Category: Security

Penetration Testing

Why should Penetration Testing be conducted frequently?

The popularity of cloud computing and BYOD really brought information security to the forefront. The intruders also got smarter and...

Vulnerability Assessment

What is Vulnerability Assessment?

Vulnerability Assessment is also sometimes referred to as Vulnerability Analysis. Vulnerability Assessment is a part of...

RSA- Identity and access management vendor

Identity and Access Management explained in detail

IAM is an acronym for Identity and Access Management. Identity and Access Management is an information security framework which...

password security with password managers

Why need password managers? Here are some highly compelling reasons

People had Yahoo and Hotmail account during the initial days of the early 2000’s when people were exposed to Internet. Very...

password authentication

12 Password Managers List Compilation. One Password to Rule them all

The more online accounts you have, the more you become a slave of the constant password management of each for all your accounts....

security risk image

20 BYOD Security risks your enterprise is facing Right Now!

Preface Back in October 2014, Gartner said in one of their reports that 40 Percent of U.S. Employees of Large Enterprises Use...

Cloud based security

Why businesses need to know about Identity and Access Management Solutions

One of the most growing concerns for any organization in the security sector is Identity and Access Management. According to CEO...

Email Hack

In a 1 Billion Email address hack attack, US Courts indicts 2 Vietnamese men

In what appears to be one of the most shocking hack attacks to have taken place, two Vietnamese men have been indicted by the US...

facebook on phone

Facebook fixed 61 high severity bugs in 2014, paid $1.3 million to 321 researchers

In its latest Bug Bounty Program report, Facebook has confirmed that it has fixed 61 eligible bugs which were categorized as High...

Line mobile messaging application

30 Million Thailand Line app users being monitored, claims Thai govt

  Free mobile messaging apps like WhatsApp, Viber, Tango and Line regularly receive requests from various countries every year...

Biometric authentication via Fingerprint

McAfee wants to replace Password with Biometric in its next security solution

Intel is reportedly working on Biometric technology in a software which it hopes will replace the use of passwords. The software...

A note with word privacy highlighted

Information Security: A highly underrated subject amongst teenagers

Walk in to a group of teenagers or youngsters today, you will notice atleast one of them who is disinterested in the ongoing...

Zero day exploit found in Internet Explorer

Yet another Zero Day Exploit targets Internet Explorer, Microsoft working on it

Update (5th April, 2014) – Microsoft provided a patch last week for all the Windows versions, in order to fix the issue ....

Starbucks coffee mug

Starbucks app found to store ID & Passwords in clear text; rolls out update

Starbucks found itself embroiled in a controversy this week after a surprising revelation by a security researcher claiming that...

Target’s situation intensifies as ongoing investigations uncovers 70 million records stolen

Situation for Target got from bad to worse over the weekend during the ongoing forensic investigation. New information came to...

online banking security

Security Research firm says SMS passcodes unreliable for verification

A new report released by NSS Labs, a security research and advisory company says Banks need to be more careful in authenticating...

InfoSec image photo by FutUndBeidl/flickr

Botnet was used to steal credentials from 2 million accounts globally

In the latest information security attack news, approximately 2 million accounts have been compromised. A Botnet using software...

Twitter, one of the most famous social networks today also implemented Forward Secrecy

Twitter enables Forward Secrecy, makes decrypting data more difficult for eavesdroppers

Twitter just enhanced its security a bit further today enabling Forward Secrecy for traffic on twitter.com , api.twitter.com and...

Office 365 security gets a security upgrade

Office 365 Message Encryption allows sending encrypted emails out of company, to be available in early 2014

Microsoft announced yesterday they are bringing additional level of security to Office 365 early next year. This new service is...

Cloud Security, an interesting debate

Cloud Security : Is it really just is Myth?

  The era we live in today is beginning to be called as the Cloud Computing era despite that fact that it was actually...