security

DC Airport nabs first imposter using its newly deployed facial recognition security system

The initial apprehension to having facial recognition technology is beginning to move on to acceptance as the incident at the…

6 years ago

Intel faces backlash on Microcode Patches after it prohibited Benchmarking or Comparison

Intel has introduced microcode updates for mitigating the recently disclosed speculative execution vulnerabilities known as ‘Foreshadow’ a.k.a the L1 Terminal…

6 years ago

Let’s Encrypt SSL/TLS certificates gain the trust of all Major Root Programs

Let's Encrypt is a Certification Authority that enables HTTPS on your website. Initially, major browsers and root certificate programs were,…

6 years ago

Facebook open sources Fizz, the new generation TLS 1.3 Library

Facebook open-sourced a new library Fizz (a TLS 1.3 library) for securing websites against cyberattacks and improving its focus on…

6 years ago

Mozilla’s new Firefox DNS security updates spark privacy hue and cry

Mozilla just upped its security game by introducing two new features to their Firefox browser that they call "DNS over…

6 years ago

Social engineering attacks – things to watch out for while online

The rise in the adoption of the internet is directly proportional to the rise in cybersecurity attacks. We feel that…

6 years ago

Twitter allegedly deleted 70 million fake accounts in an attempt to curb fake news

In the real world, a person having multiple identities is said to have Dissociative identity disorder (DID); but what about…

6 years ago

Top 5 cybersecurity myths debunked

Whether it’s for work or pleasure, we are all spending more time online than ever before. Given how advanced and…

6 years ago

What security and systems specialists are planning to learn in 2018

Developers are always on the verge of learning something new, which can add on to their skill and their experience.…

6 years ago

Phish for passwords using DNS poisoning [Tutorial]

Phishing refers to obtaining sensitive information such as passwords, usernames, or even bank details, and so on. Hackers or attackers…

6 years ago