Cyberattacks are on the rise. The pandemic has been the cause of much disruption to our daily lives and our shift in behavior – in response...
It seems that the two-factor authentications system is not a reliable method that will prevent hackers to sweep into users’ conversations. Recently, Roland Abi Najem, Cybersecurity...
Skybox Security’s publishes mid-year update to its 2020 Vulnerability and Threat Trends Report predicting 2020 will break a new vulnerability record. (July 21, 2020) — Skybox® Security, a global...
TikTok owned by the China-based ByteDance has not accepted to share data with Chinese authorities. However, On July 1, 2020, a new national security law took...
The US has managed to persuade the UK, Canada, and other countries to ban Huawei from the deployment of the 5G network. However, France announced that...
Australians are becoming more and more connected online and the cybersecurity threats are growing dramatically. Cryptomining, Data spill, Denial of service, hacking, identity theft, malware, phishing-scam...
Governments are relying on data-driven technology to help contain the Covid-19 spread. The Tunisian government has been using SIM cards for tracking purposes. Cell site location...
Every person is a victim of a phone scam, even William Webster, the former head of the Federal Bureau of Investigation (FBI). Service providers can sell...
The end-to-end encryption feature is the most interesting tool that users search for when they download a messaging app. However, some government entities have been trying...
What is a cyberattack? It is usually an assault or offensive maneuver launched by cybercriminals using one or more computers against single or multiple computers or...