Red Hat acquires Noobaa
Soon after Red Hat’s acquisition by IBM, Red Hat is now acquiring Noobaa. These two moves are related and have been seen as an excellent business strategy, to gain technological ...
Ransomware
Ransomware is a malware designed to block access to a computing system (locking data in that system / threaten to publish the victim’s data) via encryption, until a demanded ...
Agent Tesla
Agent Tesla – a highly effective as well as user-friendly password stealing program which has been built using Microsoft .Net Framework and infected computers since 2014 – has gained popularity ...
National Cyber Security Awareness Month (NCSAM) – October 2018
Since 2004, NCSAM has been observed in the month of October, in the United States of America (USA). NCSAM stands to encourage vigilance and protection by computer users. All of ...
Cyber attack types to watch out for in 2018
Along with quick technical enhancements, security risks are enormous in today’s cyberspace. As per forecasts, worldwide cybercrime rates will cost 2 trillion dollars in 2019. Newer types of security ...
Series on Latest Open Source Technology Trends – Topics 9 & 10
Let’s proceed to the next and, last two topics in this series. Blockchain Blockchain is a distributed digital ledger. Cryptocurrencies work upon blockchain technology. The two types of distributed ...
Series on Latest Open Source Technology Trends – Topics 7 & 8
The next two topics coming in this series – latest open source technology trends – are, ‘Machine learning’ and ‘Cognitive cloud’. Machine learning and AI Machine learning and ‘AI’ ...