An award-winning iPhone hack was used by the Chinese government to spy on Uyghur Muslims, giving Beijing total control of their phones.

An award-winning iPhone hack was used by the Chinese government to spy on Uyghur Muslims, giving Beijing total…

Over the past years, cybersecurity researchers from several companies have demonstrated that a Tesla car can be hacked

Recently, two European researchers have demonstrated how a Tesla can be hacked remotely without any user…

The three new malware strains identified by Mandiant

On Tuesday cybersecurity team said the malware strains, dubbed Doubledrag, Doubledrop, and Doubleback, were detected in December…

What is Zero Trust? And Zero Trust Network Access

What is Zero Trust? There are many definitions, sometimes conflicting, of Zero Trust. Put simply, Zero-Trust…

Smishing meaning and definition

Smishing is a phishing cybersecurity attack carried out over mobile text messaging, also known as SMS…

Cybersecurity Workforce Shortage Continues

For years, we’ve known about the impending shortage of the information security workforce, as evidenced by…

Ransomware crooks are targeting vulnerable

The ransomware gang identified as DoppelPaymer has leaked a substantial collection of files from the Illinois…

Why University of Minnesota is Getting Banned from Contributing to Linux Kernel Code

Kroah-Hartman, one of the most respected of all the Linux kernel developers, tweeted, “Linux kernel developers…

Hackers Are Exploiting Discord Links to Serve Up Malware

What is Discord Malware? Discord is a free online chat application where you can share data…

The Zero Trust security model is not new and it has been in discussions and practice for quite some time

What is zero trust security Definition? Zero-trust security is an IT security model that limits who…