NITI Aayog’s AIM unveils National Winners of the ATL Tinkering Marathon 2019

New Delhi, India, August 6, 2020: Atal Innovation Mission (AIM), NITI Aayog declared the results of its flagship national annual innovation Marathon challenge ATL...

Five permissions Android games do not need

You can refuse some permissions to greedy games, and they most definitely do not need these five. By default, apps on your phone have very...

13 email threat types to know about right now

How inbox defense protects against increasingly sophisticated attacks. Protect your business from all the top email threats, including the sophisticated ones designed to slip through...

Cyber Attack Trends: 2020 Mid-Year Report

'Cyber Attack Trends: 2020 Mid-Year Report’ reveals how criminals have targeted all sectors with pandemic-themed attacks and highlights surge in nation-state cyber activity COVID-19 Pandemic...

Lazarus employs multi-platform malware framework in a series of data espionage and ransomware attacks

Kaspersky researchers have uncovered a series of attacks that use an advanced malware framework, called MATA, to target Windows, Linux, and macOS operating systems....

Collateral damage from APTs

How APTs compromise the privacy and security of average citizens that they do not target directly. Folks usually relate to APTs about the same way...

Never trust, always verify: The Zero Trust security model

What is Zero Trust, and why is it attractive for modern business? The Zero Trust model has been gaining popularity among organizations in recent years....

Safety Measures are Essential with Increasing Cyber Attacks

The COVID-19 pandemic has been the headline over the past few months. It has embraced almost everyone into an unprecedented crisis and has forced...

Making YouTube a child-safe zone

The Safe Search in YouTube feature prevents children from stumbling across violent, sexual, and other unwelcome content. Children love watching online videos. Nothing wrong with that...

Cybercriminals take advantage of the streaming wars to attack users

When it comes to disguising malicious files under the names of popular streaming platforms and their content, cybercriminals most frequently use Netflix and The...

TECH NEWS

TOP STORIES

Cyber Security