August 19, 2014
2 min ReadHow can Ebola infect your PC?!
In March 2014, the WHO reported a major Ebola outbreak in Guinea, it is the largest ever documented, and the first recorded in the region.
Listen to the latest episode of Guardians of the Enterprise for insights from cyber leaders - click here
August 19, 2014
2 min ReadIn March 2014, the WHO reported a major Ebola outbreak in Guinea, it is the largest ever documented, and the first recorded in the region.
August 18, 2014
3 min ReadAs per the latest report of Net Market Share Google holds, around 68% of Search Engine Market Share followed by Baidu are at 11% and Yahoo at 6.65%. Know more
August 13, 2014
3 min ReadApplication Security Misconfiguration attacks exploit configuration weaknesses found in web applications. Find out how this happens.
August 7, 2014
3 min ReadA Russian gang has stolen 1.2 bn usernames and passwords and this is being quoted as the biggest cyber robbery that anyone has ever witnessed. The News of this discovery.
August 1, 2014
4 min Readby Venkatesh Sundar, Chief Technology Officer, Indusface Web applications frequently redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages. Without proper.
July 28, 2014
3 min ReadMass infection of nearly 50,000 websites has been reported. A recently patched vulnerability in the popular newsletter plug-in MailPoet for WordPress has been cited as the reason behind the hack..
July 25, 2014
3 min ReadThe CISOs are trying their level best to cope with the rising and unique nature of cyber threats. In the present times, each and every CISO conscious of their organization’s.
July 24, 2014
3 min ReadWAF have been a critical part of securing external facing websites for years now. Here are 7 best habits for highly effective WAF.
July 22, 2014
2 min ReadGameover Zeus first appeared in September 2011. FBI had held Gameover Zeus botnet responsible for the theft of more than $100 mn, since then.
July 16, 2014
3 min ReadThe rising trend in cyber-crimes against Indian establishments has urged the Government to toughen its stand. The Centre has ordered security auditing of the entire IT infrastructure of the central.
July 11, 2014
4 min ReadAttackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes using sensitive data exposure.
July 7, 2014
3 min ReadAccording to the recent actions of technology heavy weight Microsoft, if a company operates insecure infrastructure, that is repeatedly used to spread malicious software, they could seize the underlying assets..


Indusface is the only cloud WAAP (WAF) vendor with 100% customer recommendation for 4 consecutive years.
A Customers’ Choice for 2024, 2023 and 2022 - Gartner® Peer Insights™