According to many reports in 2015, the growth of mobile malware has slowed. While this is great news to our ears, it shouldn’t escape us that the malware being introduced to the market today is nastier. This year has been relatively calm because the rapidness of mobile malware attacks has gone down. However, according to […]
The Top 10 Weakness Spots Used by Hacking Exploit KitsToo Many websites and apps are vulnerable to be exploited by cyber criminals. According to a recent threat intelligence analysis conducted by Recorded Future comprising of over 100 exploits kits, an incredible discovery was made. While many people are aware that Adobe Flash Player should be labeled as the most exploited product, the magnitude of […]
Cybersecurity Preparedness is Very Gloomy – Pell StudyBroadband communication has in the recent past become very popular. In fact, all the 50 states are investing heavily in this area. However, only 8 states are considered to be well prepared to cope with the cyber espionage threats that already exist as well as those emerging. There is a serious and troubling lack of […]