Personal Cyber Security Threats and Trends in 2018
If you think cybercrime only target big organizations or give threat to national security, then you are wrong. You can also be victim of...
Samsung Selects Suprema BioSign Mobile Fingerprint Solution for Its Latest Galaxy J5 and Galaxy...
Suprema, a global leader in biometrics and identity solutions, announced that the company’s BioSign mobile fingerprint authentication algorithm has been loaded in Samsung Galaxy...
IBM X-Force Red Launches New Services for Automotive Industry and IoT
IBM Security, announced the launch of two new security testing practice areas focused on automotive security and the Internet of Things (IoT). The new...
Sky and Cisco Strengthen Video Security Bond To Increase Content Protection for Any Screen
SAN JOSE, Calif. – As security concerns grow in a world of cloud-powered and OTT-to-any-screen video services, service providers are taking the necessary steps to...
Telenor reveals password habits of Indians on World Password Day
New Delhi, 4th May, 2017: In our highly-connected lifestyle, passwords hold the key to any form of information access and acts as our digital...
EU & THE DIGITAL SINGLE MARKET:INDIA GETS READY FOR EU’S NEW DATA REGIME
The new EU General Data Protection Regulation (EU GDPR), which takes effect on 25 May 2018,requires that any businesses dealing with the European Union (EU)...
Your WhatsApp account can be hacked with an innocent-looking meme
Do you know that a malicious code hidden within an innocent looking image received on WhatsApp can make you a victim of of the...
In line with PM Modi’s push, Army gets new software to enhance cyber security
In line with Prime Minister Narendra Modi's push for enhancing cyber security, the Indian Army is testing the indigenous BOSS (Bharat Operating System Solutions)...
Wireless Routers: First Line of Defense
Almost everything you read or hear about routers includes a sentence or two about router security. The focus is generally on this essential piece...
Information Security, Cybersecurity, IT Security, Computer Security… What’s the Difference?
Information security, cybersecurity, IT security, and computer security are all terms that we often use interchangeably. I know that I do.
I’ve written a lot...