Don’t Let The Ghost Spook You
Recently, a security loop hole named Ghost Vulnerability has been found haunting Linux operating systems. This vulnerability lets a hacker gain complete control over the compromised system. Given that Linux…
Recently, a security loop hole named Ghost Vulnerability has been found haunting Linux operating systems. This vulnerability lets a hacker gain complete control over the compromised system. Given that Linux…
Wegilant, an emerging android application security company has come up with the enterprise version of it’s flagship product Appvigil which helps to build secure android apps. Appvigil is a perfect…
Managing identities and access is critical to the success of the Internet of Things (IoT), but in its current form identity and access management (IAM) cannot provide the scale or…
As IoT heralds a big change in the world around us, greater attention needs to be given to making our environment more manageable and secure It wasn’t that long ago that…
Waitan released its StellaHunter series rugged solid state drives with unprecedented methods of executing military secure erase and self-destroy function via remote control, access and command based on its proprietary…
2014 witnessed a number of high-profile threats, with bugs such as Heartbleed, Shellshock, and Cryptolocker causing quite a few alarms and disruptions to many Developers, System Administrators and online security…
Happiest Minds announced its upgraded version of Cloud based penetration testing, ThreatVigil, which will offer an intuitive *mobile penetration testing module encompassing Android, iOS and Windows platforms. This expansion to…
Kaspersky Lab introduces its new mobile application – Kaspersky QR Scanner. This program is compatible with Google Android and Apple iOS and can not only read information from QR codes,…
The number of Internet-connected devices, such as vehicles, smart meters and home monitoring systems, is predicted to reach in the billions by the year 2020. As a result, Verizon is…
F5 Networks announced the next version of its F5 BIG-IQ, the company’s intelligent management framework that provides a single point of integration for administering and orchestrating security and application delivery…
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More