CybercureME.com
Home Page Banner

CybercureME.com

TELECOM SECURITY
Home Page Banner

TELECOM SECURITY

SCADA SECURITY
Home Page Banner

SCADA SECURITY

Enterprise Security
Home Page Banner

Enterprise Security

Cybercriminals are using novel approaches to poison Google search results in the hope of infecting users with a banking Trojan

Just a year after Mirai—biggest IoT-based malware that caused vast Internet outages by launching massive DDoS attacks—completed its first anniversary,

Launched in June last year, Google prompt was designed to improve the security of the login process by informing users

A $25 Raspberry Pi or similar tiny PCs could be used to hack SAP POS systems due to a critical

A PIN password might seem like a secure way to lock a device but, considering how easy it is for

Only a third of Fortune 500 companies deploy DMARC, a widely-backed best-practice security measure to defeat spoofing — forged emails

Microsoft researchers detected a 300% increase in user accounts attacked over the past year, and 44% growth in the number

Google recently deleted around 300 apps from the official Play Store which were used to create what is being called

On Monday, Google released the long-awaited Android 8.0 Oreo. The newest version of the OS contains many new features and

Ethereum and ICOs – the hackers keep getting rich. On Sunday, hackers stole nearly $500,000 in Ethereum from Enigma, a

A security flaw that could affect millions of cars has been identified, with researchers warning that there may be no

According to recent Proofpoint research, eight extensions for the Google Chrome web browser have been compromised by attackers, sending malicious

A new modification of notorious mobile banking Trojan “Faketoken” has resurfaced which is able to steal credentials from popular taxi

Researchers have discovered that cyber attackers are exploiting a vulnerability that allows them to elude antivirus software to deliver malware

Two critical zero-day vulnerabilities have been detected in the Foxit Reader software that could allow attackers to execute arbitrary code

Malware has threatened computers, networks, and infrastructures since the eighties. There are two major technologies to defend against this, but

In 2016, Linux turned 25. When it began, it was a student project. Today, Linux runs everything. From smartphones to

A variant of an old adware for Mac was recently discovered, and has sneakily found a way to circumnavigate security

A powerful form of ransomware, which encrypts whole hard drives instead of just files, has suddenly returned — and there’s

WikiLeaks has published another Vault 7 leak where the CIA spy on video streams remotely. The document released by WikiLeaks

Microsoft has released 48 security patches for all supported versions of Windows systems and other products today. The patches will

Hotspot Shield, a virtual Private Network VPN service is been blamed for breaching its own privacy policy according to the

A numerous number of flaws/vulnerabilities have been found in an essential component of solar panels that can be exploited to

Three security researchers have demonstrated at the Defcon in Las Vegas that infotainment systems from well-known automarks still have numerous

IP-enabled security cameras manufactured by Loftek and VStarcam are said to be infected by more than two dozen vulnerabilities thus

A cross-scripting vulnerability was discovered last year in two of IBM products, Worklight and MobileFirst. The vulnerability was recently fixed

The ICS-CERT illustrated that flwas within Siemen’s molecular imaging products were exploitable while “Siemens is preparing updates for the affected products

This week, Cisco has released patches for multiple vulnerabilities spanning across a dozen of its products which included two high

In a press release published Thursday, WikiLeaks revealed the CIA’s hacking tool, ‘Dumbo,’ which allows agents to manipulate Microsoft Window’s

Over the past few years, it was known among cyber criminals that they would buy web extensions, modify them by

COMPLIANCE

Why Encryption …? In cryptography, encryption is the process of encoding messages or information in such a way that only

Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal

 
 

FEATURED

Launched in June last year, Google prompt was designed to improve the security of the login process by informing users

A $25 Raspberry Pi or similar tiny PCs could be used to hack SAP POS systems due to a critical

A PIN password might seem like a secure way to lock a device but, considering how easy it is for

 


____________________________________________________

Signup for our newsletter and get access to our latest cybersecurity News, Event and jobs.

Email address
Secure and Spam free...