November 7, 2019

Application Security Intelligence Report for September 2019

In the month of September, there was a 40-percent increase in total cyberattacks compared to August, according to a Contrast Labs September 2019 AppSec Intelligence Report. […]
November 7, 2019

Cross Site Scripting Vulnerabilities

September 9, 2019

Managed SoC v/s In-House SoC – MSSP

Cyber Security breaches have become a fact of life these days. It’s no surprise that data security remains on top of mind for CIO and IT […]
August 26, 2019

What to do if your Bank Account is Hacked

Knowing the weak spots that hackers look for and the tricks they use can go a long way in protecting you from cyber theft: Weak passwords.Using […]
March 26, 2018

Malware Analysis

What is malware ? “Some sort of unknown malicious software is called as malware.”     Key Terminology of Malicious Software. –    Virus: a computer program […]
March 26, 2018
Bug Bounty Program
Autonomy of bug hunting program: how they better option for finding bug.  what is bug bounty program?       Open Platform for cyber security researcher who can […]
March 22, 2018

New Concepts in Trademark Jurisprudence

The internet domain name disputes have raised many unprecedented issues which the courts in many jurisprudence were, time and again, called to resolve and in the […]
March 15, 2018

Your surveillance systems are really securing your organization?

Is your surveillance systems really securing your organization? Yes. I have CCTV for 24*7 Surveillance connected to an NVR, It gives me complete Office movements in […]
October 13, 2017

Demystifying Cryptocurrencies, Blockchain, and ICOs

Executive Summary Cryptocurrency Market Size and Technology Types of Cryptocurrencies Investing in Cryptocurrencies Outstanding Issues Introduction Bitcoin, blockchain, initial coin offerings, ether, exchanges. As you’ve no doubt noticed, cryptocurrencies (and their […]