Attacks & Data Breaches

Cyber Security

Cyber Security Lessons From Industry Experts

So as internet users, what can we do to prevent online privacy invasion? Here’s what the experts do to practice responsible web use.

Read More

Security Threats

Public Procurement (Preference to Make in India) Order 2018 for CyberSecurity Products

The Union Ministry of Electronics & Information Technology (MeitY) has mandated preference to cyber security products from companies incorporated and registered in India.

Read More

Lessons from Poor Vulnerability Protection by Silicon Valley Companies

Poor standards of vulnerability protection affect more than just the core business. Learn from the top mistakes made by top companies.

Read More


8 Ransomware Protection and Prevention Tips

Ransomworm came into the mainstream when WannaCry’s global hack compromised hundreds of thousands of computers. Victims ranging from individuals to hospitals to major corporations found themselves locked out of their files and sensitive data.

Read More

Petya Wannacry Malware

Petya Ransomware Attack: Deadlier Than WannaCry?

Dubbed NotPetya because it masquerades as the Petya ransomware, it has already hit more than 2000 computers in a dozen countries.

Read More

Botnet Prevention

3 Ways to Identify and Protect Yourself from Bots

Bot attacks difficult to trace and monitor as they use computing power and resources from trusted networks. Read how they can disrupt your business.

Read More

WannaCry Ransomware Attack

WannaCry Ransomware Attack: How to Protect Your Business

WannaCry ransomware attack has crippled both public and private sector. Here’s how you can protect critical files before hackers encrypt them.

Read More

Hacking History

12 Most Notorious Hacks History

What were the most notorious hacks in history? They’re subject to debate, but we bring you 12 of them, which would be strong candidates for the title.

Read More

Apache Struts Attack

Apache Struts Under Attack- Indusface Securing Customers from Day Zero

A remote code execution flaw was discovered in the widely-used Apache Struts 2 framework. Attackers continue to exploit vulnerable (unpatched) systems.

Read More

Yahoo Data Breach

Yahoo Data Breach: Can It Affect Your Business?

In this recent massive breach, hackers managed to steal email ids, passwords, birthdates and telephone numbers of half a billion users

Read More