Internet Security

Is DuckDuckGo as Private as It Claims? Turns Out, Not So Much.

The privacy browser DuckDuckGo, which claims to keep users safe from hidden third party trackers, has actually been found to be tracking users through Microsoft platforms.

Entrepreneurs Working From Home Should Upgrade Their Router

Protect your work-from-home business with this privacy router.

3 Steps for Securing Today's Complex Digital Infrastructure

With the rise in cloud workloads and modern apps, we need to ensure that everything in the digital infrastructure is protected.

Scott Lundgren

Importance Of Data Security In the Digital Age

Effective accumulation of data, its management and ensuring safety is actively becoming a routine imperative for businesses, especially in the customer service industry

How Decentralized VPN Can Fuel Remote Working In Developing Nations

Decentralized products like Tachyon VPN are enabling thousands of users in upcoming nations to connect to a global internet network

Varun Satyam

Business Disruption Becoming Main Attack Objective For More Adversaries

According to a report by US-based cybersecurity firm CrowdStrike, 36 per cent of all incidents it investigated in 2019 had business disruption as their main objective. These attacks were largely caused by ransomware, destructive malware or DoS attacks.

Debroop Roy

More Than 150,000 U.S. Small-Business Websites Could Be Infected With Malware at Any Given Moment. Here's How to Protect Yours.

Small-business victims were involved in 43 percent of data breaches over the course of a year, according to a recent report.

Hayden Field

Majority of Indian IT Security Professionals See Nation-State Sponsored Attacks As Cause of Concern

India at 97 per cent comes much higher than the global average for experiencing a sense of risk from nation-state threats, a CrowdStrike survey shows

Debroop Roy

Even Updates Don't Make Your Apps Safe, Says Study

A study by Check Point Research has found that even the latest versions of apps such as Facebook, Instagram and WeChat hosted on the Google Play Store are open to security vulnerabilities.

Debroop Roy

Top 3 Cyber Threats Prevalent Globally and How To Combat Them

Through monitoring, software professionals can verify security and compliance requirements regardless of whether data is stored locally, in a database, in a virtual environment or in the cloud

10 Cyber Security Best Practices for Your SMBs

Better be safe than sorry, yes, it is always good to be prepared for the worst as no one knows when attacks happen