Finding the appropriate Content Management System(CMS) for your Organization

CMS Content Management System

Share this:    In today’s market, you can find a Content Management System(CMS) at arm’s length. How do you pick the right content management system for your organization? Selecting the right CMS is a daunting task with a wide variety of open source as well as commercial offerings. A CMS is very important for coordination of marketing […]

Continue reading


Kirk Ransomware: Star trek themed malware!

Kirk Ransomware

Share this:    A new piece of ransomware has surfaced featuring star trek theme, named Kirk Ransomware, the first of its kind ransomware demanding Monero cryptocurrency instead of Bitcoin. It was discovered by Avast malware researcher Jakub Kroustek. Cyber criminals are turning highly sophisticated with better, more secure ways to ask for ransom and hence a first […]

Continue reading


Selecting A Cloud Firewall System

cloud firewall system

Share this:    Cloud, the ease of use which comes with it and of course cloud firewall system has become the most talked-about topics in the industry. Traditional firewalls are not effective given the type and range of applications users are accessing. Recent cloud statistics suggests that spending on cloud will grow from $180B in 2015 to […]

Continue reading


Lawful Implementation of DLP Plan in India

lawful implementation of DLP

Share this:    Data loss prevention (DLP) systems are crucial tools for the safeguards of intellectual property and business secrets. IT is the business enabler in every company, however the simplicity of communication calls for major risk for sensitive information. Employees with access to such information may- deliberately or inadvertently -leak such data to third parties. Cases […]

Continue reading


New target for hackers this year : Mac OS

Mac OS hack

Share this:    A second example of Malware targeting Mac OS has surfaced in the past few weeks. Macro is a series of commands and actions that help automate some tasks. Macro malware- commonly referred to as a “word macro virus” is a word-macro based attack relying on automatically-running macros embedded in Microsoft word documents. A cybercrime […]

Continue reading


The growing threat of GoldenEye Ransomware Attack

goldeneye ransomware

Share this:    The latest version of Petya ransomware, GoldenEye, is attacking HR department with fake job applications loaded with the virus. It is holding those systems hostages for a steep ransom. GoldenEye (RaaS: Ransomware as a Service) is based on a profit sharing model where affiliates get revenue from the revenue they bring weekly. This is […]

Continue reading


Ransomware Spora: Everything you should know about it

ransomware spora

Share this:    Spora is the latest ransomware trojan which is highly sophisticated in its attacks and well crafted. Security experts already believe that it will lead to next evolution of ransomware with freemium model of extortion and a sophisticated payment website in place. Why is Spora dangerous in its attack? 1.Unlike many ransomware present, Spora works […]

Continue reading


The Home Ministry’s website hacked on 2017 February 12

home ministry’s website hacked

Share this:    On 12th February, 2017 the home ministry’s website got hacked. Attacks on our digital borders have been increasing for some time now. Is this an indication that we are heading for a war for which we aren’t sufficiently prepared? How do you fight something so intangible? We cannot put men with firearms to kill […]

Continue reading