Let’s think about all the amazing moments we have lived through the last year digitally. Confined to the comfort and security of our homes, our digital lives blossomed. Photos, blogs, comments on websites, and much more were shared online. Just... Read more
The notorious REvil Ransomware gang is back in news, and for all the wrong reasons. This time they have carried out a cyber-attack on the makers of apple products. However, they have mysteriously removed the apple schematics from their data leak... Read more
The adoption of IoT devices by users across the world has been directly proportional to the interest of cybercriminals in it. The attacks on IoT devices are growing by the day and attackers are trying to find new ways to exploit the smart device... Read more
A system of communication is underpinned by the principle of end-to-end encryption by only letting the communicating users read the messages. This is put in place to prevent any potential eavesdroppers from accessing the cryptic keys needed to d... Read more
The structure in which security groups are usually constructed to respond and protect against cyber threats is highly flawed. The constant disconnect between where and how security policies are framed, security is enforced, and security is audit... Read more