Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha

Advertisement 

×

Message

EU e-Privacy Directive

This website uses cookies to manage authentication, navigation, and other functions. By using our website, you agree that we can place these types of cookies on your device.

View e-Privacy Directive Documents

You have declined cookies. This decision can be reversed.

Items filtered by date: Thursday, 24 May 2018

Cisco has warned of a possibly imminent cyber-attack on the Ukraine, after a strain of what it believes is state-backed malware was found to be rapidly spreading in the country.

Published in Malware

Many Mac users reported in the past few weeks that a process named “mshelper” had been eating up a lot of CPU power and draining their batteries. It turns out that the process is associated with a piece of malware designed to mine for Monero (XMR) cryptocurrency.

Published in Malware

Monitoring cyberthreats over time reveals interesting insights into the strategies used by cybercriminals and the evolution of the attack vectors they target. While the threat landscape continues to be quite diversified, trends do seem to run in predictable cycles.

Published in Cyber Attack
An influx of comments have been appearing on Reddit stating that all Windows PCs that are running Avast anti-virus are not receiving the April 2018 update. The exact version in question is 1803.
Published in Cyber News
Thursday, 24 May 2018 14:46

Can VPNs work with Netflix?

A virtual private network, or VPN, can help you disguise your IP address when accessing the internet and can be a useful, legal tool.

Published in Cyber Advice
Cybercriminals have hacked and infected at least 500,000 routers as well as storage devices in what is believed to be part of a planned attack on Ukraine by Russia.
Published in Hacking
Cisco has published a new blog post which talks about securing the business with Cisco’s four security suits, covering Security Essentials, Cloud & Web Security, Policy & Visibility, and Email Security.
Published in Cyber Advice

Britain’s top prosecutor says that countries need to work together to determine the identity of attackers behind cross-border cyberattacks.

Published in Cyber UK

Although the standard adequacy approach is an effective means of ensuring free flow of data from the EU to third countries, it would not reflect the breadth and depth of the UK-EU relationship, according to the latest proposals published by the UK Brexit negotiating team.

Published in Cyber Europe

Latest

How to tell if your Facebook account was hacked and had data leaked

Oct 13, 2018 Cyber News

How to tell if your Facebook account was hacked and had data leaked

Facebook recently discovered that hackers stole Facebook access tokens for millions of accounts. Now, it's providing a c...

Advertisement 

  1. Popular
  2. Trending
  3. Comments

Calendar

« October 2018 »
Mon Tue Wed Thu Fri Sat Sun
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31        

Advertisement 

Advertisement