The internet has become a basic necessity of our life. Every home is equipped with the wireless router to connect various devices like smartphones, tablets, fitness wear, and home IoTs to the internet This interconnectedness provides the comfort of operating devices from anywhere, anytime this increases the attack vector by providing the breeding ground for cyber crimes. The danger of…
Month: July 2017
How to Confront Cyberbullying?
Each one of us has been either victim of cyber bullying or bullied somebody or witnessed the bullying. Either as victim or bully, we have gone through the suffering that comes along with it. At the face of it, bullying looks like aggressive behavior but it is not. Aggressive behavior can be provoked or is triggered by the event, it…
Top 10 Blogs Every Security Professional Must Read
Since the stone age, human beings are programmed to keep vigilance of surrounding to protect themselves and community from the prowling predator. They were having systems of signaling each other when one of them spots the danger to make sure that the community is protected. They also learned over a period of time that they can win the battle against…
Anatomy of Cyber Attacks & How to Reduce its Impact
There is not a single day when there is no news of new vulnerability or cyber breach, it could be the latest trend of ransomware or it is an old school of stealing the payment card data. Most breaches are identified by the by the customers or partners. Whether we accept it or not, every day we are battling against…