© 2022 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.

Security

40% of all received emails are potentially dangerous: report

As email remains the primary mode of communication both for businesses and individual users, cybercriminals are lurking to take advantage...
Read more about 40% of all received emails are potentially dangerous: report

David Putnam, NortonLifeLock: “children and the elderly are among the most vulnerable to identity theft”

As selling and purchasing identities become a thriving market, more providers turn to effectively monitoring the dark web for signs...
Read more about David Putnam, NortonLifeLock: “children and the elderly are among the most vulnerable to identity theft”

Will we work in the Metaverse?

With many of the world's biggest brands rushing to build and stake their claim in the Metaverse, distinguishing the difference...
Read more about Will we work in the Metaverse?

Beenu Arora, Cyble: “2022 might witness a 50% increase in ransomware attacks”

Cybercrime is gaining momentum, with more companies realizing the importance of preventing cyberattacks rather than dealing with their aftermath. Understanding...
Read more about Beenu Arora, Cyble: “2022 might witness a 50% increase in ransomware attacks”

Bugs in 16 popular URL parser libraries could be exploited by hackers

Cybercriminals and hackers are constantly probing and testing defenses in order to try and find a way into systems, from...
Read more about Bugs in 16 popular URL parser libraries could be exploited by hackers

Fran Villalba Segarra, Internxt: “we need an internet that respects the user”

With the introduction of cloud computing services, sharing information has become easier than ever before. But can you be confident...
Read more about Fran Villalba Segarra, Internxt: “we need an internet that respects the user”

John Wu, Gryphon: “connected devices add a door for some hacker to come into your home”

As our lives majorly shift online, new cyber challenges arise: from security risks of connected devices to the lack of...
Read more about John Wu, Gryphon: “connected devices add a door for some hacker to come into your home”

Darren Williams, BlackFog: “hackers will always find a way in”

While some cybersecurity organizations focus on preventing threat actors from forcing their way in, others adopt a different approach. BlackFog,...
Read more about Darren Williams, BlackFog: “hackers will always find a way in”