Security of Mobile Devices
Introduction: Today’s advanced mobile devices are well integrated with the Internet and have far more functionality than mobile phones of […]
Security of Mobile Devices Read More »
Introduction: Today’s advanced mobile devices are well integrated with the Internet and have far more functionality than mobile phones of […]
Security of Mobile Devices Read More »
Introduction: Mining for cryptocurrencies is an ever more complex task that consumes more and more energy resources and computing power.
The most popular social media platforms have billions of users, and the number keeps getting bigger every year. Facebook, Twitter,
Security on Social Media Read More »
Mr.Adli Wahid, Security Specialist from APNIC(Asia Pacific Network Information Centre) for a 1 day workshop(15th September,2016) at the MoIC Conference
Cyber Security Workshop Read More »
Ransomware is a type of malware that blocks access to computer system either by locking the systems screen or by
DoS/DDoS Attacks Denial of Service (DoS) is an attempt to make resources like web site/ services/ App/network etc. unavailable to
SQL INJECTION SQL vulnerability ranks at top of the list in our government constituency. It has, therefore, become quite paramount