February 27, 2021 9:43 am
-Advertisement-

vulnerabilities - search results

If you're not happy with the results, please do another search
iPhone, Samsung S8, Google Pixel, Huawei Mate9 pro, cybersecurity, trend micro, PacSec security conference, Tokyo, Pwn2Own competition, Ankush Johar

Hack iPhone, Samsung S8, Google Pixel, Huawei Mate9 pro, win $500,000 from cybersecurity firm Trend Micro

Yes, it is true! hack the iPhone, Samsung S8, Google Pixel, Huawei Mate9 pro and you could win $500,000 in prizes from cybersecurity firm Trend Micro. 
The HBO hackers further made a revelation that they sold over 5 TB of HBO’s data to three customers in the deep web market. (Photo/HBO)

HBO hackers made $3.2 million, leak ‘Game of Thrones’ Season 7

HBO hackers who have been threatening to leak yet to be telecasted Season 7 finale of Game of Thrones, titled The Dragon and the Wolf, if HBO do not pay $6.5 million in Bitcoin, have finally leaked some parts of the series on the Internet.
Zerodium which specialises in reselling zero-day exploits has offered $500,000 (Rs 3 crore) for finding zero-day exploits in WhatsApp (Photo/Agency)

Hack WhatsApp, get Rs 3 crore, says Zerodium

US-based security firm Zerodium which specialises in acquiring and reselling zero-day exploits has offered $500,000 (Rs 3 crore) for finding zero-day exploits in secure messaging platforms including WhatsApp, Signal and Telegram.
Trend Micro said that it has invited renowned experts, industry thought leaders, businesses and organisations from across the globe to re-evaluate and redefine their understanding of threats, risks and solutions in a rapidly evolving threat landscape during the CLOUDSEC 2017. (Photo/Trend Micro)

Trend Micro CLOUDSEC 2017 to focus on security of Industrial Internet of Things in India

Cybersecurity firm Trend Micro will host its premier internet security conference CLOUDSEC 2017 in Mumbai on September 13
According to research firm Gartner, In 2017, the threat level to enterprise IT for information security continues to be at very high levels (Photo/Agency)

From cloud workload to micro segmentation: Here are the top 10 technologies for information security in 2017

According to research firm Gartner, In 2017, the threat level to enterprise IT for information security continues to be at very high levels, with daily accounts in the media of large breaches and attacks
Georg Schwab, MD of AVL Software and Functions GmbH and Alex Moiseev, CSO of Kaspersky Lab signed the cooperation agreement in Regensburg (Photo/Agency)

Kaspersky Lab and AVL sign cooperation for connected car security

To meet the cybersecurity challenges of connected car, Kaspersky Lab and AVL sign cooperation to work together to develop advanced and embedded security technologies

Six cybersecurity weaknesses that competitors can use to undermine your business

Unauthenticated protocols, outdated hardware, weak user authentication, weak file integrity checks, vulnerable windows operating systems, undocumented third-party relationships may help your adversaries undermine your industrial operations, says FireEye.
Networking major cyber range will immerse people in simulated real-world cyber-attacks to train them on how to properly prepare for, respond to, and manage a broad variety of threats. “This experience can be leveraged by companies, academicians, customers and government and their security teams,” said Cisco. (Photo/Cisco)

Cisco launches Cyber Range Lab in India

The Cyber Range Lab will provide technical training to improve skill sets in addition to testing facilities, analytics, intelligence and technology know-how, says Cisco.
SBI being the largest and biggest public sector Bank in India is placing huge emphasis on embracing technology, with investment priorities around Digitization, Cloud and Mobility, and the integration of security tools is a top priority for SBI. (Photo/SBI)

Trend Micro to deploy end point security solutions across 26,000 branches of SBI

Cybersecurity firm Trend Micro said that it has deployed endpoint and server security solutions across more than 26000 branches of State Bank of India (SBI) in and outside India and over 275,000 endpoints

F5 launches a set of security products for ensuring application security

New solutions from F5 will give customers protection and intelligence required to keep applications and user data secure, says F5 Networks.
- Advertisement -SAP Hana