Tag: Cybersecurity

google, android phone, android, android phone security, android phone certification, google certification for phone, android for tablet, cybersecurity

Google launches website to educate value of using certified Android device

Goolge works with manufacturers across the globe to run hundreds of compatibility tests that ensure devices adhere to the Android security and permissions model. These tests also verify that the Google apps pre-installed on devices are authentic, and that apps from the Play Store can work as intended.
The HBO hackers further made a revelation that they sold over 5 TB of HBO’s data to three customers in the deep web market. (Photo/HBO)

HBO hackers made $3.2 million, leak ‘Game of Thrones’ Season 7

HBO hackers who have been threatening to leak yet to be telecasted Season 7 finale of Game of Thrones, titled The Dragon and the Wolf, if HBO do not pay $6.5 million in Bitcoin, have finally leaked some parts of the series on the Internet.
Zerodium which specialises in reselling zero-day exploits has offered $500,000 (Rs 3 crore) for finding zero-day exploits in WhatsApp (Photo/Agency)

Hack WhatsApp, get Rs 3 crore, says Zerodium

US-based security firm Zerodium which specialises in acquiring and reselling zero-day exploits has offered $500,000 (Rs 3 crore) for finding zero-day exploits in secure messaging platforms including WhatsApp, Signal and Telegram.
Organisations need to put ethics at the heart of securing public trust in the digital age according to a new global study of accountants and business leaders from ACCA. (Photo/ACCA)

Chartered Accountants body ACCA warns of new ethical risks in the digital age

A report released by ACCA raises questions about how prepared businesses are to face new ethical challenges such as ransomware attacks; crypto-currency transactions; intellectual property disputes and customer privacy
Trend Micro said that it has invited renowned experts, industry thought leaders, businesses and organisations from across the globe to re-evaluate and redefine their understanding of threats, risks and solutions in a rapidly evolving threat landscape during the CLOUDSEC 2017. (Photo/Trend Micro)

Trend Micro CLOUDSEC 2017 to focus on security of Industrial Internet of Things in India

Cybersecurity firm Trend Micro will host its premier internet security conference CLOUDSEC 2017 in Mumbai on September 13
According to research firm Gartner, In 2017, the threat level to enterprise IT for information security continues to be at very high levels (Photo/Agency)

From cloud workload to micro segmentation: Here are the top 10 technologies for information security in 2017

According to research firm Gartner, In 2017, the threat level to enterprise IT for information security continues to be at very high levels, with daily accounts in the media of large breaches and attacks
Georg Schwab, MD of AVL Software and Functions GmbH and Alex Moiseev, CSO of Kaspersky Lab signed the cooperation agreement in Regensburg (Photo/Agency)

Kaspersky Lab and AVL sign cooperation for connected car security

To meet the cybersecurity challenges of connected car, Kaspersky Lab and AVL sign cooperation to work together to develop advanced and embedded security technologies
Russian cybersecurity firm Kaspersky Lab has appointed Stephan Neumeier as managing director of Kaspersky Lab Asia Pacific region (Photo/Agency)

Maxim Mitrokhin stepped down, Stephan Neumeier to lead Kaspersky Lab APAC as managing director

Global cybersecurity company Kaspersky Lab has appointed Stephan Neumeier as Managing Director of Kaspersky Lab Asia Pacific effective May 29, 2017
According to reports, the malware – Judy – was published by South Korean gaming studio Kiniwini under the name ENISTUDIO Corp (Photo/Agency)

Millions of Android smartphones may be affected with Judy malware, Google forced to remove infected apps from Play Store

Google removed apps that uses Judy malware to generate large amounts of fraudulent clicks on advertisements, generating revenues for the malware creator
IBM said that BSE has selected IBM Security to design, build and manage a cybersecurity Operation Center to safeguard the company’s assets and protect stakeholder data (Photo/Agency)

BSE selects IBM for setting up their Security Operation Center

Cyber Security Operation Center to provide BSE round-the-clock security, strengthen cyber defence and safeguard stakeholder assets
ESDS eNight Cloud Hosting
Advertisement