Blog

Cyberespionage

LinkedIn security tips
Do you use LinkedIn to connect with your professional contacts and to interact or look around for potential employment opportunities? If yes, then you must have surely received LinkedIn connection requests from some people unknown to you at some point in time. Most people assume that LinkedIn is a reliable...
2014 has been an eventful year in the cybersecurity world and there have been several high profile security breaches. These have cost companies millions of dollars and do not show any signs of slowing down in the foreseeable future. Here is a brief look into IT security news from the...
In massive security news this last week, eBay was hacked on a large scale. This is the dominant story emanating from IT circles in the week gone by, and all else pales in comparison. During the hack, large databases of user passwords were also stolen and this is a rather...
There are several interesting new developments in the security world, and here are some of the news stories from the week gone by that you should be looking at. Facebook Whatsapp deal for $19 billion still not completed due to privacy concerns If you have doubts about your private data...
Modern business enterprises deal with large stacks of crucial data that need to be processed at high speeds. As a result, security is often a blind spot for them. Basic enterprise security tips are overlooked for the sake of convenience and this eventually leads to security breaches or data loss....
It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves protecting the corporate network from external threats and internal parties (employees) as well. This is where effective Endpoint Security (EPS) comes into the picture. EPS is a network security concept that places...
New York Times website breached by Chinese hackers The New York Times recently discovered that their computer systems were breached by Chinese hackers. The hackers stole corporate passwords of each and every employee and spied on more than 50 individuals in a time span of 4 months. Apparently these attacks...
India and hardware makers at loggerheads over cyber security guidelines The Indian Government wants all hardware manufacturers to include a mandatory brochure on cyber security. This stretches to all forms of hardware right from computers and mobile phones to modems and USB drives. However, the hardware companies are not too...
Major security flaw found in Samsung devices, Samsung working on solution Samsung manufactures the Exynos 4 quad-core and dual-core chips for its flagship products like Samsung Galaxy S3 and the Galaxy Note II. However, a security flaw has been discovered in these SoC (system on a chip) processors that makes...
This week was a rather busy one in the security industry. Here are some of the notable highlights that you should not miss out on. Authorized email monitoring increases by 36% in September 2012 According to reports, email monitoring by national security agencies has jumped by 36% in September 2012....