by Binoy KL | Mar 7, 2015 | Business Continuity
Last week New York Times revealed that former USA state secretary Hillary Clinton used a private email account instead of official email address for communications while serving the State department. It is reported that Clinton used a private email server, not the...
by Binoy KL | Mar 6, 2015 | Business Continuity, Personal Security
It is a no brainer to mention that cyber crime is increasing and today, the focus is more on money & cyber war than anything else. We see a lot of such incidents these days including the hacking and data breach at Target, Sony, Anthem to name a few. What about...
by Binoy KL | Oct 15, 2014 | Security News
In its latest Patch Tuesday releases, Microsoft pushed patches to fix about 20+ vulnerabilities in various MS products includes servers & desktops, Office, IE and .NET. One of the update is specifically in addressing the zero-day flaw that is reportedly is already...
by Binoy KL | Oct 8, 2014 | Personal Security
After Jennifer Lawrence it is now time to see what hackers have about Kim Kardashian. Private photographs of Kim Kardashian and Vanessa Hudgens, which appears to be naked, are publicly leaked and shared on the social network. As usual, Reddit and 4Chan were the sites...
by Binoy KL | Sep 13, 2014 | Security News
Google Dorking, Also known as “Google hacking,” involves using specialized search parameters to locate very specific information. Examples include: » (U) Site: Searches and lists all the results for that particular site. » (U) Intext: Searches for the occurrences of...
by Binoy KL | Aug 6, 2014 | Videos
Here is a list of videos published in YouTube about application security. It is a great compilation of video and a must to watch for the application developers and application security professionals alike. All these videos are great tutorials for any AppSec...
by Binoy KL | Jul 30, 2014 | Personal Security
Identity theft is on the increase. Everyday we hear stories about identity theft by hackers and millions of identifies are on sale after such security incidents. When looking for a Identity Protection company, it is important to check out the services offered by them....
by Binoy KL | Jul 18, 2014 | Uncategorized
The Cloud Security Report Spring 2014 edition from Alert Logic is available for public download. This report is based on the analysis of data from its customer base of around 2200 active customers. A key finding is that the increase in cloud & hosting environment...
by Binoy KL | Jun 11, 2014 | Uncategorized
Java vulnerabilities and zero day exploits are very common these days. It has take to the extend that security experts start recommending disabling the Java whenever possible. Now Java has come up with the option for whitelisting so that you can run Java in a safer...
by Binoy KL | May 5, 2014 | Research
NSA is accused to be spying on the people for years. In a recent article, NewYork Times describes the strategies by NSA on the exploitation of the implementation flaws in some of the popular crypto products. It also discusses about the cases of NSA made companies to...
Recent Comments