Meet the team: Johanna Ydergård – Scaling the impact of ethical hackers

Head of Crowdsource, Johanna Ydergård, joined Detectify to work on solving the information gap in cybersecurity by scaling the knowledge of ethical hackers and helping them make a broader impact,...

How Virtual Reality Can be the Future of Education

One of the major problems that students battle with is understanding very abstract parts of...

Google PlayStore Shuts Out Payday Loan Application

The innovation mammoth Google as of late restricted applications from offering individual loans with a yearly rate, pace of 36% or higher...

APT trends report Q3 2019

For more than two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on...

as-a-Service – Crooks Sell Passwords on Hacking Forums

Threat actors advertising a new Combolists-as-a-Service model to sell credentials on the underground hacking forums that enable account takeovers. Attackers employ several methods to gain access to the account that...

Samsung’s Galaxy Fold Is Launching On September 6th

Samsung Electronics on Thursday said its first foldable smartphone, the Galaxy Fold, will be available in South Korea from September 6 with...

2019 Was a Fruitful Year for Cybercriminals – High Profile Data Breaches

What a time to be alive. We have tons of information at the tips of our fingers, we can get in touch with that distant cousin from the other corner...

10 Ways To Prevent Email Phishing Attacks

No one wants to believe they’d fall victim to phishing attacks. However, phishing attacks are on the rise and are more sophisticated than ever. There’s a good reason phishing attacks...

Hackers Embedded the Malicious Code Within WAV Audio Files

Researchers observed a new malware campaign using WAV audio files to hide the malware and to avoid detection. Threat actors embedded the malicious code within the WAV audio files. Based on...

APLICATIONS

Have Your Cake and Eat it Too With Next-Generation Endpoint Security...

When faced with an either/or situation, people typically prefer not to choose. We want the best of both worlds. Rarely does someone want...

HOT NEWS