Security

cyber-attack

Black Vine targeting multiple industries since 2012

July 31, 2015

Earlier this year, the second largest health insurance provider in the US publicly disclosed that it had been the victim of a major cyber attack which is believed to be ...

eScan Corporate 360 Antivirus Review

July 29, 2015

The security suite allows admin to manage, deploy and configure eScan on various endpoints. You can create and manage policies or tasks for PCs on a network, and even create, ...

AuthShield Enhanced online payment security with its Facial and Voice Recognition Authentication Solution

July 27, 2015

Innefu's Authshield takes online payment security to next level with its latest authentication security form factor with Facial and Speech Recognition.The technology is used to securely authenticate customer’s identity while ...

HP Elite x2 1011 G1 review: One of the best hybrid machine for productivity tasks

July 24, 2015

Design: Tablet The 11.6-inch diagonal 2-in-1 Windows device easily transforms from a tablet to a laptop ...

aws device farm

AWS Device Farm makes easy for developers to automate and scale app testing on mobile devices

July 10, 2015

The new service helps mobile app developers quickly and securely test their apps on smartphones, tablets, and other devices to improve the quality of their Android and Fire OS apps. ...

Kaspersky Internet Security 2015

Kaspersky Internet Security 2015 Review

June 30, 2015

Most of the security suites are now having components like antivirus, firewall, anti-malware, anti-phishing, parental control, etc. and Kaspersky Internet Security 2015 is not an exception in this. The security ...

mdm plus

Secure mobiles devices in an enterprise from centralized dashboard with Mobile Device Manager Plus

June 18, 2015

Mobile Device Manager Plus is an enterprise mobility management solution from ManageEngine. Targeting organizations that are adopting mobile-only and mobile-first IT strategies, Mobile Device Manger Plus provides a dedicated solution ...

cyberoam

Cyberoam CR2500iNG UTM Review

June 5, 2015

The CR2500iNG UTM boasts of a slew of security and threat prevention features and even integrated identity-based controls. This enterprise class UTM provides a stateful inspection firewall, a full ...

ProDot Antivirus Review

June 5, 2015

Antivirus Review ProDot brings an efficient antivirus that works well on both old and latest PCs. It is a light software that doesn’t affect PC performance and provides protection ...

online-shopping

Prevent Data Loss with Optimum Security

June 4, 2015

Symantec’s new Data Loss Prevention 14 will give CIOs greater confidence that employees can take advantage of storing information in the cloud without worrying about data loss or theft. “Symantec Data ...

cloud

HDFC opts Hybrid Cloud solution for DR

June 1, 2015

HDFC Standard Life, a private life insurance company, which is a joint venture between India-based Housing Development Finance Corporation Limited (HDFC) and UK’s Standard Life plc offers a range of ...

Kaspersky Internet Security 2015 Anti Virus Review

May 29, 2015

Most of the security suites are now having components like anti virus, firewall, anti-malware, anti-phishing, parental control, etc. and Kaspersky Internet Security 2015 is not an exception in this. The ...

Apple iPhone crashes

How to fix the text string bug that is crashing Apple iPhones

May 28, 2015

Apple users are facing a critical issue from last three days as a string of text is crashing their iPhones. This particular bug is causing the messages application crash automatically ...

security-app

Smart24x7 – Smart app for Smart Cities

May 28, 2015

24x7 personal safety mobile application with integrated services of emergency services such as Police, Ambulance & Fire. It reduces the response time of security agencies from 10 to 15 minutes ...

retail-breaches

VENOM vulnerability could expose virtual machines on unpatched host systems

May 25, 2015

A new vulnerability known as VENOM has been discovered, which could allow an attacker to escape a guest virtual machine (VM) and access the host system along with other VMs ...

Essential tips to mitigate increasing DDoS attacks

May 21, 2015

Indusface suggests some useful tips that can help mitigate the risk of a Distributed Denial of Service (DDoS) attack. As the number of application layer attacks continues to increase, there ...

Akamai Releases Q1 2015 State of the Internet – Security Report

May 21, 2015

Akamai Technologies, Inc. announces the availability of the Q1 2015 State of the Internet – Security Report. This quarter’s report, which provides analysis and insight into the global cloud security ...

Security device ‘Safer’ and wearable device ‘Smart Earphone’ bags funding from Ericsson

May 13, 2015

Swedish mobile telecom equipment maker Ericsson will fund two projects developed by IIT students to promote the spirit of innovation, as well as develop innovative tech solutions for the benefit ...

cyber-attack

Small Businesses are big opportunities for cyber attacks

May 8, 2015

Small businesses often have fewer resources to invest in security, and many are still not adopting simple and basic best practices such as blocking executable files and screensaver email attachments. ...

Linux-penetration

5 Best Linux Distros for Security Penetration Testing

May 7, 2015

Here we put together some Penetration testing distros which are better at web application vulnerability discovery, forensics, WiFi cracking, reverse engineering, malware analysis, social engineering and much more..