Opinions
Regular contributors write opinion pieces that reflect their take on topics related to data privacy, security, safety practices, etc.
Featured Article
- All
- Opinions
October 21, 2020
We explain the evolution of the data leak extortion ecosystem through the advancements made by ransomware groups over the last three decades.
October 1, 2020
What makes digital fingerprints valuable to cybercriminals and what are the preventive measures you can adhere to so as to avoid its theft.
September 22, 2020
Experienced security professionals say that entry-level positions in security and hacking doesn’t require programming skills. Is this true?
September 8, 2020
This article explains how effective threat intelligence can assist you in taking proactive measures to counter cyber attacks.
August 18, 2020
The anonymity associated with Telegram increases the odds of misusing its features. Monitor activities on it regularly to fend off threats.
June 3, 2020
More than 1 in 5 organizations have experienced a security incident due to shadow IT. What are the risks associated and how do we avoid them?
May 27, 2020
It is essential to have quantifiable metrics to gauge the quality of web apps. Here is a list of 6 quality metrics to optimize web apps.
May 6, 2020
Senior executives are 12 times more likely to be targets of social incidents, and 9 times more likely to be targets of social breaches.
April 30, 2020
There has been a precipitous rise in the number of COVID-themed data breaches. Here are security practices that can defend your organization.
April 22, 2020
Here is a consolidated list of popular open source threat intel resources that can help you combat COVID-themed cyber attacks.
April 14, 2020
Although the security of IoT devices demands immediate attention, the abundance of these devices has resulted in the lack thereof.
January 28, 2020
Being linked to the services we use every day, makes our phone numbers are attractive targets for hackers, who are increasingly resorting to SIM hijacking.
February 11, 2020
Scammers have repackaged their scams, that are delivered to us, via other channels. The new schemes are so convincing that we reach out to them.
February 18, 2020
Investigation of a flaw in the logical design, of a previous version of Wibmo payment gateway, allowed parallel transactions with the same OTP.
March 10, 2020
The Reserve Bank of India (RBI) has issued comprehensive guidelines too ensure that Indian banks function in a cyber-resilient environment.
May 12, 2020
59% of companies have experienced data breach due to third-party vendors. Given the level of access most vendors have to an organization’s network, traditional risk management frameworks fall short.
August 14, 2020
Executive summary for the Cost of a Data Breach Report 2020, highlighting factors that strengthen an organization’s cyber security posture.
December 30, 2020
In the event of full scale cyberattack the pharmaceutical sector could incur huge loss. We review the attacks that hit major pharmaceuticals.
Categories
- Achievements
- Advisory
- Adware
- APT
- Artificial Intelligence
- Awards
- Banking Trojan
- Botnet
- Breach
- Career
- Cloud services
- COVID
- Cryptomining
- Dark Web
- Data leaks
- DDoS
- Digital assets
- Engineering
- Espionage
- Events
- Hacking
- Hiring
- Machine Learning
- Malware
- Phishing
- Programming
- RaaS
- Ransomware
- RAT
- RCE
- Scam
- Security
- Smishing
- Spear phishing
- Threat Intelligence
- Trojan
- UI/UX
- Vulnerability