telehealth

Do Telehealth apps put the security and privacy of medical data at risk?

The hi-tech standards and protections for data are not only required in the telehealth industry but also to other sectors which inculcate such data. Even the patient with chronic diseases is of... Read more »
security-incident

Crypto Exchange KuCoin mega hack, $150M+ worth token stolen

KuCoin cryptocurrency exchange located in Singapore CEO Johnny Lyu confirmed a mega crypto hack attack worth over $150 Million. Read more »
microsoft

Attackers actively Exploiting ZeroLogon Windows Vulnerability

Microsoft is tracking threat actor activity using the CVE-2020–1472 Netlogon EoP vulnerability exploit called Zerologon. They have seen attacks where public vulnerabilities have been inserted into attackers playbooks. According to security industry... Read more »
datasecurity

What is Confidential Computing? Everything you need to know

Confidential computing is a practice in which encrypted data stored in memory to restrict access for the security of the data in use. Confidential computing uses hardware-based techniques to detach data, individual... Read more »
iPhone

New iPhone 12 Release Date, price, specs & many more…

Due to the pandemic, Apple will be releasing the new iPhone 12 Soon. Read more about iPhone 12 Pricing, spec, etc... Read more »
k8s

Kubernetes version 1.19 Released! What’s New?

Kubernetes v1.19 (Accentuate the Paw-sitive) released with 34 enhancements (10 stable, 15 beta, and 9 alpha). Read more to see new features and changes in Kubernetes v1.19 . Read more »
location tracking risks

Location Tracking Risks and Protection

Location Tracking risks and Location tracking prevention best practices. 1. Turn off location services in your device’s settings. 2. Disable wireless radios when you are not using them. Read more »
chatting app

Top 8 Chatting Apps for Android and iOS

Here we explained top 8 chatting apps or messanging apps that encourage you to make conversations very safely and securely. Read more »
The Great Firewall

The Great Firewall of China started blocking ESNI to Censor more content

The Great Firewall of China (GFW) started blocking ESNI — one of the key features of TLS 1.3 and HTTPS. The Chinese government has deployed an upgrade to its Great Firewall (GFW)... Read more »
Exconfidential Lake

Exconfidential Lake – Intel investigating 20GB data leak

Intel data leaked over 20 GB in online file sharing websites like Mega. Intel is investigating a major leak from internal business files. Read more »