Getting friend request from cops and public personalities, Beware! cybercriminals are after you

To steal your money by gaining your confidence, cybercriminals are now making fake Facebook profiles of public figures like politicians, social workers and even cops to dupe people. Recently, several instances of fake accounts of policemen being created to demand money came to light from different states. At least four instances where fake Facebook accounts … Continue reading Getting friend request from cops and public personalities, Beware! cybercriminals are after you

Issues in the proposed Personal Data Protection Bill, 2019

Abstract Data is the new oil. Data is pricy. Data is personal and sensitive. Data belongs to all; an individual, an entity, a State or a Country. It has to be protected, as any other precious thing. World over, Data has become a hot topic due to its value and sensitivity. Data privacy and data … Continue reading Issues in the proposed Personal Data Protection Bill, 2019

Top 10 Most Disturbing Cyber Attack Tactics in 2019

Nowadays many small and large scale industries are facing security issues due to the cyber attack. From the past few years, cyber attack tactics have increased and massive data is being grabbed and misused by many black hat people across many industries. Regardless of whether you work in the affected industries, it’s essential to understand … Continue reading Top 10 Most Disturbing Cyber Attack Tactics in 2019

Drone Regulations 1.0: Civil UAVs To Take Off From Sky Digital Platform, But No Goods Deliveries Yet

• The Drone Regulations 1.0 legitimise drone operation for civil purposes, quashing the DGCA infamous circular from 2015 • The Drone Regulations 1.0 envisage a digital sky platform for the operation of the drones • A task force under the chairmanship of minister of state, civil aviation Jayant Sinha, will further draft recommendations for Drone … Continue reading Drone Regulations 1.0: Civil UAVs To Take Off From Sky Digital Platform, But No Goods Deliveries Yet

Don’t have your account hijacked. Secure your online accounts with more than a password, says Google

Research published at the end of last week argues that the typical user can significantly harden the security of their online accounts by linking a recovery phone number that can send an alert if there is suspicious activity on the account. The research, conducted by a team from Google alongside researchers from New York University … Continue reading Don’t have your account hijacked. Secure your online accounts with more than a password, says Google

5 Best Practices for Creating an Effective Computer Security Incident Response Team (CSIRT)

By: Stephen Moore, Exabeam Chief Security Strategist In many organizations, a computer security incident response team (CSIRT) has become essential to deal with the growing number and increasing sophistication of cyber threats. Unlike a security operations center (SOC) —a dedicated group with the tools to defend networks, servers, and other IT infrastructure—a CSIRT is a cross-functional team … Continue reading 5 Best Practices for Creating an Effective Computer Security Incident Response Team (CSIRT)

Blockchain to generate more than $10.6B in revenue by 2023

Blockchain has seen a real uptick in adoption as a number of companies roll out pilot tests in various industries and blockchain-as-a-service gains traction. Driven mainly by financial technology (fintech) investments, blockchain has seen a fast uptick in adoption for application development and pilot tests in a number of industries and will generate more than … Continue reading Blockchain to generate more than $10.6B in revenue by 2023

Cybersecurity readiness: The importance of network monitoring

Continuous network monitoring and traffic analysis are crucial ingredients for cybersecurity readiness. Expert Peter Sullivan explains what enterprise security teams need to know. Editor's note: This is part of a series on achieving cybersecurity readiness. Part one of this series looks at the concept of cybersecurity readiness and proposes seven elements or objectives as fundamentals for achieving that … Continue reading Cybersecurity readiness: The importance of network monitoring

Zero-day WordPress vulnerability could expose password reset emails

Luke Irwin 12th May 2017 WordPress is vulnerable to a zero-day exploit that could allow hackers to reset users’ passwords and gain access to their accounts. The vulnerability was discovered by Dawid Golunski, who said he first reported the issue to WordPress last July. Although the company reportedly said it was working on a fix, … Continue reading Zero-day WordPress vulnerability could expose password reset emails

How to keep ahead of evolving cyber threats

Luke Irwin 17th July 2017 Not long ago, malware and other viruses were nothing more than occasional mild annoyances, but cyber crime has become big business in the past few years. With organisations across the world now using the Internet every day to do business, criminals have taken advantage. With more people to target, and … Continue reading How to keep ahead of evolving cyber threats