Your weekly update of everything security!
Digital transformation has left a whole host of vulnerabilities attacking the workplace from all quarters. Leo Joseph, Senior Director of Enterprise Sales and Solutions, at HP India, gives us a glimpse at what’s at stake.
Charru Malhotra, Associate Professor of e-Governance and ICT at the Indian Institute of Public Administration, discusses the importance of bolstering security for the smart and digitally inclusive nation.
Cyber criminals are now cashing in on the widespread fear looming on the security landscape. There are a host of malware patches that are actually malwares in themselves.
In IDG's first edition of Security Day, we bring to you the stalwarts of the industry to join in a much needed global conversation on enterprise security.
Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.
A recent finding revealed that Indian healthcare companies are spending less than 6 percent of the total IT budget on cybersecurity. Given the spate of recent cybersecurity attacks bringing the industry to its knees, is the healthcare sector a sitting duck for cyber thugs?
A fine local gathering with talks on advanced social engineering, APT herding, securing smart cities and more, with quality content.
A WannaCry cryptor sample from February 2017 looked like a very early variant. More research is required into older versions of Wannacry.
“WannaCry” is initiated through an SMBv2 remote code execution in Microsoft Windows. It can be blocked by installing patch provided by Microsoft.
Find out everything there is to know about the globetrotting Tinder Bots.
A consumer would need every possible argument to ensure that his security when performing a transaction is guaranteed hence he has to be cautious when deciding on the SSL certificate provider.
Ransomware vісtіm will not be able to access his іnfоrmаtіоn.Rаnѕоmwаrе operations succeed bесаuѕе thеу capitalize оn fear, whісh ultіmаtеlу fоrсеѕ vісtіmѕ to dо something іrrаtіоnаl ѕuсh аѕ paying суbеrсrіmіnаlѕ.
Cyber-criminals are finding better approaches to adventure shortcomings and attempting to grow perpetually complex techniques for assault–or discovering innovative rehashes of old traps.
This week we have newly discovered malware, dual authentication plans, isuues related to lack of IoT security and much more on the cards. Tune in to know more!
As the world continued to tackle the ransomware “Wannacry,” an Indian tech-food company, Zomato was breached. Tune into this week's CSO Alert to know more about these breaches and other stories.
Juan Andres Guerrero-Saade, Senior Security Researcher, Kaspersky Lab’s Global Research and Matt Suiche, Comae Technologies explains about the ‘wannacry’ ransomware attack stages and kill switches.
An Expert Take on Targeted Attack Operations
This Trojan enables an intruder to manipulate the file system, run arbitrary commands and run loadable modules.