Blockchain Main Challenges in 2020
Blockchain is taking off but is still hampered by bad PR and regulatory foot-dragging. 2020 may see the introduction of a global digital currency. The...
Blockchain: Overhyped buzzword or real-deal enterprise solution?
IT vendors are rolling out blockchain-based capabilities, often in response to high levels of customer interest While blockchain is among the hottest technologies in the...
New Bitcoin Malware Attacks Copy and Paste Their Way to Co-Opted Currency
Bitcoin is breaking records. As noted by Business Insider, the cryptocurrency hit an all-time high on Nov. 1, 2017, and its bull run shows no sign...
CloudFlare Wants to Make DDoS Attacks a Thing of the Past
DDoS attacks have been happening for ages. In recent years, they’ve increased in both frequency and impact. Whole swaths of the U.S. lost Internet connectivity...
Google launches security features while report shows iOS threats outpacing Android
Google has cracked down on security with the launch of Play Protect and other new defense mechanisms while a report has been released which shows...
Hackers can now decrypt satellite phone calls(satellite communications) in ‘real time’ within a fraction of a second
Researchers have uncovered a new attack method that can make encryption used in satellite communications unsecure....
Fireball Malware: Ticking Time Bomb or All Hot Air?
Researchers from Check Point Software discovered that more than 250 million Windows computers worldwide were infected, SecurityWeekreported. According to the company’s blog, Fireball malware is like “a...
6 Ways Your Apps May Be Attacked: How Crowdsourced Penetration Testing Improves Software Development
In the modern world of security and Apps security , there is stuff you worry about and stuff you don’t. Most companies have SaaS and third-party...
Smart Cities, Big Problems? The Risk of Malware in IoT-Enabled Infrastructure
Cities are notoriously inefficient. As populations rise, everything from mass transit and road maintenance to power generation and garbage collection becomes more complex and costly....
Turkish Crime Family group will remotely wipe hundreds of millions of iPhones unless Apple pays ransom
Hackers belonging to the Turkish Crime Family group threaten to remotely wipe hundreds of millions of iPhones unless Apple pays a ransom....