Thursday, September 21, 2017
Posted by Cyber Security ...
Reader's rate:
0
With the rapid growth of technology in the Digital World, the number of cybersecurity breaches has grown proportionately or even more. The year 2017 has witnessed numerous ransomware and malware attacks across the world so far. The new malware “Xafecopy Trojan” which steals money... + continue reading
 How to be safe with IoT?
Thursday, September 14, 2017
Posted by Cyber Security ...
Reader's rate:
0
IOT device defines as any object connected to the internet. Examples include TV, Smart cars, Cameras, Door locks (including ones with Bluetooth), Medical Devices, Lights, Fitness Bands., Washing Machines, Coffee Maker, Other Daily appliances. Basically, if you have any home appliance is... + continue reading
Thursday, September 14, 2017
Posted by Cyber Security ...
Reader's rate:
0
Is your application deployed on multiple data centers to allow high availability of the application and minimize any kind of outage (planned/unplanned) any impact on end users?   Do you think this is enough?   Are the users still complaining of abrupt & forceful... + continue reading
Browsers And Their Security Features
Monday, September 11, 2017
Posted by Cyber Security ...
Reader's rate:
4
Through Browsers, we can get access to the information and data resources which are available on the internet. A browser allows users to explore various things available on the internet like web pages, videos, games, music etc. Due to digitization across all spheres around us, almost everything... + continue reading
Thursday, September 7, 2017
Posted by Cyber Security ...
Reader's rate:
0
Web-based applications rely on the HTTPS protocol to guarantee privacy and security in transactions ranging from home banking, e-commerce, and e-procurement to those that deal with sensitive data such as career and identity information. Users trust this protocol to prevent unauthorized viewing... + continue reading
 How to be safe with IoT?
Browsers And Their Security Features

Home Page

Security Articles

 How to be safe with IoT?
83views
reads
1 today
Thursday, 14/09/17 - 0 comment(s)
IOT device defines as any object connected to the internet. Examples include TV, Smart cars, Cameras, Door locks (including ones with Bluetooth), Medical Devices, Lights, Fitness Bands., Washing... + continue reading

Best Practices

630
reads
1 today
Thursday, 09/03/17 - 0 comment(s)
Some of the major data breaches have been carried out by internal users. A couple of examples are Sports Direct in 2017 and Sage in 2016. In fact, a research by Intel Security had estimated that... + continue reading

Security News

Thursday, 21/09/17
24views
reads
10 today
0 comment(s)
With the rapid growth of technology in the Digital World, the number of cybersecurity breaches has grown proportionately or even more. The year 2017 has witnessed numerous ransomware and malware... + continue reading

Snippets

Wiper Malware And It’s Evolution as Ransomware
Views:
1,590
reads
2 today
Monday, 27/02/17 - 0 comment(s)
Wiper Malware has been associated with the attacks in 2012 where Shamoon, a wiper malware sample was used to attack a Reputed Saudi oil firm. The infection rendered workstations unusable and... + continue reading

Recent Posts

Views:
24
reads
10 today
Thursday, 21/09/17 - 0 comment(s)
With the rapid growth of technology in the Digital World, the number of cybersecurity breaches has grown proportionately or even more. The year 2017 has witnessed numerous ransomware and malware... + continue reading

This Month Most Popular

Secure Your Email With DMARC
213views
reads
2 today
Thursday, 24/08/17 - 0 comment(s)
DMARC, Domain-based Message Authentication, Reporting & Conformance is an email delivery standard that has emerged to improve the trust between sender and receipts of an email. ... + continue reading

Featured Articles

Thursday, 21/09/17
Total views: 24
0 comment(s)
With the rapid growth of technology in the Digital World, the number of cybersecurity breaches has grown proportionately or even more. The year 2017 has witnessed numerous ransomware and malware attacks across the world so far. The new malware “Xafecopy Trojan” which steals money from mobile phone users has been recently detected by... + continue reading
 How to be safe with IoT?
Thursday, 14/09/17
Total views: 83
0 comment(s)
IOT device defines as any object connected to the internet. Examples include TV, Smart cars, Cameras, Door locks (including ones with Bluetooth), Medical Devices, Lights, Fitness Bands., Washing Machines, Coffee Maker, Other Daily appliances. Basically, if you have any home appliance is connected to the Internet connection, and then it becomes... + continue reading
Thursday, 14/09/17
Total views: 76
0 comment(s)
Is your application deployed on multiple data centers to allow high availability of the application and minimize any kind of outage (planned/unplanned) any impact on end users?   Do you think this is enough?   Are the users still complaining of abrupt & forceful session expiry?   Are you struggling to... + continue reading
Browsers And Their Security Features
Monday, 11/09/17
Total views: 80
0 comment(s)
Through Browsers, we can get access to the information and data resources which are available on the internet. A browser allows users to explore various things available on the internet like web pages, videos, games, music etc. Due to digitization across all spheres around us, almost everything, like financial services, social networking, and... + continue reading