The ISO/IEC 27001 has seen leaps and bounds from the erstwhile era of BS17799 to the present standard. The stringent nature and the difficulty ... Read More
A ‘Banking Trojan’ is a piece of malware that is used primarily to steal banking credentials by remotely installing malicious software on a vic... Read More
Joseph Sullivan, Joined Uber in Spring of year 2015 as its first CSO. This was the time when Uber was experiencing multiple safety and security ... Read More
Ireland’s capital Dublin was one of the two mains areas of focus against the Black Axe cyber crime and money laundering organisation. PHOTO: Interpol... Read More
Tata Power Company Limited in India has an installed and managed electricity generation capacity of 13,974 MW, which is the highest in the count... Read More
Heat Map of "Maggie" Malware (Highest infection being India)
Cyber attacks on Enterprises have been on the rise, post the COVID period. The Sophis... Read More
The US Joint Cybersecurity Advisory (CSA) is a consortium of many organisations like National Security Agency (NSA), Cybersecurity and Infrastruct... Read More
It is but common that System Managers, Information Technology Management Asset Owners, DBAs, CISOs, etc; face with the threat of losing data avail... Read More
A few good recce-warriors or Android Watchers have been able to identify the next batch of Unsuspected Android Apps being used by attackers to pus... Read More
In a recent announcement, the Government of India, voiced the concerns of the obsolete state of the over two-decade old IT Act (Information Techno... Read More