After the dust settled over Indian government’s demonetization scheme, the discussions on security systems of digital payments started making rounds.
Read more....
Wednesday, 18 January 2017
Aadhaar Payment is more vulnerable than any digital mode
Posted on 22:28:00 by karthick with No comments
Thursday, 5 January 2017
Statistics:Ransomware, An INfographic 2016
Posted on 01:41:00 by karthick with No comments
As we have started 2017, its time to look back ...
Subscribe to:
Posts (Atom)
My Blog List
-
The ultimate guide to Microsoft Security at RSAC 2025 - For RSAC 2025, Microsoft Security is bringing an exciting lineup of sessions, expert panels, and exclusive networking opportunities to empower security p...7 hours ago
-
Data Mining, Sandbox, Malware Classifier & Adversary Emulation - Data driven analysis to achieve any business or strategic goal, also commonly referred as Data Mining, is like finding a needle in a haystack. But when the...5 years ago
-
BIOS Boots What? Finding Evil in Boot Code at Scale! - The second issue is that reverse engineering all boot records is impractical. Given the job of determining if a single system is infected with a bootkit,...6 years ago
-
DellEMC Release of VMware vSphere 6.7 - This blog post is written by Vijay Kumar from Hypervisor Engg. Dell EMC VMware vSphere 6.7 is the next major release after the update release vSphere 6.5 U...6 years ago
-
The Culture Code of a Veteran - *Results, **Winning together, **Integrity, **Customers, and **Innovation.* Five statements that embody Dell’s Culture Code. Interestingly, they also ali...7 years ago
-