Why Antivirus and Firewalls Aren’t Enough Protection Against Malware
Antivirus and firewalls are the backbone of any security program, used to gain visibility across the network for inward attacks.Read more.
How information outsourced by corporations lands with fraudsters
The recent unearthing of a pretend center that targeted Flipkart and Myntra customers has yet again dropped at fore theRead more.
Smartphone’s hotspots of cyber-attacks in India:
If you thought only large critical infrastructure and big corporations would always bear the strength of the increase in cyber-attacks,Read more.
Mobile Apps – Implicit Trust, Actual Risk.
Mobile apps that exhibit malicious or undesirable behavior square measure out there looking for victims. In December 2018, Google deletedRead more.
Understanding the info Protection Bill
The Bill is probably going to impact national and International Corporation’s operative in India as a result of its dataRead more.
‘Ransomware attacks to morph into 2-stage extortion campaigns’
Ransomware attacks are set to morph into two-stage extortion campaigns and criminals will exploit their extortion victims even more inRead more.
Multiple vulnerabilities found in the Cobham EXPLORER 710 satcom terminal
Overview CERT/CC researchers examined the satcom terminal Cobham EXPLORER 710 as an expansion of work from IOActive’s findings in 2014. They discoveredRead more.
iTerm2 with tmux integration is vulnerable to remote command execution
Overview iTerm2, up to and including version 3.3.5, with tmux integration is vulnerable to remote command execution. Description iTerm2 isRead more.
Pulse Secure VPN contains multiple vulnerabilities
Overview Pulse Secure SSL VPN contains multiple vulnerabilities that can allow remote unauthenticated remote attacker to compromise the VPN serverRead more.
Multiple D-Link routers vulnerable to remote command execution
Overview Multiple D-Link routers are vulnerable to unauthenticated remote command execution. Description Several D-Link routers contain CGI capability that is exposed toRead more.