Archives for hacking - Page 2

25 Jul

How To Keep Your Organisation Safe From Logic Bombs

image-6052
image-6052

Companies across the world have shifted their focus from old-school cyber threats to all the advanced security breaches. However, things have changed in this sector — black hats have started to make the best use of old hacking methods by tweaking them a little. One such attack is Logic Bomb. What Is A Logic Bomb…

The post How To Keep Your Organisation Safe From Logic Bombs appeared first on Analytics India Magazine.

17 Jul

7 Cybersecurity Internships To Apply For Right Now

image-5873
image-5873

With the increasing amount of data in organisations, the ratio of cybercrime has also increased exponentially. Both large and small organisations are facing data breaches and hack more frequently nowadays. To mitigate these issues, companies are hiring cybersecurity professionals with a good pay scale. According to sources, the demand for cybersecurity professionals will increase to…

The post 7 Cybersecurity Internships To Apply For Right Now appeared first on Analytics India Magazine.

03 Jul

Deep Dive: SonicWall Doubles Down On AI & Automation To Fight Cyber Attacks

image-5506
image-5506

A recent SonicWall Cyber Threat Report indicated that ransomware attacks were up in every geography except India, which saw a 49% reduction, and the U.K. However, India still has a major uphill task in combating malware, where attacks rose by 53% in 2018. For our weekly column Deep Dive we talked to the Debasish Mukherjee,…

The post Deep Dive: SonicWall Doubles Down On AI & Automation To Fight Cyber Attacks appeared first on Analytics India Magazine.

21 Jun

Is Polymorphic Phishing The Next Big Threat In Cyber Attacks?

image-5254
image-5254

In the data-driven business world everyone in an organisation — from employees to CEO, use email on a day to day basis. The use of email has reached such a level that it has now even become a top cyberattack vector, and cybercriminals are persistently targeting high-value individuals through phishing emails who have privileged access…

The post Is Polymorphic Phishing The Next Big Threat In Cyber Attacks? appeared first on Analytics India Magazine.

17 May

5 Things To Consider Before Opting For A Secure Web Gateway

image-4596
image-4596

Over the last few years, IT has undergone a tremendous transformation.  Today, from infrastructure to applications to data — almost everything— is moving to cloud. Whether it is either the public or private cloud infrastructure, cloud technology has revolutionized the IT ecosystem. However, today this is the same thing is throwing questions globally about how…

The post 5 Things To Consider Before Opting For A Secure Web Gateway appeared first on Analytics India Magazine.

16 May

Understanding The 5 Factors Of Multi-Factor Authentication

image-4553
image-4553

Since the very beginning, the internet has been an important part of our lives — it has made many aspects of life smoother. However, nothing comes without cons — with all the benefits that people are getting on a daily basis from the internet, they are neglecting their personal and professional data security. Cyber-attacks over…

The post Understanding The 5 Factors Of Multi-Factor Authentication appeared first on Analytics India Magazine.

15 May

All You Need To Know About The Recent WhatsApp Hack & How To Secure Your App

image-4543
image-4543

Another day, another hack! The world has once again witnessed one of the notorious cyber-attacks — Facebook-owned WhatsApp recently made headlines as it the world-renowned messaging platform recently patched a severe vulnerability that was being exploited by attackers. Also, The vulnerability CVE-2019-3568 was so severe that it allowed cybercriminals to compromise the platform and install…

The post All You Need To Know About The Recent WhatsApp Hack & How To Secure Your App appeared first on Analytics India Magazine.

23 Apr

In The Wake of JustDial Data Breach, These Cybersecurity Best Practices Can Keep Your Organisation’s Data Safe

image-4089
image-4089

The world has witnessed several high-profile cyber-attacks in the past couple of years, and while many companies across the globe have learnt from the downfalls of the victim companies, there are companies that are lagging in implementing cybersecurity frameworks in their organisations. One of the most recent instances is data leak of JustDial’s unprotected database.…

The post In The Wake of JustDial Data Breach, These Cybersecurity Best Practices Can Keep Your Organisation’s Data Safe appeared first on Analytics India Magazine.

23 Apr

In The Wake of JustDial Data Breach, These Cybersecurity Best Practices Can Keep Your Organisation’s Data Safe

image-4090
image-4090

The world has witnessed several high-profile cyber-attacks in the past couple of years, and while many companies across the globe have learnt from the downfalls of the victim companies, there are companies that are lagging in implementing cybersecurity frameworks in their organisations. One of the most recent instances is data leak of JustDial’s unprotected database.…

The post In The Wake of JustDial Data Breach, These Cybersecurity Best Practices Can Keep Your Organisation’s Data Safe appeared first on Analytics India Magazine.

07 Mar

5 Indian Bug Bounty Programs Every White Hat Hacker Can Try

image-3106
image-3106

Whether you talk about building software or finding vulnerabilities in an existing platform, Indians over the years have marked their territory in the technology space and now hacking as a hobby has gained prominence with India having the highest base of white hat hackers. According to a recent report,  bug hunting has proven to be…

The post 5 Indian Bug Bounty Programs Every White Hat Hacker Can Try appeared first on Analytics India Magazine.