Recent Security News

  • US Government Releases Anti-Phishing Guidance

    October 19, 2023 at 08:42AM The US cybersecurity agency CISA, along with the NSA, FBI, and MS-ISAC, has released a joint guide on phishing techniques. Threat actors use social engineering to trick victims into revealing their credentials or visiting malicious websites. To mitigate credential theft phishing, organizations are advised to implement strong multi-factor authentication and…

    Read More

  • Google Play Protect Gets Real-Time Code Scanning

    October 19, 2023 at 08:42AM Google has introduced enhanced malware protection for all Android devices with Google Play Services. Its built-in security feature, Google Play Protect, scans over 100 billion applications daily to prevent malware and unwanted apps from reaching Android devices. The new update includes real-time scanning at the code level, providing additional security…

    Read More

  • October Cybersecurity Awareness Month to target internal security risks

    October 19, 2023 at 08:41AM Infosec experts warn that organizations that neglect internal employees’ vulnerabilities in their IT security strategy are exposing themselves to catastrophic dangers. A report by Gartner predicts that by 2025, lack of talent or human error will be responsible for more than half of significant cyber incidents. To combat this, the…

    Read More

  • WhatsApp gets support for multiple accounts on the same phone

    October 19, 2023 at 08:17AM Meta recently introduced support for multiple WhatsApp accounts on the same device. Users can now switch between accounts without logging out, carrying two phones, or worrying about messaging from the wrong place. To set up an additional account, users need a second phone number, SIM card, or a device with…

    Read More

  • Vulnerability Scanning: How Often Should I Scan?

    October 19, 2023 at 08:15AM Organizations are realizing the importance of continuous vulnerability scanning due to the narrow time between vulnerability discovery and exploitation by hackers. One-off or periodic scans provide a point-in-time snapshot of vulnerabilities but may leave businesses exposed to new vulnerabilities. Continuous scanning allows for 24/7 monitoring and faster identification and resolution…

    Read More