Terrorism has driven many governments into self-defense mode, which often results in the most extreme policy decisions. A recent example can be found in the…
Google Fixes Unicode Vulnerability in Chrome 58
When technologies touch and encompass the whole world, they pose challenges in integrating the vast amount of languages, mainstream and regional alike. While English is…
Hajime Malware Competes with Mirai Botnets for Control of IOT Devices
A battle is raging between the Hajime and Mirai malware for control and enslavement of IoT devices. The Hajime malware has likely been created by…
Experts Expect an Increase in UAE Cyber Attacks
If the experts in online security are to be believed, UAE could witness scenes resembling a typical Die Hard movie sequel. In a recent report,…
ISOC and OTA Join Forces to Improve Internet Security
The issue of internet security has taken center stage in recent years largely due to an increase in the number and the overall sophistication of…
How To Remove a Resident Virus from Your Computer
A resident virus is a type of virus that remains in a device’s memory following the initialization of the malware code. It is also referred…
