Why Blockchain may not be the elixir to internet security

blockchain

Every architect, builder and designer knows that the right tool can solve the most difficult problems in a jiffy but at the same time, that tool cannot be right for all the situations. There are a lot of confusions running around regarding Blockchain. Many consider it equivalent to bitcoins although both are different, bitcoin being […]

Continue reading


Top 3 cyber security concepts for 2018

2018 Cyber Security Concepts

Cyber security is taking a new turn every year. Its very crucial to stay updated with the latest cyber security concepts and solutions to thrive in the market. The 2018 RSA Conference was exceedingly productive and proactive in bringing out latest cyber security concepts instead of relying on the outdated, legacy ones. Here is a […]

Continue reading


Internet Explorer Zero-day “Double-kill”

Internet Explorer zero-day

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code, host website and lead the victim to view compromised websites. Kaspersky and Qihoo360 independently discovered this zero-day vulnerability (CVE-2018-8174)  for Internet Explorer […]

Continue reading


Cryptojacking Attack hits Aditya Birla Group

Aditya Birla Group became a victim of a huge Cryptojacking Attack

A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group – one of India’s largest business conglomerates headquartered at Mumbai. 2000 plus computers were infected by cyber criminals for cryptojacking – a cyber attack where hackers misuse the victim’s terminals and exploit their processing power […]

Continue reading


Data hacked during EPFO-Aadhar seeding

epfo aadhar

Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of 2.7 Cr Indians. The vulnerabilities in Aadhar seeding with PF accounts may have been exploited to steal the data. The statement from the EPFO came amid reports of a letter allegedly written by EPFO Central Provident […]

Continue reading


Rarog – A cryptomining Trojan is out in the wild

Rarog

A malware family Rarog is out in the internet and being excessively used by the cyber criminals to execute cryptocurrency mining operations. Reseachers claim it to be an appealing option for hackers due to its low cost, easy configurations and support for multiple cryptocurrencies. Palo Alto Networks’ Unit 42 research team, which posted a blog on Wednesday […]

Continue reading


Is blockchain the alchemy to DDoS attacks?

blockchain

DDoS(Denial of Distributed Service) attack is a type of cyber attack that involves a large number of computers and huge volumes of traffic to overwhelm a server or network, slowing it or rendering it completely unresponsive. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled […]

Continue reading


The rising and falling cyber security trends in 2018

The rising and falling cyber security trends in 2018

Current Rising Trends of Cyber Security AI/Machine Learning is picking up Artificial Intelligence(AI) has the power to learn catch up with things and learning from the past experience predicting and stopping similar threats to occur in future. There will be more cyber security software using Machine Learning (ML) to crack any hacks or attacks. ML […]

Continue reading


Latest technology innovations affecting cyber security

latest technology innovations

Technology is building our future, there is no denying but with every new innovation comes new vulnerabilities and hence the responsibility to make the internet more secure. The increasing digital connectivity and the automation of virtually all processes around the world in business and otherwise at all levels in the value chain have led to […]

Continue reading


How cloud is influencing the roles and responsibilities of CIO?

Cloud is transferring the roles and responsibilites of CIOs

Cloud has had a gigantic effect on the software industry. And its impact on CIO’s roles and responsibilities is dominant. With the cloud technology, CIO is no more just a keeper of the technology but a Chief of Information in all sense, managing the sensitive company data as an organization asset. In order to keep […]

Continue reading