Cisco has issued 41 security advisories in one day, which is reportedly the highest one-day disclosure in at least 12 months. On Wednesday, May 1, 2019, the San Jose-based company…
Read MoreCisco has issued 41 security advisories in one day, which is reportedly the highest one-day disclosure in at least 12 months. On Wednesday, May 1, 2019, the San Jose-based company…
Read MoreSpamming: An introduction Spam is something that all internet users encounter, almost every day. In fact, spamming, which continues despite the existence of anti-spam laws, could turn out to be…
Read MoreMost people who use PCs will be connected to the Internet, in fact, almost everyone has a smartphone, the most personal of all personal computers. This means that many are…
Read MoreCloudflare has announced the release of two new HTTPS interception tools. These tools would help detect if the secure connection to a website has been intercepted in any way. In…
Read MoreF5 Networks acquires rival company NGINX in a deal that’s valued at about $670 million. Software company NGINX, which is behind the popular open-source web server NGINX, powers more than…
Read MoreAs reported in the NY Times, North Korean hackers have targeted American and European businesses for 18 months kept up their attacks last week even as President Trump was meeting…
Read Moreprocedural security is what we call operational security (OPSEC), it is kind of risk management process that encourages admin to monitor operations from the perspective of an adversary, and draw…
Read MoreIf you are using passwords in multiple Web services etc., if that one-and-only password gets leaked, your entire Internet identity and access goes out. Even if all the users dealt…
Read MoreAlmost every business owners are concerned about their IT security, and what they believe is the single risk to their data. It can be virus, ransomware, backup mishap, hard drive…
Read MoreExplaining step by step how a penetration test, or pen-test, helps measure the security of an organization’s IT infrastructure by attempting safe exploitation of vulnerabilities. Know how a penetration test…
Read More