It seems that 2016 has been the year of immense DDoS attacks, many coming from Mirai. This seems to be a newcomer though ending the year with a 650Gbps DDoS attack.
Read more....
Wednesday, 28 December 2016
Monday, 26 December 2016
Cyber Security Predictions 2017
Posted on 23:32:00 by karthick with No comments
We believe 2017 will bring its own share of challenges to security teams.
Increased cyber attacks on Big Data through application layer, IoT business must adopt a Multi Factor Authentication, strong PCI compliance standards as a strong policy to prevent such attacks.
read more...
Tuesday, 20 December 2016
Stay immune to the latest ransomware threats using behavioral analysis
Posted on 04:01:00 by karthick with No comments
With hundred of thousands of ransomware variants emerging every day, it is quite difficult for traditional signature-based antivirus tools to keep their signature database up-to-date.So, if signature-based techniques are not enough to detect ransomware infection, then what else can we do?
The solution is RansomFree, the most advanced behavioral monitoring too...
Saturday, 17 December 2016
1-Billion Yahoo Users' Database Reportedly Sold On Dark Web
Posted on 00:30:00 by karthick with No comments
Recently Yahoo disclosed a three-year-old massive data breach in its company that exposed personal details associated with more than 1 Billion user accounts, which is said to be the largest data breach of any company ever.
Read More...
Tuesday, 29 November 2016
Dharma and Karma: A Tale of Two Ransomwares | www.cioandleader.com
Posted on 03:19:00 by ivajrasecurity with No comments
Dharma and Karma: A Tale of Two Ransomwares | www.cioandleader....
Thursday, 24 November 2016
Posted on 00:44:00 by karthick with No comments

Ransomware Decryption ToolsRansomware is malware that locks your computer or encrypts your files. You can’t get the data back unless you pay a ransom, and even if you do, there’s no guarantee that you’ll get your data back.
Ransomware Decryption Tools – an ongoing list
The following statistics would explain the type of Ransomware that emerged since 2005.
Due to emerging of sophisticated Ramsonwares in the Internet, there are no finite...
Wednesday, 23 November 2016
Ransomware prevention best practices - OSCE and WFBS
Posted on 05:17:00 by ivajrasecurity with No comments
Ransomware prevention best practices - OSCE and W...
ɢoogle.com And Google.com Aren’t Same — Stay Away From The Fake Google
Posted on 02:44:00 by ivajrasecurity with No comments
As fishy as it sounds, so true that it exists. The most used google search engine has been the target of spammers to spam user computers. Beware!!!
ɢoogle.com And Google.com Aren’t Same — Stay Away From The Fake Google: Spammers are using a fake Google domain to trick yo...
Tuesday, 4 October 2016
Who owns your Cyber Security Data?
Posted on 02:34:00 by ivajrasecurity with No comments

With significant visible risks in many markets throughout the globe, many decision owners are afraid to make the decision to add a layer of real-time security because they’re concerned that they may not be able to manage an additional cost and time factor. This can be a real problem, but if you are seeking to protect your business data in the data-driven world—whether to upgrade or find a new solution—there are a few ways to combat...
Subscribe to:
Posts (Atom)
My Blog List
-
Tech Accelerator: Azure security and AI adoption - During the Tech Accelerator event on April 22, 2025, you will learn how to leverage Microsoft security guidance, products, and tooling throughout your cl...1 day ago
-
DellEMC Release of VMware vSphere 6.7 - This blog post is written by Vijay Kumar from Hypervisor Engg. Dell EMC VMware vSphere 6.7 is the next major release after the update release vSphere 6.5 U...6 years ago
-
The Culture Code of a Veteran - *Results, **Winning together, **Integrity, **Customers, and **Innovation.* Five statements that embody Dell’s Culture Code. Interestingly, they also ali...7 years ago
-
-
-