The popularity of cloud computing and BYOD really brought information security to the forefront. The intruders also got smarter and more intelligent in finding new ways and...
Vulnerability Assessment is also sometimes referred to as Vulnerability Analysis. Vulnerability Assessment is a part of vulnerability testing also known as VAPT. VAPT comprises of Vulnerability Assessment...
IAM is an acronym for Identity and Access Management. Identity and Access Management is an information security framework which focuses on the security of the digital identities...
People had Yahoo and Hotmail account during the initial days of the early 2000’s when people were exposed to Internet. Very few number of people used any...
The more online accounts you have, the more you become a slave of the constant password management of each for all your accounts. Every now and then...
Preface Back in October 2014, Gartner said in one of their reports that 40 Percent of U.S. Employees of Large Enterprises Use Personally Owned Devices for Work; and according...
One of the most growing concerns for any organization in the security sector is Identity and Access Management. According to CEO & Chairman Nelson Cicchitto of Avatier...
In its latest Bug Bounty Program report, Facebook has confirmed that it has fixed 61 eligible bugs which were categorized as High Severity, which was 49% more...
Free mobile messaging apps like WhatsApp, Viber, Tango and Line regularly receive requests from various countries every year to provide them access to the messages being...
Intel is reportedly working on Biometric technology in a software which it hopes will replace the use of passwords. The software being McAfee, which as we know...
Walk in to a group of teenagers or youngsters today, you will notice atleast one of them who is disinterested in the ongoing discussions, but more interested...
Update (5th April, 2014) – Microsoft provided a patch last week for all the Windows versions, in order to fix the issue . Microsoft also provided patch...
Starbucks found itself embroiled in a controversy this week after a surprising revelation by a security researcher claiming that the worlds largest coffeehouse company has been storing...
Situation for Target got from bad to worse over the weekend during the ongoing forensic investigation. New information came to light in this investigation, and Target has...
A new report released by NSS Labs, a security research and advisory company says Banks need to be more careful in authenticating the online banking customers when...
In the latest information security attack news, approximately 2 million accounts have been compromised. A Botnet using software controller named “Pony” was used for the attack and...
Twitter just enhanced its security a bit further today enabling Forward Secrecy for traffic on twitter.com , api.twitter.com and mobile.twitter.com. This makes it more difficult for intruders...
Microsoft announced yesterday they are bringing additional level of security to Office 365 early next year. This new service is called Office 365 Message Encryption. Thanks to...