21.9 C
Bengaluru

Personal Security

Last week New York Times revealed that former USA state secretary Hillary Clinton used a private email account instead of official email address for communications while serving the State department. It is reported that Clinton used...
It is a no brainer to mention that cyber crime is increasing and today, the focus is more on money & cyber war than anything else. We see a lot of such incidents these days including...

Identity Protection Services

Identity theft is on the increase. Everyday we hear stories about identity theft by hackers and millions of identifies are on sale after such...

Free Firewall from Checkpoint

Checkpoint is getting into the Free Antivirus game by offering its ZoneAlarm antivirus software as a free consumer product for the first time, adding...

PCI DSS compliance and Password policy

Usernames and passwords is still the major method of authenticating users to the systems. It would be difficult to find someone without a user...

10 resolutions for New Year 2012

All of us take resolutions in the new year. What is followed and what will be left out are points of discussion beyond this...

Hack attack underscores danger of reusing passwords

The fallout from a hacking attack on Gawker Media Inc. a week ago underscores a basic security risk of living more of our lives...

People – Walking threat

Kevin Mitnick, the legendary hacker once said, "People are the weakest link. You can have the best technology, firewalls, intrusion-detection systems, biometric devices -...

Infosys CEO: People willing to trade privacy for tech benefits

"You allow that privacy to be compromised for a benefit," says CEO Kris GopalakrishnanPeople are willing to adjust their ideas about privacy if...

Microsoft Security Essentials . First impression

Recently I have decided to replace my current anti-virus software with Microsoft Security Essentials. So last weekend I have done this exercise. My initial...

Secure your password

Authentication is nothing but the process of validating the user, ensuring that you are who you say you are. There...

Recent articles