Estimated reading time: 3 minutes
If 2016 was the year of data breaches, 2017 might just well take things to a whole new level; precisely when it comes to cybersecurity threats. Hackers have newer tools in their arsenal which have multiplied difficulties for organizations—...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 3 minutes
The world is at the cusp of 4th Industrial revolution which will be empowered by Internet of Things (IoT). This is where everything is connected to everything else using a digital network. Refrigerators, alarm clocks, air conditioners, etc. shall be connected to the Internet and be accessible over mobile...Estimated reading time: 2 minutes
A critical remote code execution vulnerability has been discovered in famous web application framework Apache Struts, which allows attackers to execute arbitrary code. To address this issue, Apache Struts has issued a security advisory and CVE-2017-9805 has been assigned...Estimated reading time: 3 minutes
There has been a surge in cyber attacks in the healthcare industry. Ransomware attacks have increased across all sectors, but healthcare industry is particularly vulnerable to such attacks. Getting locked out of systems while handling critical patient data or operational...Estimated reading time: 3 minutes
Computer systems evolve at a breakneck pace. Every now and then, there are newer versions of software including web browsers, operating systems, and databases. These upgrades not only have better features but also have better security features built into them. However, many times...