Spam

Is Facebook about to buy a cyber security firm?

As the dust settles on news that cyber attackers stole data from 29 million accounts, Facebook is rumoured to be buying a cyber security firm.

Email based cyberattacks remain one of the most vulnerable vectors: Report

Cybercriminals use social engineering techniques to trick users into providing login credentials, initiating fraudulent transactions or unknowingly install ransomware.

Seqrite launches Seqrite Secure Web Gateway for enterprises

Built on a powerful machine learning engine, Seqrite SWG offers protection against advanced Web threats 

Burning down the house: CEO attitudes to cyber security all wrong

Security In Depth has just published the results of research which found 83 per cent of Australian companies have no policies or plan in place for a data breach and 41 per cent said they “did not understand” what an ICT security framework was.

Microsoft, Tech Mahindra collaborate to build blockchain-based ecosystem to fight spam calls

Based on Blockchain technology and built on Microsoft Azure the solution aims at mitigating the issue of unsolicited commercial communication (UCC) in the country.  

Over one third of all phishing attacks target financial sector customers in Q2 2018

Attacks on customers of financial organizations, including banks, payment systems, and e- shop transactions, are an enduring trend in cybercrime and involve the theft of money as well as of personal data.

Seqrite detects more than 1.5 lakh incidents related to the Emotet Trojan

Reveals how the infamous Trojan has evolved into a complex malware capable of delivering multiple attack payloads such as Banking Trojans.

What is malware? Viruses, worms, trojans, and beyond

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

Sophos launches advanced email protection solution

SophosLabs research discovered that 75 percent of malware in an organization is unique to that organization which indicates the majority of attacks are zero-day

S K Rudra

At C K Birla Hospitals, S K Rudra and his team implemented centralized monitored and managed Urchin Tracking Module (UTM), as the only route for all the outgoing and incoming traffic. It established gateway IPS, anti-virus, anti-spyware, anti-spam, application filter and web filter in place. It further, enforced identity and MAC-based access control policies. 

Sanjay Gurav

At Batlivala and Karani Securities, Sanjay Gurav implemented synchronized security to have the best defenses to coordinated attacks which keep changing rapidly.

Sandeep Jamdagni

At Ashiana Housing, Sandeep Jamdagni, built a complete security system and policy to ensure users are aware of threats and the systems and networks are secure.