Spamming: An introduction Spam is something that all internet users encounter, almost every day. In fact, spamming, which continues despite the existence of anti-spam laws, could turn out to be…
Read MoreSpamming: An introduction Spam is something that all internet users encounter, almost every day. In fact, spamming, which continues despite the existence of anti-spam laws, could turn out to be…
Read MoreA firewall is a must for protecting any system or network against security threats and attacks. A firewall, as we know, protects systems and networks by establishing a barrier between…
Read MoreThe CISO (Chief Information Security Officer) has got a very important role to play in any organization today. The CISO’s job becomes challenging, difficult and more crucial whenever there is…
Read MoreFor any enterprise today, a DDoS (Distributed Denial of Service) attack could mean a real headache. Such an attack could throw out of gear all business activities and all operations…
Read MoreBitSight, a cybersecurity consulting firm has released its latest issue of the “Third-Party Cyber Risks For Financial Services” series, with the April 2019 issue focusing on the blind spots in…
Read MoreWith malware infestation, data breaches allegedly caused by state-funded actors and phishing attacks becoming headlines in both mainstream media and tech news sites, it is still not the main cause…
Read MoreOnce again Toyota Motor Corporation reported its second data breach. The first attack was in February, and it’s not clear whether the two incidents are related. The latest incident, revealed…
Read MoreAs hackers perform their campaigns, they continue to evolve their techniques by testing their attacks against a real-world target. This way they can further improvise their methodology and verify the…
Read MoreAs the world is anticipating with the roll-out of 5G technology, which is promising to change how we deal with the mobile Internet, the intensity of Anti-Huawei propaganda has reached…
Read MoreA typical antivirus products and End Point services today generally speaking comes with two ways of detecting malware: Signature-based Heuristics The signature-based antivirus has evolved since the days of the…
Read More