A Chinese hacker who goes by Daishen claims he can hack the Volkswagen Toureg, Audi A6, Audi A7 and more,…
Browsing: Identity and Access Management (IAM)
In the world of computers, viruses are not an uncommon thing to hear. Viruses are to computers what infections are…
Badlock was discovered by the Open Source Samba community and apparently underpins both Samba and Windows Server Message Block (SMB). The…
Following the announcement that the GDPR has been ratified by the European Parliament, security experts from Micro Focus Thales and Netskope commented…
What could be better than sitting in your favorite café, sipping latte and browsing whatever the drama of the day…
Unlike physical biometrics, behaviour biometrics is the field of study to uniquely identify the individual based on his or her…
The AP has reported that a laptop and portable hard drives stolen from the US Office of Child Support Enforcement may contain…
Malware continues to become a growing and increasingly costly risk to mobile users today, with one in every 30 mobile…
The Panama Papers, a collection of 11.5 million files leaked from Panama-based law firm Mossack Fonseca, have gone live online. The…
Dear Editor, The Panama Papers leak may have been the work of an insider or an external hacker; news reported…