Secure Your Email With DMARC
Thursday, August 24, 2017
Posted by Cyber Security ...
Reader's rate:
0
DMARC, Domain-based Message Authentication, Reporting & Conformance is an email delivery standard that has emerged to improve the trust between sender and receipts of an email.    Email is the main mode of communication these days in every sector. The protocol named SMTP... + continue reading
Bitcoin under attack!!
Thursday, August 24, 2017
Posted by Cyber Security ...
Reader's rate:
0
Bitcoin, is THE most valued crypto currency in the world.  From the time of its inception to the very present day, its value has escalated many folds drawing the attention of millions of investors (and hackers) all over the world. In this “Digital Age”, the “blockchain... + continue reading
Reflected File Download : Discover, Proceed, Remediate
Wednesday, August 23, 2017
Posted by Cyber Security ...
Reader's rate:
0
Attack combining the URL path segments along with web services which are vulnerable to JSONP injection are classed under the Reflected File Download (RFD) attack, where the main target of the JSONP injection is to deliver malware to the end user.   Where to Discover? Mostly APIs... + continue reading
Data compliance audits - Inevitable
Tuesday, August 22, 2017
Posted by Cyber Security ...
Reader's rate:
0
Data Classification is the backbone of security strategy. As it enables an organisation to evaluate its information assets and then plan security investment allocation to prioritised items.   Buoyed by data protection regulations, many organisations have developed data retention,... + continue reading
Defend Yourself : Introduction to Malware and Their Countermeasures
Tuesday, August 22, 2017
Posted by Cyber Security ...
Reader's rate:
0
Although companies worldwide are being placed under immense pressure by an assault of cyber risks like DoS attacks, insider theft of critical information, unauthorized access, unlawful network intrusions etc., At present ‘”Malware” is one of the most common sources of security... + continue reading
Secure Your Email With DMARC
Bitcoin under attack!!
Reflected File Download : Discover, Proceed, Remediate
Data compliance audits - Inevitable
Defend Yourself : Introduction to Malware and Their Countermeasures

Home Page

Security Articles

Secure Your Email With DMARC
5views
reads
5 today
Thursday, 24/08/17 - 0 comment(s)
DMARC, Domain-based Message Authentication, Reporting & Conformance is an email delivery standard that has emerged to improve the trust between sender and receipts of an email. ... + continue reading

Best Practices

524
reads
2 today
Thursday, 09/03/17 - 0 comment(s)
Some of the major data breaches have been carried out by internal users. A couple of examples are Sports Direct in 2017 and Sage in 2016. In fact, a research by Intel Security had estimated that... + continue reading

Security News

Tuesday, 27/06/17
488views
reads
5 today
0 comment(s)
There is another major ransomware attack named "Petya" which is spreading quickly and affecting various countries globally. Ransomware is a malicious malware, which typically restricts... + continue reading

Snippets

Wiper Malware And It’s Evolution as Ransomware
Views:
1,468
reads
7 today
Monday, 27/02/17 - 0 comment(s)
Wiper Malware has been associated with the attacks in 2012 where Shamoon, a wiper malware sample was used to attack a Reputed Saudi oil firm. The infection rendered workstations unusable and... + continue reading

Recent Posts

Secure Your Email With DMARC
Views:
5
reads
5 today
Thursday, 24/08/17 - 0 comment(s)
DMARC, Domain-based Message Authentication, Reporting & Conformance is an email delivery standard that has emerged to improve the trust between sender and receipts of an email. ... + continue reading

This Month Most Popular

DNS Spoofing : How to Protect Your Organization From It?
179views
reads
3 today
Monday, 31/07/17 - 0 comment(s)
When you are accessing a website, your computer uses a DNS server to look up the domain name you are trying to access. The proper term for this process is DNS name resolution where DNS server... + continue reading

Featured Articles

Defend Yourself : Introduction to Malware and Their Countermeasures
Tuesday, 22/08/17
Total views: 52
0 comment(s)
Although companies worldwide are being placed under immense pressure by an assault of cyber risks like DoS attacks, insider theft of critical information, unauthorized access, unlawful network intrusions etc., At present ‘”Malware” is one of the most common sources of security failures at present.   You may have... + continue reading
Underprotected APIs and Associated Risks
Monday, 21/08/17
Total views: 31
0 comment(s)
Similar to the security testing of the web application, penetration testing for APIs in the recent times has formed a different class in itself. Whether it’s visible or not Application Programming Interface (APIs) are a crucial part of every aspect of IT and DevOps. However because APIs do not have UI unlike web applications security... + continue reading
An Awareness: Digitalization going hand in hand with security
Friday, 11/08/17
Total views: 94
0 comment(s)
Most important aspects in today's world are digitalization and security of services and values that we provide to our customers. In this digital transforming phase,   Cybersecurity needs to step up in this race and provide optimized solutions. We are facing greater challenges on levels of security, risk, and compliance. Various... + continue reading
Vulnerable Virtual Machine: A Safe Way to Enhancement Cyber Security Skills
Tuesday, 08/08/17
Total views: 31
0 comment(s)
Now a day’s most of students and professions want to learn cyber security. But problems is that they don’t find any appropriate place where they can practice on cyber security. So that they can test and enhance their security skills. The skills may be related to web application security, network security or another field of cyber... + continue reading