After the dust settled over Indian government’s demonetization scheme, the discussions on security systems of digital payments started making rounds.
Read more...
My Blog List
-
Think before you Click(Fix): Analyzing the ClickFix social engineering
technique
-
The ClickFix social engineering technique has been growing in popularity,
with campaigns targeting thousands of enterprise and end-user devices
daily. Th...
1 day ago
-
Data Mining, Sandbox, Malware Classifier & Adversary Emulation
-
Data driven analysis to achieve any business or strategic goal, also
commonly referred as Data Mining, is like finding a needle in a haystack.
But when the...
6 years ago
-
BIOS Boots What? Finding Evil in Boot Code at Scale!
-
The second issue is that reverse engineering all boot records is
impractical. Given the job of determining if a single system is infected
with a bootkit,...
7 years ago
-
DellEMC Release of VMware vSphere 6.7
-
This blog post is written by Vijay Kumar from Hypervisor Engg. Dell EMC
VMware vSphere 6.7 is the next major release after the update release
vSphere 6.5 U...
7 years ago
-
The Culture Code of a Veteran
-
*Results, **Winning together, **Integrity, **Customers, and **Innovation.*
Five statements that embody Dell’s Culture Code. Interestingly, they also
ali...
8 years ago
-
0 comments:
Post a Comment