by Binoy KL | Jan 30, 2012 | Videos
Stuxnet is rumoured to be the first virus code of the type of a cyber weapon. There are so many rumours about this virus and what its targets are. Keeping those rumours aside, some of the key points to consider are: The source code of the Stuxnet is openly...
by Binoy KL | Jan 30, 2012 | Corporate Security, Data Protection
Advanced persistent threat has made headlines when it hit big names like SONY, Symantec, RSA etc. APT is a stream of cyber crime with a focus on specific entities. This focus makes it different from other types of attacks. APT threats are focused on specific targets...
by Binoy KL | Jan 28, 2012 | Cloud Security, Standards & Compliance
Cloud computing is gaining its popularity in an accelerated mode and many businesses and government entities are adopting cloud computing for supporting their business needs. NIST has recently released a a special publication on .Guidelines on Security and Privacy in...
by Binoy KL | Jan 25, 2012 | Cyber Warfare
In the last two weeks, there is a lot of hacking events occurred in the middle east region. Supporters of two countries have exchanged cyber warfare showing their might. In this event, there were lots of websites defaced, lot of data made available publicly, credit...
by Binoy KL | Jan 25, 2012 | Security News
Sitting in his Los Angeles home, Kuwaiti billionaire Bassam Alghanim received an alarming call from a business associate: Hundreds of his personal emails were posted online for anyone to see. Mr. Alghanim checked and found it to be true, according to a person familiar...
Recent Comments