Imagine a scenario when your alarm clock is connected to the internet, and accesses your calendar to know when and where the first appointment of the day is. It simultaneously cross-references that against the latest traffic conditions, depending on which you can sleep a little longer or wake up earlier. The curtains in your bedroom open, … More Understanding the Internet of (Hacked) Things
The evolution of ‘money’ has progressed from exchanging cattle, to coins, cash and most recently crypto currency. But the question to be considered in this digital era is – can you completely discard traditional forms to work with just an all-electronic currency? Satoshi Nakamoto’s vision was that it is possible, and in 2008, he proposed … More Bitcoins – the future or the past?
*Gaurav, a finance manager in a multinational company, rose to attention one Monday morning as he received an email from *Shephali, the company’s chief financial officer (CFO). The email directed him to urgently make a payment of $10,476 toward an attached invoice to a Cyprus-based vendor. Gaurav instantly initiated the process, bypassing some of the … More Social media, cloud and phishing: Evolving trends in cybercrime
Privacy, a term that we seldom take enough cognizance of, is gradually changing form. In this technologically infused age, where virtual identities have now taken precedence in our personal and professional lives, the concept of data privacy has become inevitably important. The celebration of Data Privacy Day on 28 January each year that was initiated in … More Data Privacy Day – why it should matter to you…
In this day and age, everyone is troubled by the menace of computer malware — unwanted and malicious software code that hacks computer systems, causing malfunction, data theft and loss of business. Typically, malware tends to rapidly spread to targeted and non-targeted individuals and businesses, making it one of the major threats in today’s digital … More Ransomware malware: a rising threat to businesses
In July 2001, Counterpane Internet Security, a new start-up firm released their free monthly newsletter covering various topics related to computer security and cryptography. The primary focus of that edition was “Monitoring First” and the articles laid emphasis on the need to monitor networks and systems before anything else. It recommended that companies need to … More Strengthening network security through proactive monitoring
Technology and the internet have permeated through to every aspect of our lives, slowly percolating their way into businesses functions. While it has helped transcend boundaries and collaborate at a pace which was not thought possible even a decade ago, the side effects come with a similar momentum. The gaping vulnerabilities which seem to surface … More Don’t let there be a ‘chink in your chain’ in combatting cybercrime