Google Patches Critical .PNG Security Vulnerability
Good news for Android users. Google has fixed a critical vulnerability that affected Android devices. This bug helps cybercriminals hack Android devices by sending specially crafted PNG (Portable Network Graphics) image files and using the same to execute arbitrary codes. Threatpost reports, “Google has patched a critical vulnerability in its current and legacy versions of
[ Read More ]Attempted Cyber Attack on Australian Parliament
Australia’s security agencies are investigating a likely cyber-attack attempt on the Federal Parliament’s computer system. It is alleged that the government believes that some foreign government is behind the attack. The hackers were caught in the early stages of gaining access to the system because the authorities didn’t find any loss of data, but signs
[ Read More ]Increased Security Risks in the Era of Digital Transformation
The new digital transformation era seems to be an era of increased security risks as well. The new era of digital transformation, in which organizations all the world over seek to embrace new technologies, is also an era in which organizations are struggling to implement and attain proper data security. This is what a new
[ Read More ]GDPR Compliance: Things that Companies Tend to Overlook
The GDPR (General Data Protection Regulation), which is the European Union’s new privacy regulation, came into effect in May 2018. The compliance rules of the GDPR, though they seem to be simple, do have some minor complications and hence companies that seek to comply with the regulation should see to it that they don’t overlook
[ Read More ]Cyber Security Is A Culture That Needs To Be Practiced
The biggest weakness of security breaches are the people, but at the same time, they can also be your organization’s biggest defence. The massive telecom data breach, stolen credentials, data compromised are some of the daily issues that we see these days. All of these major breaches resulted from mistakes of individuals. Despite years of
[ Read More ]Design Website Houzz Caught In Data Breach
Home improvement and design website Houzz has publicly disclosed that an unauthorized third party had obtained a file containing user data. This looks like the data breach was discovered late last year. According to a report in scmagazine, the FAQ page published on Houzz.com today says that the compromised information falls under three categories: •
[ Read More ]Japan Set to Survey 200 Million Gadgets for Cybersecurity
Japan is all set to beef up cybersecurity as the country gears up to host some notable global events. As Japan gets ready to host events like the Rugby World Cup, the Group of 20 meetings and the Summer Olympic Games, Tokyo decides to survey 200 million network-connected gadgets for cybersecurity lapses. The survey starts
[ Read More ]Android Malware That Triggers Only When It Detects Motion
This is a rather different piece of news- an Android malware that triggers only when it detects some motion has been detected. Malware authors think of all kinds of ways in which they could prevent their malware from being detected by security companies and security software. Hence, over the years, they have been creating viruses,
[ Read More ]Man-In-The-Middle 3rd Party App, To Be Filtered By Firefox 66
Having installed antivirus software both became a blessing and a curse for any computer user. It used to be all beneficial as antimalware software manages to detect suspicious behaviors in Windows before the damage is done. However, this capability of antimalware software has its corresponding limitations like damaging the actual Windows files that prevent the
[ Read More ]Steps to Prevent Data Breaches Quickly
Normally, it takes around 6-months for an organization to realize that their system is infected with malware or data breach. This is a good time for the hackers to play around and get the maximum out of it. So it is quite obvious that the organization will not have enough time in hand to mitigate
[ Read More ]