-
3 June 2018How to differentiate rogue URLs from the authentic onesHow can you identify if the domain is authentic or impostor? The answer may depend on your knowledge...
-
31 May 2018Why Blockchain may not be the elixir to internet securityEvery architect, builder and designer knows that the right tool can solve the most difficult problems in a...
-
27 May 2018Top 3 cyber security concepts for 2018Cyber security is taking a new turn every year. Its very crucial to stay updated with the latest...
-
26 May 2018Maintaining Control is vital to Data ProtectionIt is of prime importance to any organization to identify sensitive information and control access to it. Data...
-
23 May 2018Beware of Fake Email IDsA lot of scams are happening via fake email IDs. Whether you are an IT employee, bank employee...
-
19 May 2018Cyber Security challenges for CXOTechnology is evolving rapidly and so are the cyber risks. It is a big responsibility on the shoulders...
-
17 May 2018Internet Explorer Zero-day “Double-kill”A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The...
-
15 May 2018Cryptojacking Attack hits Aditya Birla GroupA big cryptojacking attack took place first time in the country last month. The target was the Aditya...
-
11 May 2018ODNS would be an internet security breakthroughThe DNS is essentially a phonebook for the Internet’s domain names. When any device makes the first request...
-
11 May 2018Cyber criminals have discovered a new way to bypass Office 365 Safe LinksMicrosoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office 365 Safe Links basically curb all...
How to differentiate rogue URLs from the authentic ones
03 Jun 2018