Reading Time: 3 minutes Cyber criminals have resorted to another sophisticated way of infecting user systems with ransomware and other malware. Malvertising or compromised advertising looks...
1 – Artificial-Intelligence System Surfs Web to Improve Its Performance Information extraction involves classifying data items that are stored in plain text, and is a major area...
Reading Time: 2 minutes Using hacked “Internet of Things” (IoT) devices, cyber criminals had launched a massive internet attack on the Internet infrastructure company – Dyn,...
Reading Time: 3 minutes On Sep 22, 2016, Yahoo issued a press release: “A recent investigation by Yahoo! Inc. has confirmed that a copy of certain...
Reading Time: 2 minutes Yahoo has been hacked. LinkedIn has been hacked. Accounts have been stolen. Identities have been stolen. Identity theft is said to have...
Reading Time: 2 minutes Clash of Kings is a very popular mobile game with millions of avid players being members of its official forum. This forum...
Reading Time: 2 minutes The latest malware to hit Mac operating systems is the EasyDoc Converter. Cyber security experts have discovered this dangerous Mac malware on...
Reading Time: 3 minutes US politician and Texas Representative Michael C.Burgess has voiced a very strong opinion regarding the issue of malware attacks when he said...
Reading Time: 3 minutes We are starting to see it more and more: ransomware attacks are on the rise – and we’ve been seeing it especially...
Reading Time: 4 minutes Today, the second Tuesday of February, has been marked as “Safer Internet Day. For the past decade, it has served as a...