Application security testing was not a vital part of software development in the early days of computing. In those early days, the most important factor was that the developers meet…
Read More
Application security testing was not a vital part of software development in the early days of computing. In those early days, the most important factor was that the developers meet…
Read More
A Tesla Model S was stolen recently in Essex, England after a pair of thieves hacked the car’s high-tech keyless entry system. The whole incident, however, got recorded on the…
Read More

Just like the healthcare industry, the financial market players are also a profitable target of cybercriminal elements. The Global DNS Threat Report 2018 by Efficient IP has released a report…
Read More
As we use publicly accessible services, whether it is an airline, a bank, or a government transaction – we are at the mercy of their data handling procedures and protocols….
Read More
The amount of research that the U.S Department of Homeland Security puts in for combating cybercrimes is stupendous. This research leads to developing technology that’s used in turn to develop…
Read More
The world has changed forever at the turn of the century. Vital data that were stored on a physical printed medium and locked in a physical drawer with a key…
Read More
The second browser wars is still raging since the release of Firefox in 2002; more browsers entered the mainstream since then. The former browser champion, Internet Explorer has virtually left…
Read More
There is a huge difference between an Android antivirus and an Android app that offers vulnerability scans. The former has questionable effectiveness due to the way Google developed Android as…
Read More
The cybercriminal elements love old software and outdated platforms. It is their candy store, their toy store, as old outdated software is full of known vulnerabilities which hackers can exploit…
Read More