MESCON Conference
Security Regional Events May 20, 2018

MESCON Conference

GISEC 2018
Home Page Banner

GISEC 2018

MENA CISO SUMMIT
Home Page Banner April 14, 2018

MENA CISO SUMMIT

RSA Conference 2018
Home Page Banner March 16, 2018

RSA Conference 2018

Recently discovered malware steals cache data and secure messaging sessions from the desktop version of encrypted messaging service Telegram. The

Yet another variant of the Mirai botnet has appeared on the scene, but this one has a twist: The code

Google plans to remove the “secure” label from HTTPS websites starting in September 2018, a move intended to acknowledge HTTPS

MESCON Conference

MESCON : Regional cyber security conference to reach out to more than 7000+ security professionals. MESCON brings to you the

Security researchers have discovered a large Satori botnet that is scanning the internet for exposed Ethereum cryptocurrency mining rigs. According

For about an hour on the night of a primary election in May, residents in Knox County, Tennessee, couldn’t tell

A British computer expert who helped shut down the NHS ‘WannaCry’ cyber attack has been charged in the US with

A week after issuing updates on Patch Tuesday, Adobe has posted patches for a second slew of 24 critical vulnerabilities,

Researchers have discovered a phishing campaign that infected Android devices with custom surveillance-ware bent on extracting data from top officials,

Danish rail travelers found buying a ticket difficult yesterday, following a DDoS attack on the railway company DSB. DSB has

Security experts are warning PGP users to disable tools that automatically decrypt PGP-encrypted email after the discovery of a critical

SynAck targeted ransomware was seen in the wild using the Doppelgänging technique which was first presented as a proof of

The ISO has brought together a team of privacy experts to develop the first set of preventative international guidelines to

The US has turned up the pressure on Chinese technology firms after the Department of Defense ordered all military bases

Warren Buffett believes cybersecurity incidents will rise, and with it the potential to significantly harm the insurance industry. “Cyber is

Not long after the Russian government ordered the immediate blocking of the Telegram messaging app from the Apple App Store

Whether serendipitous or ironic, Global Password Day found Twitter advising users to change their passwords after a bug in its

From a cruising altitude, a blockchain might not look that different from things you're familiar with, say Wikipedia. With a
It's an exciting time to be a professional penetration tester. As malicious computer attackers amp up the number and magnitude
The Open Web Application Security Project (OWASP) is a non-profit organization dedicated to providing unbiased, practical information about application security.
Penetration testing, more commonly called pentesting, is the practice of finding holes that could be exploited in an application, network
Advanced Persistent Threat (APT): An attack in which an unauthorized actor, often a nationstate,employs highly sophisticated technology and/or tactics to

Microsoft last week unveiled Trusted Cyber Physical Systems (TCPS), a new solution designed to help protect critical infrastructure against modern

The world’s largest online marketplace for selling and lauching distributed denial-of-service (DDoS) attacks was shut down this week as part

GravityRAT, a remote access trojan targeting organisations across India, boats an unusual trick for evading analysis: taking a reading of

If you receive a link for a video, even if it looks exciting, sent by someone (or your friend) on

Amazon put a quick stop to an issue in Alexa’s skill set after Chexmarx researchers reported that her skill set could be

The Gulf Information Security Expo & Conference (GISEC) brings together over 7,350 top IT security and tech sector professionals to

Western Digital’s My Cloud EX2 storage devices leak files to anyone on a local network by default, no matter the

Ukraine’s energy and coal ministry website has been hit by a ransomware attack demanding Bitcoin to recover encrypted files according

COMPLIANCE

Airbnb is notifying its users in China that the company will share guest’s information with authorities to comply with national

Why Encryption …? In cryptography, encryption is the process of encoding messages or information in such a way that only

 
 

FEATURED

Recently discovered malware steals cache data and secure messaging sessions from the desktop version of encrypted messaging service Telegram. The

Yet another variant of the Mirai botnet has appeared on the scene, but this one has a twist: The code

Security researchers have discovered a large Satori botnet that is scanning the internet for exposed Ethereum cryptocurrency mining rigs. According

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...