Email:

Phone No.

Whatsapp

Blog

White Hat Hacker Gains Access to Tesla’s Servers and Its Entire Fleet
White Hat Hacker Gains Access to Tesla’s Servers and Its Entire Fleet
White Hat Hacker Gains Access to Tesla’s Servers and Its Entire Fleet
White Hat Hacker Gains Access to Tesla’s Servers and Its Entire Fleet

White Hat Hacker Gains Access to Tesla’s Servers and Its Entire Fleet

White Hat Hacker Gains Access to Tesla’s Servers and Its Entire Fleet Sometimes a story seems too unreal to be true but when it comes to hacks, nothing is impossible. Apparently, a whitehat hacker successfully managed to access Tesla’s internal servers and the firm’s entire fleet. The hack happened back in 2017 and was done

NVIDIA Uses AI to Slash Bandwidth on Video Calls

NVIDIA Uses AI to Slash Bandwidth on Video Calls NVIDIA Research has invented a way to use AI to dramatically reduce video call bandwidth while simultaneously improving quality. What the researchers have achieved has remarkable results: by replacing the traditional h.264 video codec with a neural network, they have managed to reduce the required bandwidth for

Microsoft To Tailor Windows 10 Setups Based On How You Use Your PC

Microsoft To Tailor Windows 10 Setups Based On How You Use Your PC Microsoft will soon offer different installation experiences when setting up Windows 10 based on how you plan on using the computer. As people use Windows 10 in different ways, Microsoft is testing a new setup screen that asks you to indicate how

Microsoft Adds Consent Phishing Protection To Office 365

Microsoft Adds Consent Phishing Protection To Office 365 Microsoft announced that consent phishing protections including OAuth app publisher verification and app consent policies are now generally available in Office 365. These protections are designed to defend Office 365 users from an application-based phishing attack variant known as consent phishing. In this type of phishing attack,

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us