Application security testing was not a vital part of software development in the early days of computing. In those early days, the most important factor was that the developers meet…
Read MoreApplication security testing was not a vital part of software development in the early days of computing. In those early days, the most important factor was that the developers meet…
Read MoreA Tesla Model S was stolen recently in Essex, England after a pair of thieves hacked the car’s high-tech keyless entry system. The whole incident, however, got recorded on the…
Read MoreJust like the healthcare industry, the financial market players are also a profitable target of cybercriminal elements. The Global DNS Threat Report 2018 by Efficient IP has released a report…
Read MoreAs we use publicly accessible services, whether it is an airline, a bank, or a government transaction – we are at the mercy of their data handling procedures and protocols….
Read MoreThe amount of research that the U.S Department of Homeland Security puts in for combating cybercrimes is stupendous. This research leads to developing technology that’s used in turn to develop…
Read MoreThe world has changed forever at the turn of the century. Vital data that were stored on a physical printed medium and locked in a physical drawer with a key…
Read MoreThe second browser wars is still raging since the release of Firefox in 2002; more browsers entered the mainstream since then. The former browser champion, Internet Explorer has virtually left…
Read MoreThere is a huge difference between an Android antivirus and an Android app that offers vulnerability scans. The former has questionable effectiveness due to the way Google developed Android as…
Read MoreThe cybercriminal elements love old software and outdated platforms. It is their candy store, their toy store, as old outdated software is full of known vulnerabilities which hackers can exploit…
Read More