Why Blockchain may not be the elixir to internet security Every architect, builder and designer knows that the right tool can solve the most difficult problems in a jiffy but […] Read more
Top 3 cyber security concepts for 2018 Cyber security is taking a new turn every year. Its very crucial to stay updated with the latest cyber security […] Read more
Maintaining Control is vital to Data Protection It is of prime importance to any organization to identify sensitive information and control access to it. Data Protection is […] Read more
Beware of Fake Email IDs A lot of scams are happening via fake email IDs. Whether you are an IT employee, bank employee or a […] Read more
Cyber Security challenges for CXO Technology is evolving rapidly and so are the cyber risks. It is a big responsibility on the shoulders of CXO […] Read more
Internet Explorer Zero-day “Double-kill” A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could […] Read more
Cryptojacking Attack hits Aditya Birla Group A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group […] Read more
ODNS would be an internet security breakthrough The DNS is essentially a phonebook for the Internet’s domain names. When any device makes the first request over the […] Read more
Cyber criminals have discovered a new way to bypass Office 365 Safe Links Microsoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office 365 Safe Links basically curb all the malicious […] Read more
Data hacked during EPFO-Aadhar seeding Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of […] Read more