Attacks & Data Breaches

Top Application Breaches In 2019

“Application breaches every other day” has been the unfortunate reality of 2019. As the year draws to a close, we… Read More

2 months ago

Cyber Security Lessons From Industry Experts

So as internet users, what can we do to prevent online privacy invasion? Here’s what the experts do to practice… Read More

2 years ago

Public Procurement (Preference to Make in India) Order 2018 for Cyber Security Products

The Union Ministry of Electronics & Information Technology (MeitY) has mandated preference to cyber security products from companies incorporated and… Read More

2 years ago

Lessons from Poor Vulnerability Protection by Silicon Valley Companies

Poor standards of vulnerability protection affect more than just the core business. Learn from the top mistakes made by top… Read More

2 years ago

8 Ransomware Protection and Prevention Tips

Ransomworm came into the mainstream when WannaCry’s global hack compromised hundreds of thousands of computers. Victims ranging from individuals to… Read More

3 years ago

Petya Ransomware Attack: Deadlier Than WannaCry?

Dubbed NotPetya because it masquerades as the Petya ransomware, it has already hit more than 2000 computers in a dozen… Read More

3 years ago

3 Ways to Identify and Protect Yourself from Bots

Bot attacks difficult to trace and monitor as they use computing power and resources from trusted networks. Read how they… Read More

3 years ago

WannaCry Ransomware Attack: How to Protect Your Business

WannaCry ransomware attack has crippled both public and private sector. Here’s how you can protect critical files before hackers encrypt… Read More

3 years ago

12 Most Notorious Hacks History

What were the most notorious hacks in history? They’re subject to debate, but we bring you 12 of them, which… Read More

3 years ago