Archives for cybersecurity - Page 20


While threats like Ransomware, DDoS and Polymorphic Phishing have always been some of the notorious threats in cybersecurity, hackers today are shifting their focus and are trying out different approaches to attack systems. According to a research by Check Point threat intelligence, for the first time, a remote access Trojan dubbed as “FlawedAmmyy” has reached…
The post How Hackers Are Using Facebook To Distribute Remote Access Trojan (RAT) Malware appeared first on Analytics India Magazine.


In today’s fast-paced digital world, the rate of sophisticated, high-level cyber-attacks has increased exponentially. And while businesses are moving to Internet-based computing, the need for cybersecurity professional is also skyrocketing. When it comes to protecting proprietary data as well as customer information, companies cannot compromise with anything. If you are a cybersecurity enthusiast, it is…
The post 5 Cybersecurity Career Options All Tech Geeks Should Explore appeared first on Analytics India Magazine.


Despite high internet usage and smartphone penetration, India has lagged behind in implementing cybersecurity best practices. This includes the security of websites and government databases. The negative effects of this has been held off by the lack of intent for individuals to exploit the weaknesses. However, the field is quickly changing, with India becoming one…
The post RBI Increases Focus On Cybersecurity As India’s Digital Payment Craze Peaks appeared first on Analytics India Magazine.


Despite high internet usage and smartphone penetration, India has lagged behind in implementing cybersecurity best practices. This includes the security of websites and government databases. The negative effects of this has been held off by the lack of intent for individuals to exploit the weaknesses. However, the field is quickly changing, with India becoming one…
The post RBI Increases Focus On Cybersecurity As India’s Digital Payment Craze Peaks appeared first on Analytics India Magazine.


We live in a world that has become extensively digital, and the amount of data getting generated every single day by companies, organisations, governments, is also skyrocketing, posing significant hacking risks. If you look at it from a hacker’s point of view, an executive is definitely the HVT (high-value target) to hunt as they most…
The post Cyber Threats Are Getting Personal For CXOs — The Next High Value Target appeared first on Analytics India Magazine.


We live in a world that has become extensively digital, and the amount of data getting generated every single day by companies, organisations, governments, is also skyrocketing, posing significant hacking risks. If you look at it from a hacker’s point of view, an executive is definitely the HVT (high-value target) to hunt as they most…
The post Cyber Threats Are Getting Personal For CXOs — The Next High Value Target appeared first on Analytics India Magazine.


Today in this ever-competitive business world, it is imperative to make the most of social media — not only for the companies but for individuals as well. And if you are someone from the cyber security domain then it is advised to stay active on Twitter. Why? Because, it is the place where the talk…
The post 7 Cybersecurity Experts You Should Follow On Twitter appeared first on Analytics India Magazine.


Just last month, two high-profile data breaches occurred for varying reasons, showing how companies have fallen behind in ensuring that attack vectors are not covered. Stack Overflow, one of the biggest developer-centric sites in the world, reported last month that a data breach occurred on May 11th. With over 250 million users on the site,…
The post Hackers Strike Stack Overflow & Canva, It’s Time Tech Companies Get Serious About Security appeared first on Analytics India Magazine.


One of the most important tools in any Internet user’s arsenal should be a dependable VPN application. Virtual Private Networks, commonly known as VPNs, are integral towards protecting privacy and personal information on the Internet. VPNs protect data such as an individual’s IP address, which can pinpoint location among other things and can bypass censorship…
The post Virtual Private Networks (VPNs): Which Protocol Should You Use? appeared first on Analytics India Magazine.


Lately, ransomware has become very popular among hackers. It not only causes severe downtime but also leads to a significant amount of data loss. Ransomware is basically is a malware that is used to encrypt user data and block access to it. The data can only be accessed a ransom is paid to the hacker or the…
The post Why Dharma Ransomware Is More Dangerous Than Ever appeared first on Analytics India Magazine.

