Articles By This Author

News

How Does a VPN Work and Why You Should Use It Too

Essentially working as a veil, VPNs tend to protect you from any harmful influx of internet traffic. Without going into the technical jargon, however, here

News

Blackberry Buried Security Vulnerability in OS Until Forced To Disclose by Feds; Was Discovered in April

A security vulnerability that impacts an older form of a BlackBerry industrial systems OS, still in use in both industrial settings and hospital equipment, was

News

Russian Intelligence Agencies Enrolled Ransomware Gangs To Attack US Government Agencies, Report Finds

Russian intelligence agencies worked with ransomware gangs to compromise various US government agencies, Analyst1 cybersecurity firm found. The firm’s “Nation-State Ransomware” report says that advanced persistent threat

News

President Biden’s Executive Order Steps up to the Plate as a Potential Solution to Cyber Attacks on Critical Infrastructure

As connected cyberattacks are growing exponentially, hacks and data breaches remain top of mind for security professionals, manufacturers and top tech companies, globally. Of late,

News

Hackers Published One Million Stolen Credit Cards on the Dark Web To Attract Cybercriminals to Their Carding Site

Hackers published a million stolen credit cards for free in a campaign dubbed a “promotion of unprecedented generosity” to inaugurate a new criminal marketplace, the

News

China’s Data Protection Regulation Push Comes to the Smart Car Market; Vehicle Keys, Locally Generated Information Must Be Stored In-Country

A new expansion of China’s data protection regulations will impact the smart car market in the country. Existing legislation requires the personal data of citizens

News

Ransomware: A Perfect Storm

In a speech given at RUSI’s annual security conference by Lindy Cameron, Head of the National Cyber Security Centre, the UK government said that ransomware

News

Alleviating Data Security Risks With IoT Security Solutions

Ever since the Internet of Things (or IoT) became mainstream, this technology has continued to enthrall us in almost all business landscapes and aspects of

News

T-Mobile Data Breach: 100 Million Customer Data Records Compromised Including Social Security, Driver’s License & Unique Device Numbers

Mobile carrier T-Mobile, the second largest in the US as of Q2 2021, appears to have suffered a devastating data breach as a reported 100

News

As Vaccine Passport Programs Roll Out, Black Market for Fake Vaccine Certificates Does Booming Business

Fake vaccine certificates have been available for purchase since proof of vaccination was adopted by numerous nations as a means of satisfying Covid-19 entry requirements,