No menu items!

Daniel Sadakov

Daniel Sadakov has a degree in Information Technology and specializes in web and mobile cyber security. He harbors a strong detestation for anything and everything malicious and has committed his resources and time to battling all manners of web and mobile threats. He is a contributar at tripwire.com, a website dedicated to covering the top security stories and providing useful tips for the everyday and expert users.

Cyber Criminals Target a New Weak Spot: Mobile Devices

Cyber Criminals Target a New Weak Spot: Mobile Devices With today’s technology advancing at what seems like light speed, parasitic hackers are easily moving as...

How to Stay Safe from Virtual Swindlers

How to Stay Safe from Virtual Swindlers For those that may not know, there is another term associated with Internet scam artists that has spread...

For Better Security, Don’t Forget the Basics

For Better Security and adware prevention, Don't Forget the Basics With all the talk of security ads by prevention through anti-virus apps, mobile device management...

Trustlook announces its Cloud-based Sandbox Technology, the First APT Security Solution

Trustlook announces its Cloud-based Sandbox Technology, the First APT Security Solution There is a new security company being recognized for its expertise in the next...

Black Hat 2013 Speech by NSA Head Gen. Keith Alexander Leads to Lively Responses

Black Hat 2013 Speech by NSA Head Gen. Keith Alexander Leads to Lively Responses Much of the attention of the Black Hat 2013 cyber-security conference...

Report Shows Decrease in Malware Infections in US and India

Report Shows Decrease in Malware and Ads Infections in US and India The latest mobile security and report from NQ Mobile (News - Alert) reveals very...

Consumers Still Wary of ATM Security

Consumers Still Wary of ATM Mobile Security and malware removal Mobile payment, as the name suggests, is a financial service that enables users to make...

Leaky Apps, Sneaky Trojans, and Other Mobile Threats

Leaky Apps, Sneaky Trojans, Ads by, and Other Mobile Threats The mobile landscape is a surprisingly threatening place, so it's not a surprise to see...

Need for Mobile Security Boosts SiRRAN Secure Mobile Subscriber Growth in Q2

Need for Mobile Security Boosts SiRRAN Secure Mobile Subscriber Growth in Q2 The mobile market surged into the mainstream so quickly that most users, and...

Pentagon’s Untested Mobile Security System Holds No Water for the USDA

Pentagon's Untested Mobile Security System Holds No Water for the USDA Under most normal circumstances, when it comes time to bring in new software just...

Enterprises Need a Tangible Mobile Device Security Plan

Enterprises Need a Tangible Mobile Device Security Plan Large corporations are seeing a huge number of employees wanting to use their own devices or BYODs...

Security Policy in Five Steps

Security Policy in Five Steps The proliferation of bring your own device (BYOD) has brought on a lot of security concerns. Most corporations have not...
spot_img

Popular

Team Fortress 2 on Android

Team Fortress 2 on Android Developed by Valve, Team Fortress...

Forza Horizon 5 on Android

Forza Horizon 5 on Android Forza Horizon 5 is a...

GTA V on Android

GTA V on Android Almost everyone in the gaming community...

Destiny 2 on Android

Destiny 2 on Android Destiny 2 is a dynamic first-person...

Lost Ark on Android

Lost Ark on Android Developed in partnership with Tripod Studio...