Posts under Security category

norse cyber attacks tracker map

Malware Tracker Maps that let you view Cyber Attacks in real-time

Malware campaigns dominated the threat landscape last year. The trend seems to continue this year, although in a more virulent form. A common observation from multiple leading security researchers revealed that most malware authors relied on ransomware to make the […]

Process Hollowing

Process Hollowing and Atom Bombing protection in Windows Defender ATP

Windows 10 Creators Update security enhancements include improvements in Windows Defender Advanced Threat Protection. These enhancements would keep the users protected from threats like Kovter and Dridex Trojans, says Microsoft. Explicitly, Windows Defender ATP can detect code injection techniques associated […]

Dangers of Smart or Internet-connected Toys

Dangers of Smart or Internet-connected Toys you need to be aware of

Children’s toys connected to the internet come with serious privacy and safety risks as Smart Toys or Internet-connected Toys often contain several smart features that could disclose significant personal information. These days many parents like to buy new toys for […]

Boot Process

How to Secure the Windows 10 Boot Process

You will agree that an operating system’s primary function is to provide a safe execution environment where different applications can run, safely. This necessitates the requirement of a basic framework for uniform program execution to use the hardware and access […]

digital identity guidelines

Importance of Digital Identity and New Guidelines

Digital Identity systems are a matter of great importance when it comes to define one’s self in the digital world, which is as real as the physical world and actually affects us in a very direct way. This is the […]

Honeypots

What are Honeypots and how can they secure computer systems

Honeypots are traps which are set to detect attempts at any unauthorized use of information systems, with a view to learning from the attacks to further improve computer security. Traditionally, sustaining network security has involved acting vigilantly, using network-based defense […]

fileless malware

Fileless Malware Attacks, Protection and Detection

Fileless Malware may be a new term for most but the security industry has known it for years. Earlier this year over 140 enterprises worldwide were hit with this Fileless Malware – including banks, telecoms, and government organizations. Fileless Malware, […]

Windows 10 v1703 provides Next-Gen Ransomware protection

Microsoft has released a whitepaper which talks about how Windows 10 offers strong ransomware protection to keep your computer protected at all times. While ransomware was always an issue, it never came into highlight as much as it is after […]

Microsoft Azure Advisory to avert WannaCrypt Ransomware Threat

The intensity of the WannaCrypt ransomware attack has dissipated but fear still looms large. As such, many organizations have issued an advisory in response to this threat. They believe it will help the organizations run a secure infrastructure for their […]