Global Mobile Hack – Daily Security Byte EP.127
The Australian 60 Minutes unveiled a piece on how attackers can track and intercept the calls from any mobile, as long as they know its number. However, others say the researchers demonstrating this...
View ArticleMobile DDoS from China – Daily Security Byte EP.151
A hosting and security company discovered attackers leveraging mobile devices in China to launch a DDoS attack against one of its customers. Watch today’s video to learn how this DDoS attack is unique,...
View ArticleAndroid Chrome 0day – Daily Security Byte EP. 176
Last week, a Chinese security research disclosed a new zero day Android vulnerability at PacSec’s Pwn2Own competition. Watch today’s video to learn a little more about this flaw, and what to do about...
View ArticleWatchGuard Product Releases
WatchGuard recently announced the General Availability of major new releases of both the Fireware operating system and WatchGuard Dimension, both of which are now available to download at the software...
View ArticleThe iPhone 7 home button and security
Of all of the rumors surrounding the upcoming release of Apple’s iPhone 7, reports that the newest model will not include a traditional home button is one of the most interesting. This update would be...
View ArticleDon’t Let Public Wi-Fi Risks Ruin Your Holiday Cheer
The holidays and shopping are synonymous for most people. More likely than not, you or someone you know will meander through a mall this month in search of gifts for friends and loved ones. It’s...
View ArticleHow Hospitality Organizations Can Protect Guest Data in 2017
Hospitality establishments and travel hubs around the globe are now recovering from the seasonal rush of visitors, while preparing for more guests in 2017. These days, each traveler is sure to have one...
View ArticleSix Ways Hackers Can Use Your Selfies Against You
When was the last time you posted photo on Instagram, Facebook or Twitter? Chances are, it’s been less than a week. Although sharing images on social media platforms is a fun way to visually engage...
View ArticleThe Key To Cyber Self-Defense: Know Your Enemy
The many cyber-attacks making daily news headlines are generated by a variety of different types of threat actors, each with their own set of motivations. A recent article on Slate breaks down the need...
View Article
More Pages to Explore .....