• Don’t cry….

    ….just remain vigilant about security issues surrounding you! The ‘Wanna Cry’ ransomware is the talk of the world having affected 150 countries including India, Spain, Britain, parts of Europe and crippling 2,00,000 systems globally.

  • Definition: Risk analysis

    Risk analysis is a tool to implement risk management. Before we go onto see the definition of risk analysis, recall that a vulnerability is “weakness” in the system and the “risk” is the threat agent exploiting the vulnerability. Some examples of the three concepts working together are when a vulnerability like an unpatched application is more

  • Definitions: Top-down approach to security

    The top-down approach to security is when an information security program moves ahead with management approval. The appropriate security funding is secured and there is a proper plan and direction towards the program. This approach is more efficient and generates better results. In short, the top-down approach is a more active and serious approach to more

  • Firewalls!

    Irrespective of our profession we have all encountered the term “firewalls” in our life. We are all glued to our laptops or mobile devices and are constantly engaged in business or personal conversations all the time.  These digital and electronic conversations will sooner or later bring the malicious part of the Internet into play. We more

  • Password cracking!

    “Password” is the simplest and easiest way to authenticate a user. It is also one of the most easily understood ways to authenticate a user. Recall, that authentication is the process of uniquely identifying a user and making sure that “they are who they are”. The username and password combination is the defacto method of more

  • Introduction to Java

    We see programming languages all around our digital lives and there have been a few languages that have stood the trials and tribulations of time. Each language is created with a different purpose and sometimes, the whole motive behind it erodes with new technologies.

  • Captcha!

    Have a look at the image below: Are you squinting and trying to hard to figure what is written in the phrase below? This was the ‘Captcha’ phrase that was used to differentiate between ‘humans’ and ‘bots’. This has been slowly replaced by the new ‘reCaptcha’. Before we get into the details of the ‘reCaptcha’ more

  • Defense in depth

    Each year we hear of numerous security breaches or incidents. Name any organization/social media site and there is a possibility, that you too would have received a message “that there was a security breach but your information may have been compromised or your information is safe”. Given the magnanimity of today’s security scenario, wherein even non-security professionals more

  • Tails

    We are constantly leaving a large digital footprint while we are moving around the virtual world. These digital footprints cause privacy conscious individuals(and other individuals with different purposes) to seek operating systems and browsers that give more anonymity. . ‘Tails’  ‘the amnesic incognito live system’  is synonymous with anonymous surfing and the perfect OS to more

  • DMZ

    Introduction: Ignorance may make us think that the Internet is a safe place – but the unseen forces that rule the Internet(such as hackers and other network detection tools) always seek to gain an entry into strategic business networks and home networks. The information security industry has borrowed the concept of ‘demilitarization’ from the army more