Over 1,160,253,228 combinations of email addresses and passwords have been published online in one of the largest data breaches ever. Check to see if your data has been slurped up.
The chief information security officer (CISO) is the executive responsible for an organization's information and data security. Learn what it takes to land a CISO job and how to be successful in the role.
The single biggest threat to widespread proliferation of connected cars is data security. A conversation with two giants in the Indian auto space – Tata Elxsi and Tata Technologies brings to light why the threat is of paramount importance and what can be done to bolster security.
With the cyber security industrial complex in full swing and good business for all the major players, from governments and state sponsored groups, to criminal attackers and the vendors as well as their shareholders, we wonder what horrors this dystopian hell world will spew forth next.
Experian's annual data breach forecast predicts that biometric hacking will continue to surge as more mobile devices use fingerprint scans and Face ID technology to protect corporate and consumer data. But there are ways to avoid being hacked.
A Kerala-based bug bounty hunter, Sahad NK discovered a critical vulnerability in Microsoft’s login that made it possible to hack into anyone’s MS Office and Outlook account.
To better defend against sophisticated cyber threats seen in recent years and provide identity-based access to applications, DTDC Express decided to upgrade its existing firewall implementation.
Attackers can exploit the Android Debug Bridge (ADB) to modify the phone's authentication PIN or pattern to lock users out of their phones.