Card Skimming has become one of the biggest threats in payment card space. Lingering magnetic-stripe technology, rather than the advanced EMV chip standard used in Europe and elsewhere, is part of the problem. Continue reading “Emerging technologies to improve card security”
Mobile Security Software Suite – New Launches
Mobile security concerns have dominated security discussions of late. Conventional threats have also been increasingly applied for mobile based appliances and security companies have introduced products catering to this space. Continue reading “Mobile Security Software Suite – New Launches”
Auditing System Impact on Performance – Windows
A lot of questions are raised regarding the effect of auditing on the performance of systems.
Continue reading “Auditing System Impact on Performance – Windows”
Tech Demystified: Blade Servers – The Cutting Edge
Security Threats through Social Networking Sites
Social Networking Sites such as Facebook, Twitter have become increasingly popular, but so has security issues specific to these sites. Continue reading “Security Threats through Social Networking Sites”
Malwares threats for Defence Establishments
Increasing use of IT in defense establishments is exposing them to the risks from cyber attacks. Alongwith conventional forces such as Army, Air force and Navy it is time that countries look at Cyberspace. A recent news article explains how the US defense was subject to malware attack from a flash drive. Continue reading “Malwares threats for Defence Establishments”
Your spy is sitting in your office corner
Do you know that your hi-tech copier machine is secretly capturing your confidential information? Not many of us know that. But the fact is hi-tech copiers and multi-function printers / scanners come with hard disks which retain the images of the documents copied. Continue reading “Your spy is sitting in your office corner”
A fool with a tool is still a fool
A good log management tool can be very effective in managing and ensuring security in an enterprise. However, the right tool can quickly become the wrong tool unless the organisation puts in the time and effort required to make the tool effective.
Here are a few best practices to ensure a successful implementation of a log management tool:
Secure your wireless router before it is too late
Most of us use wireless routers at office and home. While the office routers are generally secured (hopefully), most home routers are provided by broadband operators wih default configurations and passwords. In a worst case it may happen that these are set as unsecured. There is increasing risk of an intruder using an unsecured network or hacking into a home wireless network and sending out malicious mails. Continue reading “Secure your wireless router before it is too late”
Tech Demystified – WiMAX
During the recent BWA auctions, the government has earned a lot of revenue to mitigate a part of its burgeoning fiscal deficit. But very few people know what this technology is and its superiority over the current technologies. So lets have a spot light on this technology. Continue reading “Tech Demystified – WiMAX”
