Security

security-app

Smart24x7 – Smart app for Smart Cities

May 28, 2015

24x7 personal safety mobile application with integrated services of emergency services such as Police, Ambulance & Fire. It reduces the response time of security agencies from 10 to 15 minutes ...

retail-breaches

VENOM vulnerability could expose virtual machines on unpatched host systems

May 25, 2015

A new vulnerability known as VENOM has been discovered, which could allow an attacker to escape a guest virtual machine (VM) and access the host system along with other VMs ...

Essential tips to mitigate increasing DDoS attacks

May 21, 2015

Indusface suggests some useful tips that can help mitigate the risk of a Distributed Denial of Service (DDoS) attack. As the number of application layer attacks continues to increase, there ...

Akamai Releases Q1 2015 State of the Internet – Security Report

May 21, 2015

Akamai Technologies, Inc. announces the availability of the Q1 2015 State of the Internet – Security Report. This quarter’s report, which provides analysis and insight into the global cloud security ...

Security device ‘Safer’ and wearable device ‘Smart Earphone’ bags funding from Ericsson

May 13, 2015

Swedish mobile telecom equipment maker Ericsson will fund two projects developed by IIT students to promote the spirit of innovation, as well as develop innovative tech solutions for the benefit ...

cyber-attack

Small Businesses are big opportunities for cyber attacks

May 8, 2015

Small businesses often have fewer resources to invest in security, and many are still not adopting simple and basic best practices such as blocking executable files and screensaver email attachments. ...

Linux-penetration

5 Best Linux Distros for Security Penetration Testing

May 7, 2015

Here we put together some Penetration testing distros which are better at web application vulnerability discovery, forensics, WiFi cracking, reverse engineering, malware analysis, social engineering and much more..

safe banking

Online Banking: Get Improved Fraud Detection with Gemalto’s EZIO Dynamic Fraud Manager

April 27, 2015

Gemalto reinforces its Ezio range of online banking protection with the newly integrated transaction monitoring software - the Ezio Dynamic Fraud Manager​. It reinforces Ezio's multi-layered security capabilities to provide ...

encryption-key_Tools_PCQuest

7 Free File Encryption Tools

April 1, 2015

 Keep the sensitive files encrypted and under your control with these some free but worthy file encryption tools Axcrypt: A  software that enables you to easily ...

Protector Plus Anti-virus

March 30, 2015

The light and proactive security suite for home users with active web blocking -Ashok Pandey The Protector Plus Anti-virus is developed to protect home PCs effectively. Apart from the viruses, it also ...

Cybercriminals on a fast forward mode with emerging technologies

March 25, 2015

2014 was a grim reminder that cybercriminals are getting bolder and vicious. They have been relentlessly working towards planting the stealthiest and most sophisticated attacks. With attacks becoming ...

Managing Multiple Identities and Ensuring Data Security in the BYOD Era

March 9, 2015

The mushrooming of mobile devices each with its own platform has also led to the problem of managing multiple identities employees maintain on such devices and use to ...

Security vulnerabilities found in Indian overseas Bank App

March 3, 2015

Appvigil, a cloud based android app security scanner discovered a JavaScript Injection vulnerability also known as cross-scripting or XSS vulnerability in the Indian Overseas Bank Android app. The ...

Mobile Device Managment MDM

Implementing MDM Using MaaS360

February 25, 2015

This MDM solution by Fiberlink aims to optimise the functionality and security of a mobile communications network while minimising downtime on an enterprise network MDM functionality typically ...

vulnerabilities

Dark Side of Your Living Room

February 16, 2015

Popular connected home entertainment devices pose a real cyber security threat due to vulnerabilities in their software, and lack of ...

cyber-attack

Global Cyber Security Threats Landscape

September 5, 2014

Attacks to penetrate cyber security setups of organizations are becoming more targeted, with attackers focusing ever more sharply on stealing ...

11 Internet Security Suites Compared

February 14, 2014

We received the 2014 editions of Internet Security Suites from 11 vendors. We used our three axis model of performance, price, and features for evaluating all the Internet Security suites. A system ...

Eset Smart Security 7

February 11, 2014

A complete security solution with long list of features including
utility tools, rescue mode and an anti-theft solution

Quick Heal Internet Security 2014

February 11, 2014

Good security features, but high on memory usage

Avast Internet Security 2014

February 11, 2014

This includes an antivirus engine, firewall, browsing protection, a
software updater, browser cleanup tool and more