Have you ever wondered that somebody might be watching you through your laptop’s webcam or smartphone’s camera? Or that while your laptop or smartphone stays on, in your bedroom, somebody might be recording your each and every act? Cracking into device cameras has been around ever since they were commercialized. Most of the devices we […]
Mr. Robot: Fsociety deploys ransomware
If you’ve been following the news, you would have come across a term called Ransomware. It is a type of computer virus which uses encryption as a weapon for destruction rather than protection of data. It encrypts files on an infected system and then demands a ransom, from the user of the infected machine, to decrypt […]
7 Cardinal Sins: Password Edition
On a normal day, an average computer user is required to input password to at least five different places (Windows, e-mail, social media, online banking, e-commerce). More often than not these passwords are same and are hardly changed once set. Passwords are the most abused and vulnerable security technology yet they can’t be replaced. They could […]
CISM: Everything You Need to Know
With 11th June, 2016 approaching fast, I am sure many of our aspiring readers would be looking for information on Certified Information Security Manager (CISM) certification. Wouldn’t it be beneficial, in terms of time and effort, if you could get all your questions answered in one place? Wait! You’re at that place already. Given the […]
Make Remote Access Your Ally
Today, every organization, big or small, is looking for a way to increase the productivity of their employees. They offer employees various kinds of flexibility options to help them achieve the much sought after work life balance. One such option is providing remote access to corporate network. Through this functionality employees can access their office […]
Anonymous India Strikes Back
Whether it’s cricket ground or battle-ground, things always heat up when the two sides are India and Pakistan. Off late, they’ve found a new frontier to battle, the cyber-ground. Both the nations have been in the state of unofficial cyber-warfare since 2010 and it doesn’t seem to end any time soon. Yesterday, a Pakistani hacker by […]
Safety Tips for Your Mobile Devices
That smartphone in your pocket – or your tablet or laptop – contains significant information about you and your friends and family – contact numbers, photos, location and more. Your mobile devices need to be protected. Take the following security precautions and enjoy the conveniences of technology with peace of mind while you are on […]
Updated: Comments on Draft National Encryption Policy
Imagine, the Government issues a policy which states that you may lock your house but you have to leave the keys outside the house, at all times. The Government appointed officials may then at any time visit your house to see what’s going on inside. You have no choice but to comply. What would your […]
Cyber Security Awareness 2.0
When dealing with Cyber Security, it is often said that people are the weakest links. One vulnerable and gullible employee is all it takes to infiltrate into the company network. However, cyber security managers need to ask themselves this question, are people really the problem here? The challenge for cyber security managers is that they […]
YCSC QnA with Keith Pradeep Fernandez
About Keith Pradeep Fernandez Keith, CIPP/IT, CISSP, CISA, CISP, is a seasoned Security and Privacy Professional with a rich experience of over 15+ years in various geographies (US, Australia, Middle East, India) and industries like IT Consulting, Internet and telecom Service Providers and software development firms including a fortune 500 client. He is currently working as […]
- « Previous Page
- 1
- …
- 4
- 5
- 6
- 7
- 8
- Next Page »