Estimated reading time: 3 minutes
When it comes to validating the identity of any public key infrastructure, digital certificates hold all the aces. A digital certificate is more of an electronic snippet that lends legitimacy to a web service or portal— associating the same...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 3 minutes
Data breaches and cyber-attacks are common occurrences which usually proliferate at an exponential rate. While it is important that enterprises tighten their enclosures, it is also advisable to understand how cybercriminals prepare for a breach. Hacker surveillance is one way...Estimated reading time: 3 minutes
The airline business is unique. While public perception about aviation is that of a luxury business; the business world sees it as a financial behemoth reeling under debt burdens. Only people from the aviation industry and a few from the security industry understand that...Estimated reading time: 2 minutes
Quick Heal Security Labs has been observing the infamous Locky ransomware outbreak which kicked off recently in the last week of September. The outbreak started with spam email with various subjects and different attachment names. On 26th September, spam campaign delivering a new...