Cisco has issued 41 security advisories in one day, which is reportedly the highest one-day disclosure in at least 12 months. On Wednesday, May 1, 2019, the San Jose-based company…
Read More
Cisco has issued 41 security advisories in one day, which is reportedly the highest one-day disclosure in at least 12 months. On Wednesday, May 1, 2019, the San Jose-based company…
Read More
Spamming: An introduction Spam is something that all internet users encounter, almost every day. In fact, spamming, which continues despite the existence of anti-spam laws, could turn out to be…
Read More

Most people who use PCs will be connected to the Internet, in fact, almost everyone has a smartphone, the most personal of all personal computers. This means that many are…
Read More
Cloudflare has announced the release of two new HTTPS interception tools. These tools would help detect if the secure connection to a website has been intercepted in any way. In…
Read More
F5 Networks acquires rival company NGINX in a deal that’s valued at about $670 million. Software company NGINX, which is behind the popular open-source web server NGINX, powers more than…
Read More
As reported in the NY Times, North Korean hackers have targeted American and European businesses for 18 months kept up their attacks last week even as President Trump was meeting…
Read More
procedural security is what we call operational security (OPSEC), it is kind of risk management process that encourages admin to monitor operations from the perspective of an adversary, and draw…
Read More
If you are using passwords in multiple Web services etc., if that one-and-only password gets leaked, your entire Internet identity and access goes out. Even if all the users dealt…
Read More
Almost every business owners are concerned about their IT security, and what they believe is the single risk to their data. It can be virus, ransomware, backup mishap, hard drive…
Read MoreExplaining step by step how a penetration test, or pen-test, helps measure the security of an organization’s IT infrastructure by attempting safe exploitation of vulnerabilities. Know how a penetration test…
Read More