Beware of Sarahah App

August 10th, 2017 / Sushobhan Mukherjee / 0 comments

Preface Sarahah is a website created by the developer from Saudi Arabia Zain al-Abidin Tawfiq. Sarahah means candor and honesty. It has become very popular in very short time because it allows you to send messages anonymously. After registration, you got a link which you can share your friends or post it publicly. Any person can send anonymous… View Article

Biometric Based Identity Verification

August 10th, 2017 / Prime Research Team / 0 comments

Biometric Based Identity Verification Biometrics use diverse technologies for measuring and analyzing physical human attributes such as fingerprints, eye retinas, voice patterns, facial expressions etc. for authenticating identities. Biometric Verification systems are rapidly gaining foothold in India over the past couple of years. Owing to an increased need for data security in several sectors, other… View Article

Insights of CCTV Surveillance

August 9th, 2017 / Prime Research Team / 0 comments

Close circuit television is a circuit, which is used to display images take videos and to keep a complete vigilance on the premises to avoid unwanted situation it is connected to display monitors, recording devices and cameras. It is pivotal to consider security important these days. It is not simply large scale organizations and business… View Article

Data Leakage using Social Fun App

August 6th, 2017 / Sushobhan Mukherjee / 0 comments

“What was the old age?” “Who is your favorite friend?” “How many lovers you have?” “Which celebrity looks alike you?” “Who will kill you?” Do you feel you have heard these questions several times in recent past? Yes you are right. This are the questions and answers generate by a Fun App Named “Testony” (https://en.testony.com/ )…. View Article

Terrifying Cyber Crime Through ‘Blue Whale Challenge’

August 5th, 2017 / Sushobhan Mukherjee / 0 comments

Preface Trust you have already heard about the death game named ‘Blue Whale Challenge’. The same is in news in India post the suicide incident of a Kid in Mumbai, India. The “Suicide Game” involves 50 twisted tasks before taking your own life to “win.” A 14-year-old Manpreet Singh, a Class IX student in Mumbai,… View Article

Vulnerability Assessment versus Penetration Testing

August 3rd, 2017 / Sudipta Biswas / 0 comments

As information security professionals, most of us are familiar with vulnerability assessments and Penetration testing (pen tests for short). Both are valuable tools that can benefit any information security program and they are both integral components of a Threat and Vulnerability Management process. Are These Information Security Services the Same? The two are often incorrectly… View Article

Important of PCI-DSS Compliance

July 29th, 2017 / Prime Research Team / 0 comments

The Payment Card Industry Data Security Standard (PCI DSS) V3.2 is an information security standard for any company that handles cardholder information for the major credit card providers. The five global payment brands — American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. — incorporate the PCI DSS in each of their… View Article

Security Concerns on Cloud

July 28th, 2017 / Sushobhan Mukherjee / 0 comments

WHAT IS THE CLOUD? The cloud is a term that many people find difficult to describe, even though most everyone uses it. If you use Google Cloud, AWS, Microsoft Azure or any sort of online storage, you’re already on the cloud. Savvy businesses use the cloud for their infrastructure because there are so many advantages. So… View Article

Current Geopolitics and Cyber Security – Part I

July 24th, 2017 / Pritam Bhattacharyya / 0 comments

One may ask as what can be the connection between geopolitics and cyber security. The purpose of this series of works is to discover that connection and then from these premises try to set out the direction of this global theme of Cyber security in the context of India It is very unfortunate that India,… View Article

Understanding the Structural Issues of Cyber security

July 18th, 2017 / Pritam Bhattacharyya / 0 comments

The Centralization Strikes back! One of the reasons of Internet’s exponential growth was the lack of centralized control – in all its aspects. In the early days of the millennium, both the creators and the users of the “invention” called Internet were amazed at their achievement. Internet was called “dumb network” and many commentators attributed… View Article