Fraud

‘Distributed guessing’ attack lets hackers verify Visa card details

Armed with a card number, researchers tricked websites into helping them guess the expiry date and CVV.

What is a Chief Security Officer? Understanding this critical role

The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.

What to do after a data breach: 5 steps to minimize risk

Website database breaches happen, and while there's little you can do to prevent them you can minimize your exposure. Here's what to do.

Online voting is impossible to secure. So why are some governments using it?

If you thought electronic voting machines were insecure, wait 'til you meet online voting.

Police cracks the whip on world's largest DDoS marketplace

A joint operation by law enforcement agencies around the world has shut down webstresser.org, which launched 4 million DDoS attacks and targeted banks, governments and enterprises. 

New Georgia law criminalizes good-faith security research, permits vigilante action

Georgia cybersecurity folks are outraged about SB 315, and warn that it could cost the state jobs.

Insurance companies, Cognizant build blockchain solution for data sharing and security

Leading Indian life insurers partner with cognizant to develop industry-wide blockchain solution for secure data-sharing and improved customer experience.

The clearer the CSO role, the easier to get budget approved: Mushtaq Ahmed, CSS Corp

For an organization to be secure from any cyber threats, investments should be made in technology, people, and policy, says Mushtaq Ahmed of CSS Corp.

What is DNS and how does it work?

The Domain Name System resolves the names of internet sites with their underlying IP addresses adding efficiency and even security in the process.

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

Facebook breach: 87 million global, 5.6 million Indian profiles compromised

Making certain policy changes, Facebook announced how users can now control, and delete data from the app and also control several other features which were vulnerable.

Data Privacy: How you can mitigate violation

In this edition of Explained, we explore the serious need for users to be vigilant and vary while giving away their personal data, post the Aadhaar breach and Facebook-Cambridge Analytica expose.

 

Script edited by Shantheri Mallaya

Post production by Kshitish

Voice Over by Soumik Ghosh