Security
US warns space industry to be wary of foreign spying
Foreign intelligence entities employ a wide array of tactics to loot research and trade secrets from the American space industry, US counterintelligence agencies have warned.
Read more about US warns space industry to be wary of foreign spying
Four in five IT cybersecurity professionals lack tools to deter threat actors, says analyst
Only a fifth of organizations have robust cybersecurity measures in place, with most IT professionals saying they have barely adequate tools to counter threat actors.
Read more about Four in five IT cybersecurity professionals lack tools to deter threat actors, says analyst
Third of Americans hacked after visiting “sketchy” websites – survey
With 30,000 websites hacked every day on average, a large portion of these cyberattacks happen due to human error, a study shows.
Read more about Third of Americans hacked after visiting “sketchy” websites – survey
Russia bans officials from using iPhones for work
Apple devices are no longer welcome in Russia’s government halls, as the Ministry of Industry and Trade banned government employees from using the US-made devices over fears of spying.
Read more about Russia bans officials from using iPhones for work
Anga Com conference in Germany targeted by hackers
Threat actors impersonated a popular conference in Germany for broadband and media distributors.
Read more about Anga Com conference in Germany targeted by hackers
Attackers impersonate Adobe to extract sensitive credentials
Cybersecurity firm Armorblox said it had stopped an Adobe personification attack that bypassed native Microsoft 365 email security.
Read more about Attackers impersonate Adobe to extract sensitive credentials
Cyber war intensifies as Russia’s aggression in Ukraine continues, researchers find
Modern warfare is waged on multiple fronts simultaneously, including the cyber realm, which is actively exploited by nation-states to cause chaos and disruption.
Read more about Cyber war intensifies as Russia’s aggression in Ukraine continues, researchers find
Costs of cyberattacks rise as ransomware surges, report finds
Ransomware continuously poses a huge risk to businesses, with cyberattack costs still rising in 2022, with no signs of relief for companies in sight.
Read more about Costs of cyberattacks rise as ransomware surges, report finds
80% of US firms have claimed on cyber-insurance, says study
Four in five organizations in the US have already called in their cyber-insurance policies to mitigate an attack or related incident and half have done so multiple times, according to research by Delinea.
Read more about 80% of US firms have claimed on cyber-insurance, says study
What is in the suitcase of a Digital Forensic Expert?
A policeman has his gun and handcuffs with him while attending a crime scene. Likewise, a digital forensics expert has...
Read more about What is in the suitcase of a Digital Forensic Expert?
Top 13 secure email services that will protect your personal information
Emails have been in existence even before the inception of the internet for as far back as the early 80s....
Read more about Top 13 secure email services that will protect your personal information
In-Depth Guide to De-Googling: Delete Google, Gmail, YouTube accounts
Image based on Shutterstock Hello, ladies and gentlemen, and welcome to another CoolTechZone guide! Though our website is mainly dedicated...
Read more about In-Depth Guide to De-Googling: Delete Google, Gmail, YouTube accounts
Comprehensive guide on Internet safety for seniors in 2022
Have you ever been scammed out of hundreds by a stranger on the Internet? Kids too busy to help you...
Read more about Comprehensive guide on Internet safety for seniors in 2022
The enigma & the benefits of the deep web
The Deep web is and always has been an enigma to regular users of the internet. The deep web is...
Read more about The enigma & the benefits of the deep web
All you need about 7 steps of Cyber Kill Chain
Image source - Shutterstock This year began with the promise of a brighter future, but it looks like it will...
Read more about All you need about 7 steps of Cyber Kill Chain
23 DIY privacy and security settings for your Windows
Imagine someone stole your computer and now has access to all your sensitive information just because you weren’t careful enough...
Read more about 23 DIY privacy and security settings for your Windows
Deep dive into OSINT methods, or how do "they" know everything about you?
OSINT, or Open-Source Intelligence, has been around for years, and you, as well as me and probably everyone that has...
Read more about Deep dive into OSINT methods, or how do "they" know everything about you?
Introduction to Identity Management and why it is crucial to protect your digital identity in 2021
Have you ever think that your digital identity will be protected by a third party in 2021? The recent attacks...
Read more about Introduction to Identity Management and why it is crucial to protect your digital identity in 2021
What is HTTPS, and how It relates to TLS and SSL? Does HTTPS really protect you against cyber threats?
Are you also one of those people who think that the green lock in the URL has superpowers to protect...
Read more about What is HTTPS, and how It relates to TLS and SSL? Does HTTPS really protect you against cyber threats?
How to host your own Threat Intelligence server and filling it with data?
Ever received a link through email that took you to a suspicious website? Well, if your answer is No, You...
Read more about How to host your own Threat Intelligence server and filling it with data?