27.5 C
Bengaluru

Monthly Archives: December, 2011

Last week New York Times revealed that former USA state secretary Hillary Clinton used a private email account instead of official email address for communications while serving the State department. It is reported that Clinton used...
It is a no brainer to mention that cyber crime is increasing and today, the focus is more on money & cyber war than anything else. We see a lot of such incidents these days including...

Hackers plan space satellites to combat censorship

Computer hackers plan to take the internet beyond the reach of censors by putting their own communication satellites into orbit. The scheme was outlined...

IT Risk Management

Risk Management is a key term we keep discussing every now and then when we talk about information security. It often is the closing...

Disk Space attacks

Disk space attacks are a form of resource utilization attacks resulting in denial of service. Disk space if a finite resource in the computers....

Stratfor Incident.An analysis

Stratfor, a global security think-tank, is hacked and now everyone knows about it. Based on the information available on the web related to this...

PCI Compliance hosting

In my earlier post about PCI Compliant Hosting, we have discussed about the PCI Compliance areas to be looked into when considering a hosting...

First EU-report on Maritime Cyber Security

ENISA has published the first EU report ever on cyber security challenges in the Maritime Sector. This principal analysis highlights essential key insights, as...

Importance of Database Activity Monitoring

Database Activity Monitoring is a key process in the data protection suite of activities. Databases being the key place for data storage, database activity...

10 Vulnerable web applications for security testing

In this post I am listing a set of vulnerable web applications publicly made available for the purpose of security testing and training. ...

Burp Tools for Web Application Security

Web Application Security testing is a specialized process in security testing and Burp Suite of tools provides a set of tools which work together...

Database Activity Monitoring

Who has unlimited access to your data? None other than the database administrators. We do trust them, don.t we? Yep, what else we can...

Recent articles

spot_img