Blog

Data breach

 February 21, 2014

Estimated reading time: 2 minutes

With Facebook having bought WhatsApp, it only remains to be seen how that would affect the privacy of users of both the platforms. In the meantime, here are some important news you must have a look at. AT&T received over 300,000 user data requests from law enforcement agencies. – Read...
 February 12, 2014

Estimated reading time: 2 minutes

As much as Android is loved all over the world (well, not all but most), it has its own follies. Yes, it is an open platform, it gives away loads of awesome apps for free, and it is open for customization. So, where’s the folly? Most users must have noted...
 December 21, 2013

Estimated reading time: 2 minutes

  Target’s Customers Targeted by Hackers during Holiday Shopping American retailing company, Target has confirmed a hacking incident that exposed its customers’ data. This data includes names, credit and debit card numbers, expiration dates and even security codes. The company stated that customers who did ‘physical’ (not online) shopping between...
 December 11, 2013

Estimated reading time: 2 minutes

Corporate cyber attacks have become a common parlance in the world of IT Security. A recent study done by RSA revealed the extent of loss incurred by firms of different nations hit by phishing attacks. The US had to gulp down a loss of $882 million, followed by Germany ($294...
 August 21, 2013

Estimated reading time: 3 minutes

To boost brand image and increase productivity, more and more enterprise sectors are exploiting avenues such as cloud technology, social media platforms, and bring your own device (BYOD) to name a few. And when such is the scenario, ignoring the importance of IT security can spell disaster. Here, we have...
 August 8, 2013

Estimated reading time: 3 minutes

Data breach remains one of the most critical threats for any business; large, small, and medium. This post takes you through a quick questionnaire which will help you understand how vulnerable your company is to data breach. What is Data Breach? When confidential data of an organization or an individual...
 July 31, 2013

Estimated reading time: 3 minutes

What’s common between most small and medium enterprises? It is a false sense of IT security that they have. Most of these industries assume that they are too small to risk any cyber attack, and it is this very notion that cyber crooks take advantage of. This post explains why...
 July 20, 2013

Estimated reading time: 2 minutes

Truecaller Gets a Bad Cyberattack Call Apparently, the website of popular online phonebook app, Truecaller, experienced a cyberattack, letting hackers gain unauthorized access to some data. The company has confirmed the same in its official blog. It seems, the Syrian Electronic Army is responsible for the cyberattack. News is up...
 July 10, 2013

Estimated reading time: 3 minutes

When it comes to enterprise security, there’s a lot at stake; consumers, operations, business relationships, work force, brand image, and financial status, to name a few. While the number of enterprise security threats can be in hundreds, in this post, we have discussed some of the most critical ones. Top...