@Security & Compliance
Reimagining The Credit And Debit Card
QR code based cards can radically transform the ease of payments and also help reduce the capital/operational expenses of merchants, and most importantly revamp the security.
Petya More Lethal Than Wannacry: India On A ‘Restore’ Mission
Petya’s fallout is expected to be gruesome than Wanncry, which mainly locked out a lot of intellectual property, but the former is not only exploiting the same EternalBlue vulnerability but has added to the loop that was exposed from prior leaks...
Petya Ransomware Wreaks Havoc Across The Globe
A massive outbreak was caused by malicious software update for M.E. Doc, a accounting software used by Ukrainian companies.
Malware Targeting Linux On The Rise, Shows Study
Linux malware is on the rise, indicating that the cyber security battleground is gradually shifting to Linux and Web Servers, according to a new study.
Trickbot, A New Threat to Indian Online Banking
Recently, Trickbot added a couple of Indian Banks to its configuration viz. SBI Bank and ICICI considering their huge consumer base.
BlackBerry’s ‘Enterprise of Things’ To Enhance How We Work
The Canadian handset maker has announced productivity and security enhancements to its enterprise software platform.
Indian Firms May Lose Rs 11 Cr To Data Breaches This Year: IBM
The number of breached records per incident for Indian organizations surveyed in this year’s report ranged from 4,000 to 98,000 compromised records.
Online Banking Hacks Cost Banks $1.8 Mn Each
The report shows that when organizations are attacked by DDoS, customer-facing resources suffer more in banking, than in any other sector.
Facebook Is Using AI To Thwart Global Terrorism
Facebook experts believe the social media site has an answer to this growing menace in the form of leveraging artificial intelligence.
Most IoT Devices Are Vulnerable To Exploitation: Wipro
The study found that majority of the security products were themselves vulnerable to exploitation and CISOs will be required to keep track of vulnerabilities in the security products themselves.