Estimated reading time: 2 minutes
For good reason, organizations regulate their employees’ access to their office devices. Of course, there are no overarching rules but organizations try to adopt a ‘horses for courses’ approach, i.e., an employee working in the financial sector who handles...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 5 minutes
Introduction: Researchers at Quick Heal Security Labs have uncovered a potential Spear Phishing campaign targeted against Indian Army personnel. In this attack, the attackers are using “Army Welfare Education Society” Scholarship form as lure. About AWES: Army Welfare Education...