Update: Microsoft has announced that the patch for zero day exploit found in Internet Explorer is ready and will be released Today (Nov 12th) at approximately 10:00...
Earlier this week, a common vulnerability exploit (CVE) was discovered in Microsoft office. However, many users were confused about which version of the Office software was vulnerable...
Apple yesterday released a statement about the questions that have been raised related to user information privacy and how they are dealing with it, trying to bring...
With all the news of how NSA and other such agencies, and hackers too perhaps are checking on your online presence and activities every day, we thought...
According to the latest transparency report published by Google, in the month of September 2013, they have received the request to remove 21.5 million urls. Due to...
Evernote has now made its 2 step verification process, also known as Two Factor or Multi Factor Authentication, available to all the users. Other famous and recent...
Hackers are at it again, with the latest target being Adobe. The company announced the security breach yesterday. The attackers gained access to customer data and source...
When you spend more time on digital world than the world outside, the one aspect that one can never ignore or avoid under any circumstances is Security....
Vodafone in Germany was hacked and the hacker gained access to 2 million customers’ personal details. The company took the necessary steps to stop the attack as...
RSA acquired a San-Francisco based security firm named PassBan yesterday. RSA, being one of the most reputed computer and Network Security firm understands the challenges faced by...
A new Zero-Day exploit (vulnerability) was uncovered in IE 8 by security experts which allow hackers to gain access in to Windows Operating Systems. Microsoft said they...
LivingSocial, a daily deals website is yet another company to have been attacked by hackers. The company has sent emails to its 50 million users informing about...
Twitter is reportedly working on two-factor authentication system. The rumor may hold considerable amount of truth to it owing to the recent incident where the Associated Press...
With the technology advancements today, online security is proving to the one of the most important aspects of any business. Five years ago maybe, it would have...
Cloud Computing has transformed the way IT performs, it has changed the way IT services are created, managed, performed and outsourced. It is a new dimension in...
Popular note-taking productivity app Evernote was hacked yesterday. And the individuals or the group responsible for it were able to gain access to the some information, precisely...
Most of the established businesses (Small, Mid and Large scale) are turning towards and many new startup’s are also relying on right from the planning stages on...