The workload security solutions firm HyTrust said that it has broaden security and compliance offerings for VMware Cloud Provider Program Partners with further integration of HyTrust solutions and VMware vCloud Director (vCD).
Locky Ransomware Attack: CERT-In issues warning, cybersecurity firm Trend Micro says no incidence reported by Indian customers
In the wake of Locky Ransomware attack and the India's Computer Emergency Response Team (CERT) issuing alert across the country, cybersecurity firm Trend Micro has stated that there are no incidence reported by Trend Micro’s customers in India at present.
Wikileaks has published set of files dubbed “Angelfire” as a part of their Vault 7 project. The leak reveals a framework used by the CIA to infect machines using older versions of Windows operating systems, Windows XP or Windows 7.
Instagram Data Breach: Want to give a call to your favourite pop star or send an email to your favourite footballer? You can get their contact details for as low as $10.
Giving push to Prime Minister Narendra Modi Digital India initiative, the Union government has decided to fund upto Rs 5 crore for R&D on cybersecurity in India.
Hack iPhone, Samsung S8, Google Pixel, Huawei Mate9 pro, win $500,000 from cybersecurity firm Trend Micro
Yes, it is true! hack the iPhone, Samsung S8, Google Pixel, Huawei Mate9 pro and you could win $500,000 in prizes from cybersecurity firm Trend Micro.
Goolge works with manufacturers across the globe to run hundreds of compatibility tests that ensure devices adhere to the Android security and permissions model. These tests also verify that the Google apps pre-installed on devices are authentic, and that apps from the Play Store can work as intended.
HBO hackers who have been threatening to leak yet to be telecasted Season 7 finale of Game of Thrones, titled The Dragon and the Wolf, if HBO do not pay $6.5 million in Bitcoin, have finally leaked some parts of the series on the Internet.
A report released by ACCA raises questions about how prepared businesses are to face new ethical challenges such as ransomware attacks; crypto-currency transactions; intellectual property disputes and customer privacy