Select Page

List of Disk wipe software

People and organizations dispose of their computers including the Hard drives when no more needed or considering that they are obsolete. The media such as hard drives, USB etc when disposed of may contain confidential information vital to you or your organization....

Building an Information Security Plan

Building a comprehensive Information Security plan requires a detailed understanding of the business and the related requirements. An Information Security plan should ensure that the business requirements are captured and the related risks and controls are addressed...

Typical data leakage scenario.s

Data leakage is a key threat which could give sleepless nights for any business executive and is definitely on the top priority of the CISO’s and information security managers.I have looked into the DLP scenario’s and various solutions. I have not found a...

Drive-By Pharming

Sid Stamm, Zulfikar Ramzan, and Markus Jakobsson have identified a clever, and potentially devastating, attack against home/wireless routers. How does the attack works? Attacker creates a webpage with containing the malicious Javascript code. Victim visits the page...