× Business
TelecomHealthcareDigital MarketingERPRetailMedia and EntertainmentOil and GasFood and BeveragesMarketing and AdvertisingBanking and Insurance
Technology
Big DataCloudIT ServiceSoftwareMobileSecurityNetworkingStorageCyber SecuritySAPData AnalysisloTBio Tech
Platform
Cisco DATABASE Google IBM Juniper Microsoft M2M Oracle Red hat Saas SYMANTEC
Leadership
CEO ReviewCMO ReviewCFO ReviewCompany Review
Magazines
US INDIA ASIA ARCHIVE
Startups Opinion Yearbook Readers Speak Contact Us

CYBER SECURITY 

FEATURED

Hackers Attacked the Winter Olympics and Tired To Disrupt the Opening Ceremony

While everything appeared to have gone without a speck of problem in the opening ceremony of Winter Olympics at PyeongChang, this was far from the truth. Organisers of the PyeongChang games admi...  Read More

siliconreview-olympics-opening-ceremony-hacked-

TRENDING


NEWS

siliconreview-imgur-data-breach

Were you an Imgur user in 2014? If yes, then you might want to consider changing your password

Imgur, the popular photo sharing site witnessed a data breach in 2014 affecting e-mail addresses and passwords of approximately 1.7 million users. But the company doesn’t see...   Read More

siliconreview-russian-hackers-plan

FBI failed to inform the US officials about the Russian hackers plan

A secret investigation has found that FBI has failed to notify the US officials about the Russian hackers plan to break into their personal Gmail accounts. The Federal Bureau of In...   Read More

siliconreview-modernizing-cyber-security

“The majority of our assets and our secret sauce is in Jabil’s operations,” says Graham

In order to modernize the cyber security infrastructure Jabil partners with Digital Guardian, the only data-centric security platform designed to stop data theft. Jabil is a $19 bi...   Read More

siliconreview-masergy-representation-at-wsf

Masergy Cyber Security announces the company’s representation in WSF

Masergy began disrupting the enterprise IT ecosystem in 2001 with a series of innovative approaches to managed networking and we continue to be on the forefront of key drivers that...   Read More

siliconreview-androidos-zinu

Dirty Cow exploited by ZNIU: The first malware family to exploit the vulnerability on the Android platform

Almost after a year the disclosure of the Linux vulnerability, it is getting exploited by cybercriminals against Android users. The vulnerability is none other than the Dirty COW. ...   Read More

siliconreview-unique-heart-password

How about using your heart as your password

It’s high time to drop authentication systems like fingerprint authentication, retinal scanning, and even the all new Apple’s iPhone X face recognition. All these biome...   Read More

siliconreview-worst-data-breach-till-date

The creepiest data breach till date: Passwords of 540,000 Car Tracking Devices Leaked Online

Data breaches have become so common these days that every single day we get news about a data breach. We have seen data breaches from big to small, from dangerous to embarrassing, ...   Read More

siliconreview-compromised-linux-based-iot-devices

Linux using compromised Linux-based IoT devices to send spam emails

Security on Linux based devices is a myth. Botnets, like Mirai, that are capable of infecting Linux-based IoT devices are rapidly increasing and are mainly designed to perform Dist...   Read More

siliconreview-the-infamous-spyware-finspy-is-back-in-action-with-yet-another-distribution-campaign

The infamous spyware ‘FinSpy’ is back in action with yet another distribution campaign

Malware distribution campaigns are increasing at a rapid speed all over the internet. Another fatal malware distribution has been tracked down by the security researchers. The dist...   Read More

siliconreview-the-ill-famed-european-group-of-hackers-dragonfly-is-back-with-another-campaign-dragonfly-2-0

The ill-famed European group of hackers ‘Dragonfly’ is back with another campaign: ‘Dragonfly 2.0’

The days are gone when cyber criminals used to target only computer systems to unfurl malwares. Hacking and taking down computer systems has become too mainstream for the hacking g...   Read More


YOU MIGHT ALSO LIKE::

ENROLL FOR UPCOMING ISSUE