After the dust settled over Indian government’s demonetization scheme, the discussions on security systems of digital payments started making rounds.
Read more....
Wednesday, 18 January 2017
Aadhaar Payment is more vulnerable than any digital mode
Posted on 22:28:00 by karthick with No comments
Thursday, 5 January 2017
Statistics:Ransomware, An INfographic 2016
Posted on 01:41:00 by karthick with No comments
As we have started 2017, its time to look back ...
Subscribe to:
Posts (Atom)
My Blog List
-
Stopping attacks against on-premises Exchange Server and SharePoint Server with AMSI - Exchange Server and SharePoint Server are business-critical assets and considered crown-jewels for many organizations, making them attractive targets for...1 day ago
-
Data Mining, Sandbox, Malware Classifier & Adversary Emulation - Data driven analysis to achieve any business or strategic goal, also commonly referred as Data Mining, is like finding a needle in a haystack. But when the...5 years ago
-
BIOS Boots What? Finding Evil in Boot Code at Scale! - The second issue is that reverse engineering all boot records is impractical. Given the job of determining if a single system is infected with a bootkit,...6 years ago
-
DellEMC Release of VMware vSphere 6.7 - This blog post is written by Vijay Kumar from Hypervisor Engg. Dell EMC VMware vSphere 6.7 is the next major release after the update release vSphere 6.5 U...6 years ago
-
The Culture Code of a Veteran - *Results, **Winning together, **Integrity, **Customers, and **Innovation.* Five statements that embody Dell’s Culture Code. Interestingly, they also ali...7 years ago
-