Email Marketing Firm Mailchimp Targeted by Hackers
Hackers stole data from more than 100 clients of email marketing firm Mailchimp after breaking into the services and used the data to launch phishing attacks against users of cryptocurrency…
Hackers stole data from more than 100 clients of email marketing firm Mailchimp after breaking into the services and used the data to launch phishing attacks against users of cryptocurrency…
By Harish Kumar, Head, Enterprise & Government, Check Point Software Technologies, India & SAARC If the past year has taught businesses anything, it’s that the impact of targeted cyberattacks and…
Zyxel, a networking equipment manufacturer, has released security fixes for critical vulnerability that affects some of its business firewall and VPN products that could allow an attacker to gain control…
The software and technology industry celebrates World Backup Day on March 31 every year. This day marks the significance of data backup for businesses and organisations worldwide. World Backup Day:…
Just over one in five employees believe their employer is preparing them for a more data-oriented and automated workplace (21%), according to new research from Qlik , a leader in…
By Rajarshi Bhattacharyya, Chairman and Managing Director, ProcessIT Global Soaring security incidents across industries are mainly due to unauthorised access by cybercriminals to the business organisation’s network, data, applications or devices.…
By Jayakrishnan T, IEEE Senior Member Over the past few decades, technology has changed the ways we live and work, one innovation at a time. With self-driving cars, intelligent digital…
Business decision makers and knowledge workers in India agree that close to 60% of the data their company uses on a day-to-day basis should be focused on doing good for…
By Harikrishna Prabhu, COO, TechnoBind Digitisation has penetrated all areas of the modern world. Authentication is a key facilitator that contributes to maintaining the security aspects of the digitisation process.…
Business email compromise (BEC) attacks have not engendered the same level of notoriety as ransomware attacks but rank in combination as one of the most financially devastating and common types…
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More