Phishing Attack becoming more smarter
Nowadays phishing attack are going high, by using encrypted pages. Sometimes the users can check the presence of phishing page by checking the availability of HTTP(S) on the website, butRead More →
Nowadays phishing attack are going high, by using encrypted pages. Sometimes the users can check the presence of phishing page by checking the availability of HTTP(S) on the website, butRead More →
In this generation everyone is using an android phone, many people usually download WhatsApp and TikTok. TikTok has shown its popularity compared to the WhatsApp, WhatsApp total downloads are 5,000Read More →
Microsoft Exchange servers had a vulnerability of CVE-2020-0688 and developers already resolved this issue two weeks before. But hackers are still scanning unpatched Microsoft Exchange Server across the internet toRead More →
Although reports of critical security failures in Apple operating systems are not very common, it is possible to encounter them relatively frequently with cybersecurity alerts of considerable or moderate seriousness.Read More →
A couple of months ago, Mexican oil company PEMEX suffered a cybersecurity incident. Although the official version mentioned that this was a minor flaw, unofficial sources revealed that in fact,Read More →
A new information security incident has affected a sporting goods firm. French company Decathlon has revealed that a data breach has exposed around 123 million records stored in an unsecuredRead More →
New reports on Internet of Things (IoT) devices with poor cybersecurity measures have emerged. This time, experts revealed that smart monitors from M6S Monitor iBaby firm have multiple security issuesRead More →
Last week, hundreds of Samsung Galaxy device users reported receiving a strange notification from the Find My Device app that contained only the number 1. In this regard, Samsung statedRead More →
Let’s Encrypt Certification Authority (CA) just announced multi-perspective domain validation as part of a plan to improve security standards in Internet use. In this way, Let’s Encrypt becomes the firstRead More →
© 2024 All Rights Reserved
info@iicybersecurity.com