How to Protect Yourself from the New Generation of Ransomware?
What is Petya Malware? Petya is a malicious software or malware that spreads through emails or websites. Once…
What is Petya Malware? Petya is a malicious software or malware that spreads through emails or websites. Once…
It has been reported that a new ransomware named as “Wannacry” is spreading widely. Wannacry encrypts the files…
As our monies, ideas, emotions flow through the digital infrastructure, our money (Money is the top trending item…
Winter in Kolkata has different flairs like charming weather, sweets prepared from “Nolen Gur”, Circus, Picnic, Hopping between…
How much information security is enough security ? Infocon is an initiative by Prime Infoserv, Kolkata and Wordsmith has…
There are four fundamental types of risk in the order of our vulnerability I. Known Known – We know what…
If you are planning your ISO 27001 internal audit, you may be looking for some kind of an…
DROWN is Identified as a low cost attack and it allows hackers to decrypt browser-server communication in hours…
Introduction The civilization has always been interested on protection, let it be primitive or sophisticated present ages. Human…
Jobs , Job Seeker and Employers are never friends. They always have repelling effect between them. Below are…