Penta Security’s

Cybersecurity Blogs

Bringing you the trending topics and news of the IT security industry.

Security Weekly_Ottawa

How Big Data is Transforming the Healthcare Industry

The evolution of healthcare  What comes to mind when…
Cloud Security penta

How Can Hackers Break into Cloud-Locked Phones?

In recent years, both individuals and businesses have been using…
Security Weekly - Israel

[Security Weekly] Personal Information of All 6.5 Million Israeli Voters Exposed

2nd Week of February 2020   1. Personal information of…

The Inexorable Rise of Website Forgery and Tampering Attacks

There were numerous incidents over the past few years where personal…
Blog Banners

To Pay or Not to Pay: A Look at the Economic Impacts of Ransomware

Bitcoin and the rise of ransomware  The birth of Bitcoin…
microsoft logo

So Long, Windows 7!

Microsoft has ended its official support for Windows 7 on 14th…
2019 Q4 EDB Report Banner

Infographic: Security Trends and Risks in the 4th Quarter of 2019

Latest report on web security trend is available! Have a look…

Disclaimer: Unless otherwise noted, Penta Security Systems Inc. is the legal copyright holder of all the material on this blog. Others cannot and should not reprint or publish without Penta Security’s written consent. For inquiries about guest writing or hosting, please contact Penta Security. We reserve the right to change the focus of the blog, shut it down, or chance the terms of use at discretion. All information taken from Penta Security’s cyber security blog and/or applied is at the reader’s own risk. Information is for entertainment and knowledge distribution purposes only. This cyber security blog should not be taken as medical, legal, or other professional advice. Please understand that using any information from the cyber security blog should be done at your own risk. Penta Security does not take any personal or contact information to sell to third-parties. However, we are not liable for the privacy practices of any of our advertisers or blog commentators. When moving from this page to another sponsored page, we are not responsible for any issues. We thank you for your interest in our cyber security blog.