5.2 C

Stop the social engineering of customers and employees

To prevent fraud, it’s important to understand the social engineering lifecycle and how to stop manipulation of clients and staff.Read more

Small Businesses Tapping COVID-19 Loans Hit with Data Exposure

The SBA said sensitive information about applicants may have been revealed to others applying for disaster loan program funds. Read more

Transform Microsoft Teams meetings with Poly solutions

Poly has introduced room solutions for Microsoft Teams, delivering a clutter-free environment for conference rooms of any size.Read more

Fighting the pandemic: The advancing role of technology

COVID-19 will be a significant catalyst for digital transformation, particularly when it comes to alternatives to personal contact and touch interfaces.Read more

Mineworkers Investment Company invests in local telco

Mining investment firm Mineworkers Investment Company concludes a 25.1% acquisition deal in South African telco DN Invest.Read more

E.U. Authorities Crack Encryption of Massive Criminal and Murder Network

Four-year investigation shuts down EncroChat and busts 746 alleged criminals for planning murders, selling drugs and laundering money. Read more

Latest article

CVE-2020-0107 (android)

In getUiccCardsInfo of PhoneInterfaceManager.java, there is a possible permissions bypass due to improper input validation. This could lead to local information disclosure with no...


Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget. Read more

Web Based Online Hotel Booking System 0.1.0 SQL Injection

Web Based Online Hotel Booking System version 0.1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. Read more