Cyber Security

CYBER SECURITY TRENDS 2018

DailyPost 461 CYBER SECURITY TRENDS 2018 Since 2014, Cyber Security has continually reminded the number one security threat to the world. WannaCry, Petya and backend ISIS of the Cyber World, Lazarus, hogged the international news headlines in 2017. Phishing becomes the most favoured initial access methodology and ransomware the ultimate tool. Machine Learning & Artificial […]

CYBER SECURITY TRENDS 2018 Read More »

COMMODITIZING RANSOMWARE – AS A SERVICE

DailyPost 457 COMMODITIZING RANSOMWARE – AS A SERVICE Modern business landscape has a paradigm shift to Subscription Economy. This model is not limited to Netflix & Spotify, Ransomware-as-a Service has gained currency. This system allows anybody with a internet connection, regardless of their technical literacy, to purchase powerful ransomware via the Dark Web & carry

COMMODITIZING RANSOMWARE – AS A SERVICE Read More »

CRITICAL INFORMATION INFRASTRUCTURE.

DailyPost 448 CRITICAL INFORMATION INFRASTRUCTURE. At the backend of every critical infrastructure is a critical information infrastructure, which keeps it moving. This is the nervous system of the critical information infrastructure as all communications & operations is nearly fully controlled by this system. From banking to power to oil, all that propels our existence is

CRITICAL INFORMATION INFRASTRUCTURE. Read More »

NSA

DailyPost 436 NSA : Do they know all?  Lead by the National Security Agency, NSA, US’s 17 intelligence agencies see the world differently. Shrouded in secrecy, with an estimated US spending of $ 72 billions on intelligence, more than rest of the world combined, is an information regime, for accessing, collecting & analysing every single

NSA Read More »

CCTV PROTOCOL

DailyPost 417 CCTV PROTOCOL CCTVs have become all pervasive,  for good, bad or the ugly, it is here to stay.  These networks provide the live & video footages generally of public places,  as our personal pictures & videos. The huge demand & so  small to big projects are developing as a jungle growth,  not able

CCTV PROTOCOL Read More »

Scroll to Top