The news of thirteen vulnerabilities affecting AMD’s chip architecture has triggered a new wave of uncertainty about the security risks to which millions of devices were exposed.
By compromising these devices, the cyber criminals are able to redirect traffic, steal valuable information, and have a staging post for future offensive activity.
The increasing proliferation of Web applications has not gone unnoticed by cybercriminals. In recent months, these applications have gained popularity as a vector for attacks in numerous security incidents.
Yesterday hackers managed to deface a number of music videos listed on multiple VEVO YouTube videos ncluding ‘Despacito’.
The current public WHOIS system, that enables you to find the names and contact details of the owners of a domain, is incompatible with GDPR’s data protection principles.
With the new General Data Protection Regulation just weeks away, the he security and privacy of personal data is once again a cause of concern and debate for business organizations.