10 Tips To Secure Your Mobile Device

Mobile malware has been on the rise drastically in last couple of years.Everything from backdoor malware that steals personal information to ransom-ware that locks your phone until payment is made exists in the mobile space. Mitigating mobile security risk is critical to protecting yourself. Here are 10 steps you can take to secure your mobile Read More …

Now Secure Your Personal Social Media Accounts

Social media websites serve as platforms for global interaction and the sharing of ideas, but are simultaneously a platform frequently leveraged by cyber threat actors. Cyber threat actors target social media accounts in takeover attempts, with the goal of posting fictitious or embarrassing information. Cyber threat actors may also use personally identifiable information (PII) posted Read More …

Unpatched WordPress Vulnerability Could Allow Hacker to Reset Admin Password

WordPress is the most popular content management or blogging system in world.A zero-day vulnerability exists in WordPress that in some conditions could allow an attacker to reset a user’s password and gain access to their WordPress account. The WordPress vulnerability was discovered by security researcher Dawid Golunski of Legal Hackers who disclosed the vulnerability on Read More …

Your YouTube Videos Watching History Can Be Tracked By Hackers And Government Agencies

If you thought what you watch on YouTube is no one’s business, you could not be further detached from reality. Researchers have found that your online video viewing habits can be tracked. Gaps in YouTube’s encryption enable both government intelligence agencies, hackers and internet marketers to determine which videos a user is watching, said the Read More …