Oct 6, 2020 |
Information Security
With privacy becoming an integral part of every organization today, a much more robust approach is needed to handle it. This has resulted in the creation of the ‘Privacy management program,’ which is a much more holistic and unified approach for handling privacy that can be adopted by all organizations, c...
read more
Sep 24, 2020 |
Information Security
The cybersecurity industry has been home to various job roles, and one of them is the 'cybersecurity consultancy.' A cybersecurity consultant builds a secure environment for any organization by being the mind of their security team. If you are someone planning to have a career down this path, here is an overv...
read more
Sep 23, 2020 |
Information Security
The recent digital revolution has brought a significant change to our lifestyle by meeting all our needs at just one click. Cybersecurity is the backbone of this industrial transformation. The surge in the use of smart devices and social media interactions have unveiled many loopholes and vulnerabilities in t...
read more
Aug 20, 2020 |
Information Security
In today's digital world, cyber-attacks are an absolute certainty. While the basic types of attacks are still prevalent, new types of attacks have also metamorphosized, creating more monetary and physical destruction. Here are the Top 10 Cyber Security Attacks that are highly prevalent today.
Brute...
read more
Aug 3, 2020 |
Information Security
With the intention of performing a Bitcoin scam, the twitter handles of 130 high profile people were hacked.
The proceedings of the event began on 15th July 2020 at around 16:00 Hours in the US when attackers hacked and took over control of many high profiles and mostly verified Twitter accounts of those l...
read more
Jul 21, 2020 |
Information Security
The internet and mobile technology rule the world presently. It is practically impossible to achieve any task without the use of these. However, technological advancements always bring some setbacks in the form of security threats. As the number and varieties of cyber security threats increase every day, the ...
read more
Jul 12, 2020 |
Information Security
What is OWASP?
OWASP is the abbreviation of Open Web Application Security Project. It is an online forum which publishes articles, documentations, technologies and tools pertaining to web application security.
How to define OWASP Top 10?
OWASP Top 10 is the most looked up to a list of the top 10 most...
read more
Jun 15, 2020 |
Information Security
‘Endpoint security’, ‘Perimeter security’, ‘Security by obscurity’, ‘Layered security’ – these are some approaches that are present till date to safeguard business and personal networks. In spite of the different approaches, data breaches, ransomware attacks and other novel ways to gain pers...
read more
May 3, 2020 |
Information Security
During these testing times of the COVID-19 pandemic, the international advisory has been issued that asks employees to work from home. This opens the door for possible cyber security threats as lakhs of employees are now working from home due to the lockdown.
Various industry experts have suggested tha...
read more
Apr 21, 2020 |
Information Security
With the Coronovirus pandemic locking almost every state, city and country in the world, professionals from every sector are working from home to achieve their business objectives. ‘Zoom’ the video conferencing software, has been the leader in powering most businesses in this difficult time. ‘Zoom’ ...
read more
Mar 18, 2020 |
Information Security
The outbreak of COVID 19 has made the world standstill. We are all in this together and doing everything possible to get over this situation and stop the further spread of this deadly virus. Organizations around the globe are being sensitive to this situation and therefore, are allowing the employees/students...
read more
Mar 16, 2020 |
Information Security
The world is in the midst of the deadliest Coronavirus pandemic and we can see business slowing, transportation disruptions, schedules being uprooted, educational institutions closing and many other changes in our lives. Even as the nature of crisis is magnanimous and dangerous, there are quite a few who ...
read more
Mar 15, 2020 |
Information Security
Hey guys, I always write articles, share posts from some sites that I follow and find relevant. Among these various experiences that I have been exchanging with professional friends, the question that always comes to mind is:
"Where do I start studying to migrate to safety?"
I decided to write how I...
read more
Jan 25, 2020 |
Information Security
iPhones are more secure than Android phones? Think again… Jeff Bezos, the founder, President and Chief Executive officer of Amazon had his iPhone 10 hacked in 2018 and the details are still being revealed.
Any connected device is vulnerable to a variety of hacks and attacks. With smart phones storing...
read more
Jan 7, 2020 |
Information Security
The New Year is already upon us but who can forget the Capital Data breach, the Canva hack and the various ransomware incidents that shook the various organizations the past year? With so many hacks and attacks in 2019, what can we expect from 2020? Read on to see some of our predictions!
Ransomware ...
read more
Nov 20, 2019 |
Information Security
Close on the heels of the ‘Pegasus’ spyware, the Internet was again abuzz with yet another Whatsapp vulnerability on Monday, 18th November 2019. This time:
Hackers send a specially crafted .mp4 file to a Whatsapp user which could trigger a stack based buffer overflow.
This could enable the hac...
read more
Nov 5, 2019 |
Information Security
It did happen again. Even as most of us were touting Whatsapp to be the most secure messaging platform, another attack on the world’s most popular messanging platform shook everybody…again!
As an introduction, Whatsapp is end-to-end encrypted messaging platform that was supposedly the most secure commu...
read more
Oct 12, 2019 |
Information Security
Security professionals, tasked with protecting the information assets of an organization, typically think of their responsibilities in three realms: confidentiality, integrity, and availability (CIA). The adversaries/attackers, seeking to disrupt an organization’s security, have three corresponding goal...
read more
Sep 29, 2019 |
Information Security
DOS Attack: A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash. In both instances, the DoS attack deprives legitima...
read more
Jul 18, 2019 |
CCSP, CISA, CISSP, CompTIA, Information Security
Imagine what happens when you use an app for fun and it turns out to be saving all your data silently? Even this thought of being vulnerable on this online space gives us a chill. But this is what has been actually discovered being done by the viral Faceapp. Yes! you read it right!
Faceapp is one of the mo...
read more