Mobile threats are everywhere – here’s what you can do

Even if your company issues you a locked-down smartphone, embracing best security practices remains vital Our smartphones. Where would we be without them? If you’re anything like me, making a phone call is the fifth or sixth reason to reach […]

Read more

18 duped via phishing

18 duped via phishing, conmen from Rajasthan, West Bengal In a fresh spate of cyber attack incidents being reported in the city, conmen from Rajasthan and West Bengal have been found targeting people via phishing – sending emails to steal […]

Read more

A NUUO zero-day vulnerability gives hackers your camera feed.

New vulnerabilities found in NUUO surveillance software can put cybercriminals in the director’s chair. When exploited through a stack buffer overflow, the Peekaboo vulnerability grants hackers full control over the surveillance video. Assuming control remotely, a hacker can tamper with the recording, […]

Read more