5 Things To Do After Installing Windows 10 Build 1903
Redmond has once again blessed (or cursed) the Windows user population with the bi-yearly feature update to Windows 10, 1903. Fresh from the not so good experience of Windows Update, thanks to 1809 that immediately preceded it, build 1903 promises a smooth operating system with a new lick of paint. We have warned our readers
[ Read More ]Chrome’s Project Strobe Against Malicious Extensions
Browser extensions are both a boon and bane in personal/corporate Internet-centric computing, it is beneficial to users as it extends the features of the browser, while unfortunately expanding the attack surface of web browsers. That is why browser vendors are making a tight balancing act between enabling browser extensions and plugins with reasonable-level of access
[ Read More ]WannaCry In 2019? Yes, WannaCry Is Still Here
Two years ago in 2017, the world was caught off guard by a very destructive ransomware named WannaCry. With its infection success rate, estimates revealed that ransom payment for WannaCry went up to $4 billion that year. The NSA’s former top secret weaponized bug in SMB (Server Message Block) version 1 went to the wrong
[ Read More ]UAE’s Phishing And Social Engineering Problems
Global cloud-based email management firm Mimecast, in their State of Email Security report, revealed that their study revealed that UAE’s cyber impersonation cases are up by 75%, which caused financial loss for the victims. The report is a result of the aggregate information coming from more than a thousand IT leaders from multinational companies, with
[ Read More ]Fundamentals Of Security Precautions For IoT Devices
When it comes to security risks in using the Internet today, many people may first think of malicious attacks on PCs, smartphones, and servers by malicious third parties. But we are at the wake of the massive Intel-processor MDS (Microarchitectural Data Sampling) security bugs, which can only be mitigated 100% with the complete disabling of
[ Read More ]Code Execution Vulnerability in Notepad
Tavis Ormandy, a security researcher for Google’s Project Zero division, announced the discovery of a code bug in Notepad, Microsoft’s popular text editor. The problem was privately conveyed to Microsoft, and it was made public after 90 days. No additional information is currently available, because Microsoft has not solved the problem yet. According to sources
[ Read More ]A Quick Glimpse On Flipboard Data Breach
When a news aggregator app becomes a part headline news, that only means trouble, a lot of trouble. Flipboard, a mainstream news aggregator app with 500 million+ downloads with at least 150-million unique active users monthly from the Google Play Store alone disclosed that their user account information database fell for a massive data breach
[ Read More ]Inevitable Computing Changes In The Enterprise
We may be witnessing a massive change in the enterprise IT space, fueled by the evolution of personal computing. The days of companies spending a lot of its funding in purchasing physical servers, maintenance, energy and the labor cost of running it 24/7 with regular hardware refresh cycle are fast becoming outdated. Yes, there is
[ Read More ]5 Mobile Security Threats to be Taken Seriously In 2019
Nowadays, mobile security ranks high on the list of concerns for all companies, and this is for good reason: now almost all workers access company data from smartphones on a regular basis. It means that keeping sensitive information safe is an increasingly complex puzzle. The stakes are higher than ever: The average cost of a
[ Read More ]The Reason Why Small Enterprise Never Recover Post Cyberattacks
A cyberattack can paralyze critical infrastructure and businesses and create negative pressure. In other cases, this can lead to litigation between you and your company. These and other factors, can seriously harm a company and force many of them to pay for data recovery and computer security services to repair the damage. However, many companies
[ Read More ]