Learn what Asymmetric Encryption is, how it works, and what it does
When it comes to the word ‘Encryption,’ we think of it as a technique that protects data using a cryptographic key, and there’s nothing wrong with this. However, what most people don’t realize is that there … Read More
IBM lays out the biggest cybersecurity threats for next year
We’re fast approaching the end of 2017. And while it’s been a busy year, including countless cyber-attacks and a browser push for HTTPS, it’s time to begin looking forward to next year.
Cybersecurity is a very nuanced concept. There … Read More
The never-ending debate of FBI vs Apple is getting tiresome. Here’s why the FBI just cannot crack an iPhone on its own.
We might be about to witness another high-profile clash between two mighty forces – the FBI and Apple. Addressing a news conference on Tuesday, Chris Combs, FBI special … Read More
Encryption backdoors may actually help terrorists instead of stopping them
What’s common amongst UK, US, Australia, Germany and almost every country on the planet? They all don’t like Encryption. That’s why we see repeated (and absurd) calls to curb Encryption in the name of stopping terrorism.
Seriously, that cassette has … Read More
The latest report by Verizon shows that online businesses are less likely to be breached if they’re PCI compliant
The Payment Card Industry Data Security Standard (PCI DSS), is a set of security guidelines applicable to all organizations that accept, store, and process credit card information. The PCI DSS is … Read More
The ghost of data breach is back and Sweden is its latest victim
Gone are the days when an incoming news of a data breach used to surprise us. The number of data breaches has been so high this year that it is already being dubbed as ‘The year of … Read More
Enforce these measures for securing your Drupal website
Drupal is an open-source content management system (CMS) written in PHP. It provides a complete framework for developers. Around 2.3% of the world’s website have adopted Drupal to manage their content. These websites range from blogs to corporate sites and even some … Read More
Identify and Prevent the Rising Force of Phishing Attacks
When we think of hackers and cyber criminals, we tend to think of them as masterminds wearing hoodies, shutting down websites with their out-of-this-world coding skills (and godly swagger of course!). Well, that’s not always the case. Using a simple yet … Read More
Comply with the PCI standards and stay clear of troubles
The Payment Card Industry Data Security Standard (PCI DSS), is a set of security guidelines applicable to all organizations which accept, store and process credit card information. To make online transactions more secure than ever before, the Payment Card Industry … Read More
Following the London Terrorist Attack, Britain’s Prime Minister Theresa May has once again singled out the usual scapegoat–the Internet
One more terrorist attack and again, scathing attacks against Encryption are pouring in. This time, it is the Prime Minister of United Kingdom is in the driving seat of “Control the … Read More