Archive
Which is the latest Wordpress version that has been released on date? What vulnerabilities have been covered in the latest release? What is the additional features provided by the new version? The earlier versions were exposed to XSS attacks. Have these been taken care of? What is a cross site request forgery and what are its implications? |
Read more
How could Social Media be the next frontier for threat for IT security professionals and the companies they protect? How big is the threat posed by issues like unauthorized social media accounts, account hijacking and content threat etc? Does it make sense to pay to protect my company’s image in the social media ? |
un:yes'>
Read moreThe recent news about the Home Depot Breach has raised a very important question about the security and integrity of the Point Of Sale systems. Why is it that such large multi nationals have been falling prey to persistent hackers and have not been able to plug their security loop holes? |
Read more
Neverquest is a banking malware that facilitates the stealing of financial data. The malware follows the CaaS business model. What are the implications of this? How does Neverquest malware spread to new victims? What is the effect of a Neverquest infection on a target and how does it affect his banking transactions? |
Read more
Microsoft has announced that as a result of it stopping support to the Windows XP version in April, 2014, XP users can now be be exposed to a zero day forever risk. This threat will arise from reverse engineered security patches for its new versions. What does this mean and what is the solution for XP users? |
Read more
Xbox Owners have claimed inability to connect to Xbox Live. Users have reported issues in signing in from the Xbox consoles and from Xbox.com. Is the issue a denial of service attack as reported by a hacker group? What is a DOS attack and what are the consequences of such an attack on the website? |
Read more
Samsung and Google have announced the usage of app containerization to separate the phone into two halves-personal and corporate. This method might be fundamental in improving security for mobile devices finding increased usage in business. However will users find it easy to flip between two modes of operation? What could be at risk here? |
Read more
With respect to improving security for mobile devices, original equipment owners are now moving the security measures to their operating systems. Apple is one OEM which has adopted this approach. Is this a sound rationale to improve safety of usage for these devices? What could be the possible drawback of such a move? |
Read more
How has the increased usage of mobile devices (like the I-Phone) become a security concern to those in charge of network security? Is it possible to secure such devices so that they don’t become the weak links in the security chain? What are the measures that one could adopt towards this purpose? |
Read more
What is Near Field Communication (NFC)?what is its relevance with respect to the working of mobile devices? What is the technology that is behind NFC? What is its similarity to Bluetooth? How is it different from the Bluetooth technology? How would NFC enhance the security of transactions made via mobile devices? |
Read more