A brief on India’s Cyber Security Status

October 17th, 2017 / Prime Research Team / 0 comments

The biggest story of 2016 is undoubtedly the alarming rise of cyber crime. A look at global IT industries explains that we’re facing a lack of efficient professionals. According to the Cyber Security Ventures ‘Cyber Security Jobs Report’, there were 1 million cyber security job openings in 2016. The number is expected to grow to… View Article

5 Strategies for Cyber Security in Small Business Organizations

October 16th, 2017 / Prime Research Team / 0 comments

If you’re a small business organization, there is absolutely no reason for you to neglect cyber security. Not spending on security or relying on outdated software to protect your data – both are equally bad ideas. Here are a few ways you should undertake to prevent damage to the reputation of your business repute: Backups:… View Article

After WannaCry, Mamba and Locky ransomware return to India

September 4th, 2017 / Sudipta Biswas / 0 comments

Mamba ransomware attack is known to be the nastiest malware of all, as instead of affecting files, it takes over the entire hard disk. What is Mamba ransomware? Mamba ransomware is believed to be the worst of all malware as it encrypts hard drives, instead of just files. It scrambles every sector on the hard… View Article

Vehicle Tracking Solution

September 1st, 2017 / Prime Research Team / 0 comments

What is Vehicle Tracking System? A vehicle tracking system combines the use of automatic vehicle location in individual vehicles with software that collects these fleet data for a comprehensive picture of vehicle locations. Modern vehicle tracking systems commonly use GPS or GLONASS technology for locating the vehicle, but other types of automatic vehicle location technology can also be used. Vehicle information can be viewed on electronic maps via the… View Article

Beware of Sarahah App

August 10th, 2017 / Sushobhan Mukherjee / 0 comments

Preface Sarahah is a website created by the developer from Saudi Arabia Zain al-Abidin Tawfiq. Sarahah means candor and honesty. It has become very popular in very short time because it allows you to send messages anonymously. After registration, you got a link which you can share your friends or post it publicly. Any person can send anonymous… View Article

Biometric Based Identity Verification

August 10th, 2017 / Prime Research Team / 0 comments

Biometric Based Identity Verification Biometrics use diverse technologies for measuring and analyzing physical human attributes such as fingerprints, eye retinas, voice patterns, facial expressions etc. for authenticating identities. Biometric Verification systems are rapidly gaining foothold in India over the past couple of years. Owing to an increased need for data security in several sectors, other… View Article

Insights of CCTV Surveillance

August 9th, 2017 / Prime Research Team / 0 comments

Close circuit television is a circuit, which is used to display images take videos and to keep a complete vigilance on the premises to avoid unwanted situation it is connected to display monitors, recording devices and cameras. It is pivotal to consider security important these days. It is not simply large scale organizations and business… View Article

Data Leakage using Social Fun App

August 6th, 2017 / Sushobhan Mukherjee / 0 comments

“What was the old age?” “Who is your favorite friend?” “How many lovers you have?” “Which celebrity looks alike you?” “Who will kill you?” Do you feel you have heard these questions several times in recent past? Yes you are right. This are the questions and answers generate by a Fun App Named “Testony” (https://en.testony.com/ )…. View Article

Terrifying Cyber Crime Through ‘Blue Whale Challenge’

August 5th, 2017 / Sushobhan Mukherjee / 2 comments

Preface Trust you have already heard about the death game named ‘Blue Whale Challenge’. The same is in news in India post the suicide incident of a Kid in Mumbai, India. The “Suicide Game” involves 50 twisted tasks before taking your own life to “win.” A 14-year-old Manpreet Singh, a Class IX student in Mumbai,… View Article

Vulnerability Assessment versus Penetration Testing

August 3rd, 2017 / Sudipta Biswas / 0 comments

As information security professionals, most of us are familiar with vulnerability assessments and Penetration testing (pen tests for short). Both are valuable tools that can benefit any information security program and they are both integral components of a Threat and Vulnerability Management process. Are These Information Security Services the Same? The two are often incorrectly… View Article