If you have heard of some news of cyber banking heist that took place in the recent weeks, you might have also probably learned that a hybrid banking Trojan was responsible for the theft that pilfered millions of dollars from the victimized banks.
How to Accept Credit Card on a Mobile Device
Information technology has transformed the way we do business; since you can perform a huge number of functions through a digital device and an Internet connection, tasks that once required specialized equipment can now be carried out by smart devices and other platforms. Credit card payments are one example. If you think your business could […]
Is your Trip Data Safe with Uber?
More often than not, the government is always interested in your data and one way they can gain access to those pieces of information is through the tech companies that collect them. Your trip data is no exception, thanks to Uber which admitted that it recently shared 12 million passenger data with various regulators and […]
Is it Fair to Shame a Cyberbully in Return?
There is a popular maxim that goes to say you cannot correct a mistake by committing another mistake. By the same token, you cannot solve the issue of cyber bullying by committing another cyber bullying.
Why large organizations such as CBS do not actually adopt encryption?
Popular organizations and networks including CBS – because of the sheer size of their company – are expected to embrace best practices when it specifically comes to security. Or perhaps we are only expecting too much from them, because just recently the users of CBS’ sports app were disillusioned when they learned that their personal […]
Fake Adobe Flash Player update tricks Mac users
Apple prides itself in having a robust security infrastructure for customers. But a recent fake Adobe Flash Player update was able to slip past its security radar and infected a number of Mac computers after the users were deceived into believing that the software update came from Adobe itself.