Secure Your Email With DMARC
Thursday, August 24, 2017
Posted by Cyber Security ...
Reader's rate:
0
DMARC, Domain-based Message Authentication, Reporting & Conformance is an email delivery standard that has emerged to improve the trust between sender and receipts of an email.    Email is the main mode of communication these days in every sector. The protocol named SMTP... + continue reading
Bitcoin under attack!!
Thursday, August 24, 2017
Posted by Cyber Security ...
Reader's rate:
0
Bitcoin, is THE most valued crypto currency in the world.  From the time of its inception to the very present day, its value has escalated many folds drawing the attention of millions of investors (and hackers) all over the world. In this “Digital Age”, the “blockchain... + continue reading
Reflected File Download : Discover, Proceed, Remediate
Wednesday, August 23, 2017
Posted by Cyber Security ...
Reader's rate:
0
Attack combining the URL path segments along with web services which are vulnerable to JSONP injection are classed under the Reflected File Download (RFD) attack, where the main target of the JSONP injection is to deliver malware to the end user.   Where to Discover? Mostly APIs... + continue reading
Data compliance audits - Inevitable
Tuesday, August 22, 2017
Posted by Cyber Security ...
Reader's rate:
0
Data Classification is the backbone of security strategy. As it enables an organisation to evaluate its information assets and then plan security investment allocation to prioritised items.   Buoyed by data protection regulations, many organisations have developed data retention,... + continue reading
Defend Yourself : Introduction to Malware and Their Countermeasures
Tuesday, August 22, 2017
Posted by Cyber Security ...
Reader's rate:
0
Although companies worldwide are being placed under immense pressure by an assault of cyber risks like DoS attacks, insider theft of critical information, unauthorized access, unlawful network intrusions etc., At present ‘”Malware” is one of the most common sources of security... + continue reading
Secure Your Email With DMARC
Bitcoin under attack!!
Reflected File Download : Discover, Proceed, Remediate
Data compliance audits - Inevitable
Defend Yourself : Introduction to Malware and Their Countermeasures

Home Page

Security Articles

Secure Your Email With DMARC
3views
reads
3 today
Thursday, 24/08/17 - 0 comment(s)
DMARC, Domain-based Message Authentication, Reporting & Conformance is an email delivery standard that has emerged to improve the trust between sender and receipts of an email. ... + continue reading

Best Practices

524
reads
2 today
Thursday, 09/03/17 - 0 comment(s)
Some of the major data breaches have been carried out by internal users. A couple of examples are Sports Direct in 2017 and Sage in 2016. In fact, a research by Intel Security had estimated that... + continue reading

Security News

Tuesday, 27/06/17
488views
reads
5 today
0 comment(s)
There is another major ransomware attack named "Petya" which is spreading quickly and affecting various countries globally. Ransomware is a malicious malware, which typically restricts... + continue reading

Snippets

Wiper Malware And It’s Evolution as Ransomware
Views:
1,468
reads
7 today
Monday, 27/02/17 - 0 comment(s)
Wiper Malware has been associated with the attacks in 2012 where Shamoon, a wiper malware sample was used to attack a Reputed Saudi oil firm. The infection rendered workstations unusable and... + continue reading

Recent Posts

Secure Your Email With DMARC
Views:
3
reads
3 today
Thursday, 24/08/17 - 0 comment(s)
DMARC, Domain-based Message Authentication, Reporting & Conformance is an email delivery standard that has emerged to improve the trust between sender and receipts of an email. ... + continue reading

This Month Most Popular

DNS Spoofing : How to Protect Your Organization From It?
179views
reads
3 today
Monday, 31/07/17 - 0 comment(s)
When you are accessing a website, your computer uses a DNS server to look up the domain name you are trying to access. The proper term for this process is DNS name resolution where DNS server... + continue reading

Featured Articles

Secure Your Email With DMARC
Thursday, 24/08/17
Total views: 3
0 comment(s)
DMARC, Domain-based Message Authentication, Reporting & Conformance is an email delivery standard that has emerged to improve the trust between sender and receipts of an email.    Email is the main mode of communication these days in every sector. The protocol named SMTP which stands for Simple Mail Transport Protocol is... + continue reading
Bitcoin under attack!!
Thursday, 24/08/17
Total views: 6
0 comment(s)
Bitcoin, is THE most valued crypto currency in the world.  From the time of its inception to the very present day, its value has escalated many folds drawing the attention of millions of investors (and hackers) all over the world. In this “Digital Age”, the “blockchain” revolution is changing the very nature of... + continue reading
Reflected File Download : Discover, Proceed, Remediate
Wednesday, 23/08/17
Total views: 21
0 comment(s)
Attack combining the URL path segments along with web services which are vulnerable to JSONP injection are classed under the Reflected File Download (RFD) attack, where the main target of the JSONP injection is to deliver malware to the end user.   Where to Discover? Mostly APIs like JSON and JSONP are the real threat to RFD... + continue reading
Data compliance audits - Inevitable
Tuesday, 22/08/17
Total views: 34
0 comment(s)
Data Classification is the backbone of security strategy. As it enables an organisation to evaluate its information assets and then plan security investment allocation to prioritised items.   Buoyed by data protection regulations, many organisations have developed data retention, archival and deletion programs. These programs... + continue reading