February 18, 2019

January 2019’s Most Wanted Malware: A Significant New Threat Speaks Up

Check Point’s researchers detect growth of ‘SpeakUp’ – a new Linux backdoor which is spreading the XMRig crypto-mining malware Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading […]
February 18, 2019

What is Watering hole attack and how to stay protected from such attacks?

The attacker first stalks the websites often visited by a victim or a particular group, and then infect the frequently visited websites with malware. The attacker […]
February 18, 2019

Attackers exploit two-year-old vulnerability to infect MSPs with GandCrab ransomware

Attackers are exploiting the SQL injection vulnerability in the Kaseya VSA plugin to infect the MSPs with Gandcrab ransomware. ConnectWise noted that only companies who have […]
February 18, 2019

Cisco Network Assurance Engine (NAE) contains password vulnerability

A default password vulnerability in Network Assurance Engine (NAE) could allow an unauthenticated, local attacker to gain unauthorized access or cause a Denial of Service (DoS) […]
February 12, 2019

Popular D-Link Router Falls for Routine Malware

While every router manufacturer must endure its share of difficulties, D-Link has been having a particularly tough time over the last year or so. Every few […]
February 12, 2019

Wipro for data localisation, differs from Nasscom stand

While Nasscom calls for data rules based on open internet, IT firm feels localisation needed for safety. BENGALURU: WiproNSE -0.84 % has favoured mandatory domestic incorporation […]
February 12, 2019

Woman loses nearly $18,000 in computer virus scam

A woman is out nearly $18,000 after trying to fix what looked like a computer virus warning from Microsoft. The Grand Island Police Department said the […]
February 12, 2019

Is Cisco Systems a Buy?

Many investors like to buy and hold shares of companies that are leaders in their respective fields, generate a substantial amount of cash (preferably with a […]
February 12, 2019

A bulletproof vest for your data to wear through the clouds

sco Application Centric Infrastructure leaves hardware behind. Cisco has extended the scope of its latest Application Centric Infrastructure (ACI) to cloud-deployed workloads, in a move that delivers the […]
February 12, 2019

Internet Protection Firewall Alert

Internet Protection Firewall Alert Description “Internet Protection Firewall Alert” is the heading of some fake security alert generated by the rogue anti-virus program Internet Protection. Internet Protection is nothing more […]