas. Ransomware has reached a record high, with payments.....

Androidpolice

GPT-4 can exploit zero-day security vulnerabilities all by itself, a new study finds

GPT-4 stands as the newest multimodal large language model (LLM) crafted by OpenAI. This foundational model, currently accessible to customers as part of the paid ChatGPT Plus line, exhibits notable.....

Techspot

Email still the most popular phishing technique even on mobile

Most incidents of phishing or spoofing on smartphones still happen via email, according to MEF's (Mobile Ecosystem Forum) 9th Annual Trust Study. The report shows 52 percent of users reporting.....

Betanews

LG fixes webOS security flaws that could let attackers remotely gain root access

A recent update from LG has revealed security vulnerabilities present in webOS-enabled smart TVs. The exploits, which were first discovered by Romanian cybersecurity firm Bitdefender, could have been.....

Zdnet

New HTTP2 vulnerability leaves servers in danger of devastating DoS attacks, even from a single TCP connection

Introduced in 2015, HTTP/2 brought several enhancements to the HTTP protocol including efficient data transmission, request handling, responsiveness, and header compression for website-based.....

Techspot

Security Bite: iCloud Mail, Gmail, others shockingly bad at detecting malware, study finds

Email security today has many shortcomings. It is widely known that email service providers cannot prevent every suspicious email from being received. However, a new study by web browser security.....

9to5mac

The biggest challenge with increased cybersecurity attacks, according to analysts

The region saw a 15% increase in cyberattacks in 2023, clocking an average of 1,963 attacks weekly, with ransomware leading the pack. The financial industry was the fourth-most targeted sector by.....

Zdnet

What we know about the xz Utils backdoor that almost infected the world

On Friday, researchers revealed the discovery of a backdoor that was intentionally planted in xz Utils, an open-source data compression utility available on almost all installations of Linux and other.....

Arstechnica

Backdoor found in widely used Linux utility breaks encrypted SSH connections

Researchers have found a malicious backdoor in a compression tool that made its way into widely used Linux distributions, including those from Red Hat and Debian. The compression utility, known as xz.....

Arstechnica