Cyware

57 Added | 2 Magazines | 36 Likes | 11 Following | 11 Followers | @Cyware | Cyware is a first-of-its-kind, comprehensive cyber situational awareness platform, designed to help you stay informed about the latest happenings in the cyber world with expertly curated news stories and updates.

9 Ways to Protect an Enterprise Against Ransomware

Unlike the stealthier advanced attacks that can stay undetected on corporate network for months, the impact of ransomware is immediate and intrusive. …

Microsoft Office

InfoSec Community: Here are Five New Year's Resolutions for You

Here are five resolutions that the security community can make. 1) SSO in the cloud: Why not give all employees single sign-on? Don’t forget to …

Infosec

Companies should stop communicating confidential data via emails. Here’s why

Considering the rise in data breaches on companies, and the importance of securing your data; it is necessary organizations establish a secure way of …

Information Systems

Everything you need to know about Legion, the hacker group targeting India

The cyberspace in India is full of buzz at the moment. A hackers group named “Legion” is making headlines after the Rahul Gandhi Twitter hack saga. …

Digital Forensics

Cyware launches cybersecurity tips in five Indian languages

Cyber awareness platform Cyware has launched its new service to educate the Indian public on cyber security through SMS and WhatsApp in five …

323,000 Pieces of Malware Found Daily

According to Kaspersky Lab, the number of new malware files detected by its products in 2016 increased to 323,000 per day. The number of cyberthreats …

Kaspersky Lab

5 Simple Steps to Secure your Web Browser

Did you ever realize that along with securing your devices and network systems, it is critical you also secure your web browser? Your browser is as …

Malware

Planning to Buy a Smart Toy for your Kid this Christmas? Think again

Looking for Christmas gifts for your kids or nieces or nephews? Knit sweaters, mittens and peppermint chocolates are all yesteryear now! For kids who …

Kids

Where Do Cybercriminals Go to Buy Your Stolen Data

With nothing more than a standard Web browser, cybercriminals can find personal, private information all over the public Internet. According to the …

Credit Cards

This is Amazon's Biggest Contribution to Artificial Intelligence So Far

Amazon recently announced three major services that are aimed at making things easier for developers to exploit Artificial Intelligence (AI) …

Privacy Concerns of Threat Intelligence

<i>“It takes more than intelligence to act intelligently.”</i> - Fyodor Dostevsky<p>To avoid security breaches and cyber attacks, it is critical to identify …

Cyber-attacks

​How to check if your Android phone is infected with Gooligan?

Israel based cyber security firm Checkpoint has unearthed a malware named as Gooligan that has been targeting the older versions of Android operating …

Android News

​Cloud Security and IoT Security to dominate coming years, says Intel Report

Intel Security has come out with its report titled “McAfee Labs 2017 Threats Predictions Report”. The report speaks about threat trends that would be …

Internet of Things

How to Know If an App Is Safe to Shop In | Investopedia

By now, many of us know how to recognize phishing scams, phone calls and other hoaxes designed to steal personal information, but how do you know if …

Apps

This is How Hackers are Spending your Money

Cybercrime is actively reaching substantial levels. It is estimated that the cost of cybercrime has reached $126 Billion in 2015 and affected around …

Cybersecurity

3 mistakes you should avoid when shifting to Cloud computing

Ever since Cloud computing has come into the play, the life of the businesses has become easier. Everyday more and more businesses are adopting cloud …

Cloud Computing

Understanding the CIO's Role in Security

The chief information officer’s (CIO) role in security extends beyond managing the systems and processes that run the enterprise. Certainly, it’s …

Cybersecurity in Donald Trump era: What to Expect?

Order an immediate review of all U.S. cyber defenses and vulnerabilities, including critical infrastructure, by a Cyber Review Team of individuals …

Donald Trump

Ransomware Doesn't Have To Mean Game Over

3 methods can help you recover from a ransomware attack relatively unscathed.<p>It’s not difficult to wrap your brain around how ransomware could do …

Malware

Hacker, businessman, government adviser: Black Hat founder Jeff Moss on cybersecurity

IBTimes UK speaks to The Dark Tangent at Black Hat Europe 2016.<p>The origins of Black Hat and Defcon, two influential conferences dedicated to …

10 most wanted malware for September 2016

Israeli cybersecurity firm Check Point has released the list for the September’s most wanted malware. An astonishing feature of this report is that …

Everything We Know About the Cyber Attack That Crippled America's Internet

Friday’s DDoS attack on Dyn’s domain name servers was unprecedented. The attack utilized a botnet made up of “internet of things” (IoT) devices …

12 Hacktivists You Should be Knowing About

Hacktivism, a phenomenon specific to the digital age, represents the subversive use of computers and computer networks. The term was coined by the …

Cyber-attacks

Recover Deleted Data from iPad and iPhone Without Backup

<b>SPONSORED POST</b><p>How to <b>recover</b> <b>deleted</b> <b>photos, videos, messages, WhatsApp, notes from iP</b><b>ad without backup</b><p>Our iPads hold so much data. From Music, photos, videos, contacts, text messages and so much more. As much as we like to store information on our iPads, we also inherently understand that the data …

Data Recovery

Are you a victim of the ATM card breach in India? Read This!

There has been a massive ATM card breach in India with 3.2 million debit card details (card number and pin code) being stolen. The news broke …

Identity Theft