• 6 Nov 2019

    City Of Johannesburg On Hit Again, Refuses to Give In To Ransom Demand

    The city of Johannesburg, South Africa has been hit again by a massive cyber attack which has crippled municipal, utility, health and several other services throughout a significant part of the city. The city, home of over 5 Million citizens reportedly lost a massive amount of sensitive data associated with it citizens and has to

  • 25 Apr 2019

    Website Is Now Just The Gateway; Intruders Now Want To Own Whole Infrastructure

    Hackers lurking around your website for possible vulnerabilities to be exploited not only want to gain an unauthorized entry to your website but to control your entire infrastructure further creating passage to make an entry to the system of third-party organizations associated with your business. The attacks on web applications are now turning to be

  • 7 Apr 2019

    Understanding Security Risks for Your Mobile App Business

    Since the concept of IoT has been floated, along with growing marketing penetration of smart phones and high-speed mobile internet connections, mobile application development industry outperformed its growth forecast every YoY tenure.  From  2014, mobile commerce has outperformed its desktop counterpart for third consecutive year  to confirm the new trend.  During the year ending June

  • 2 Apr 2019

    New Emerging Threat: Drones Are Fast Becoming A Cyber Security Nightmare

    Hacked drones are gradually breaching corporeal and cyber defenses to source disruption as well as embezzle data. Drones are a budding menace for edict enforcement as well as corporate security persons . On the occasion of Christmas 2018, rogue drones stranded flights at London Gatwick, the UK’s next busiest airport. However, not only the air

  • 25 Mar 2019

    DDoS Attack Size Took Significant Hit After FBI Crackdown

    According to a new report, in the fourth quarter of 2018, average size of distributed denial of service (DDoS) attacks decreased considerably. Recently the onslaught from FBI on 15 DDoS-for-hire websites seems to have had a legitimate impact on DDoS attacks. The report surfaced earlier this week from researchers in NexusGuard, that the number  of DDoS attacks

  • 27 Feb 2019

    How Increasing Usage of IoT Devices Chipping in to The Volume of DDoS Attacks

    Distributed denial of service attacks continue to be a major challenge against consistent performance of web assets of any business. The primary objective of a A DDoS attack is to engage maximum possible resources of an web server application hosting platform with overwhelming traffic or requests. However with the evolving threat landscape and deployment of

  • 14 Feb 2019

    All New Intelligent Botnets Extending Challenges For DDoS Prevention Mechanisms

    Throughout the last year security analysts all over the world discovered a number of new botnets which not only drive traffic to the target application server to engage bandwidth, but places the best possible request automatedly to the application itself so to engage maximum possible server resources with minimum number of terminals. The aim of

  • 8 Feb 2019

    5 Stats That Showcase The Evolution of DDOS Threat Landscape In 2018

    2018 DDOS attack statistic reveals a change of trend in DDOS attacks matrix i.e the total number of DDoS attack has decreased in the year for first time since DDOS attacks has taken shape as a cognizable risk on smooth operation of an web application. The latest quarterly DDoS attack report published by Kaspersky Lab

  • 10 Jan 2019

    A Recap to 2018’s Top 10 Data Breach Incidents

    The victims are still not out of the shock as 2018 has witnessed worst cyber attacks in history of mankind. Some big names an uncountable SMBs suffered billions of dollars in some of the biggest data breach incidents world has ever seen. The giants who must be very proud of their application & information security protocol including

  • 21 Nov 2018

    Contact Lenses Merchant VisionDirect Blindsided in Security Breach Incident

    Renowned European contact less merchant Vision Direct has been hit by a data security breach incident causing loss of personal and financial data of their customer during the first week of November. In a security breach notice posted on VisionDirect.co.uk the company confirmed that in a data theft incident between Nov 3 – Nov 8

  • 24 May 2018

    Fake Fortnite Android Apps Installing Spywares And Cryptominers

    As soon as Epic Games announced their willingness to extend support for  mobile devices for their blockbuster game Fortnite®, fake android apps started popping up claiming to be original Fortnite game app. These apps are actually intended to mine and destroy information from users android devices and some to install micro crypto currency miner programs;

  • 23 May 2018

    Understanding The Financial Impact of Application Security

    Widespread Adoption of mainstream IOT in recent years, made it complicated to lock down IT systems and opened up several new avenues of typically dangerous penetration. While businesses are getting increasingly reliant on technology and internet presence, the time has been critical to reevaluate if economic strategy and budget has been sufficient to prevent and

  • 19 Feb 2018

    Critical Vulnerabilities in Microsoft Products is on the Rise

    The number of vulnerabilities in Microsoft products reported to be more than doubled from 325 in 2013 to 685 in 2017 as reported by Avecto in Microsoft Vulnerabilities Report 2017 .  Moreover there has been a record 232 new windows vulnerabilities reported in this year, taking the total number of Windows vulnerabilities to 587, the

  • 21 Jan 2018

    Security Concerns in Near Field Communication You Must Be Aware About

    Though the technology has been place for over a decade the commercial implementation of contactless payment has seen a new dimension of growth since it Apple has introduced contactless payment in iPhone 6. Near Field Communications or NFC is a set of standards for portable devices invented by Sony and NXP Semiconductors in 2002 which

  • 18 Jan 2018

    A Better Protection Commitment! Wi-Fi Alliance Unveils WAP3

    After more than a decade long waiting period, Wi-Fi Alliance unveils their plan to launch WPA3, a new standard of Wi-Fi security features for users and service providers.  This Year the annual consumer tech extravaganza CES 2018 gained extra importance as the organization for the first time comment on the launch of WPA3. Wi-Fi Alliance

  • 9 Jan 2018

    Deal with Cyber Crime on Priority Basis: Indian Prime Minister to Police Officials

    NEW DELHI: Prime Minister of India Mr Narendra Modi on Monday told police heads from across the country to deal with cyber security related issues on an immediate and priority basis. Particularly conveying his concern over radicalization over social media using ghost identities, he urged the use of technology to quickly identify the problem areas and timely deployment

  • 19 Dec 2017

    White House Says FB &Microsoft Foiled North Korea’s Cyber Attack Bid

    WASHINGTON DC: White House Spoke Person on homeland security Mr Tom Bossert said today that Facebook Inc and Microsoft Corp acted last week to foil a number of North Korean cyber attack bid. Bossert did not provide further details on the adventure however he accepted that US government now calling in private companies to corporate with in

  • 12 Dec 2017

    Top 10 Intrusion Risk Your Web Application Might Be Exposed to

    Application layer is the most vulnerable layer of any application and is the hardest to defend since it has to remain exposed through the publicly accessible avenues. Any consumer facing web application has to made itself over either port 80 (for http requests)  or  port 443 (for https requests) or the both in order to

  • 12 Dec 2017

    6 Most Popular SQL Injection Techniques Web Developers Must Be Cautious About

    SQL Injection is the most commonly used technique of intrusion to an web application where malicious SQL statements are inserted into the database server of an web/cloud application to execute certain operations such as extracting data from the database, deleting the entire database or making it inaccessible for the application. Over time a number of