Estimated reading time: 3 minutes
In almost a blink of the eye, the year will be over. In cybersecurity terms though, 2018 could probably be defined as “business as usual”. Cyber threats only increased, there were news of even more daring attacks and cyber...Information Technology, Network Security & Cybersecurity Updates

Estimated reading time: 6 minutes
Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals...
Estimated reading time: 3 minutes
The digital world has opened up a plethora of opportunities for workplaces across the globe. Digital transformation means, among other things, seamless connectivity, the erasure of physical barriers and enterprises that can leverage the freedom of knowledge sharing without...