Hacking

Top six security and risk management trends: Gartner

Analysts will explore the trends security leaders face during the Gartner Security & Risk Management Summit, September 10-11, 2018, London, U.K.

Rising threat: Children’s identities being sold on the dark web

Michael Connory’s firm Security in Depth develops cyber security awareness programs for corporate organisations. This training involves discovering what information about company executives resides on the ‘dark web'. But these searches often uncover something more sinister.

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.

Partner Content
Cryptojacking: FAQs for Businesses

More than 2,000 computers from Aditya Birla company were targeted by hackers for cryptojacking.

What is corporate espionage? Inside the murky world of private spying

Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality.

Data security is integral to the booming healthcare sector

The adoption of Health Information Exchanges (HIEs), EHRs and automation, are on the one hand paving way for better patient care, and on the other hand, exposing private data to thefts and breaches.

The top 5 cyber security jobs with growing demand in India

The need for experienced professionals is so high that companies are willing to pay a premium salary of over Rs 1.5 to 4 crore to top talent. This has increased the cyber security budget by 71% as per PwC.

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.

IoT could be the killer app for blockchain

The Internet of Things is in search of a secure method for automating processes and exchanging data in real time to speed transactions; blockchain could be a perfect fit.

What is a zero-day exploit? A powerful but fragile weapon

A zero-day is a security flaw that has not yet been patched by the vendor and can be exploited. These vulnerabilities fetch high prices on the black market

The most notorious hacker groups

Today increasingly sophisticated cyber attacks are crafted, honed, and improved by shady groups of hackers, often using custom tools that are directed at high value people, businesses, or even countries.