Ethical Hackers Hacked Samsung Galaxy S9, iPhone X

Group of White hat hackers compromised Samsung Galaxy S9, iPhone X, and the Xiaomi Mi6 and earned $325,000 in Pwn2Own, two days Hacking completion in Tokyo 2018 organized by Trend Micro’s Zero Day Initiative (ZDI). They discovered 18 Zero-day vulnerabilities… Continue Reading…


The IoT Attacks Everyone Should Know About

This piece is part 2 of our ongoing series on IoT security. Read part 1 here. Don’t forget to download the eBook to understand the IoT security gap and how your business needs to address it, today.


5 Ways to Beat Slotomania

The app Slotomania has a variety of different machines you can choose to play. The machines are free, if you spin long enough. Although some need you to in-app purchase them. In turn, purchasing coins will make the process faster by.… Continue Reading…


5 Great Games For Kids To Play While Travelling

(Slovak translation at bottom, Slovenský preklad dole) For those who have kids know all too well travelling by car, plane or anywhere in between can be less than relaxing.  Some of us grew up playing Eye-spy or counting mile markers to… bisinuation


How Raiffeisen Italy Achieved PSD2 Compliance with Mobile Authentication & Mobile App Shielding

Raiffeisen Italy is the umbrella organization for 40 entities of Raiffeisen Bank in the Italian province of South Tyrol. Overseeing the IT services for these member banks, Raiffeisen Information System CIO Alexander Kiesswetter modernized Raiffeisen Italy’s authentication system to comply… cuprene


(706) 286-2524

Cathay Pacific limited suffered a major data breach that affected more than 9.4 million passengers personal data. According to Cathay Pacific, the following data are details accessed by hackers such as passenger name, nationality, date of birth, phone number, email,… (573) 732-7309


What Makes the IoT so Vulnerable to Attack?

This piece is part 3 of our ongoing series on IoT security. Don’t forget to download the eBook to understand the IoT security gap and how your business needs to address it, today.


Who is Responsible for IoT Security?

This piece is part 4 of our ongoing series on IoT security. Don’t forget to download the ebook to understand the IoT security gap and how your business needs to address it, today.


Intelligent Adaptive Authentication: How 6 Workflow Steps Improve Customer Experience

  Adaptive authentication represents the cutting-edge of authentication technology, and Intelligent Adaptive Authentication (IAA) sits at the forefront. It allows financial institutions (FIs) to break the balancing act between mitigating fraud and encouraging growth. Fraud mitigation has traditionally been perceived… 3308032867


More Sophisticated Phishing Campaign Delivers URSNIF Malware

A new more sophisticated phishing campaign uses hijacked email accounts to deliver malware as a part of the response to the existing the email thread. The malicious campaign primarily targets the education, financial, and energy sectors, some industries such as… 9703818950


(787) 272-9906