"We Mean Secure E-Business since 1998"

Blog

What is Rootkit and How to Prevent yourself from such Malware.

Rootkit has been around for nearly 20 years now, allowing hackers/attackers to get access to user machines and steal data without being detected for long periods of time. In the recent month, a malicious campaign had been identified where a Chinese hacker dropped Rootkit in 50,000 servers (containing Windows MS-SQL and PhpMyAdmin server around the […]

Read more

Phishing and Spoofing – Your Guide to Protect Against Them

The latest Phishing and Spoofing scam took away far more than just PayPal login credentials. Understand the Phishing and Spoofing to secure yourself and your organization from such scams. Also, know how the latest PayPal phishing attack took place. ‘Phishing’ is an attempt by fraudsters to ‘fish’ for your personal/financial / investment details via email. […]

Read more

DoH – Understand DNS over HTTPS & Its Future

Major Web browsers like Microsoft, Google and Mozilla are increasingly pushing for DNS over HTTPS (DoH). This technology improves the online privacy and security. What is DNS over HTTPS (DoH) Basically, DNS over HTTPS is an extra layer over DNS for privacy and security. Presently we find that some of the modern web browsers are […]

Read more

Top 5 Key uses of ESignatures for banks

A walk-in “bank transaction” is far from our consciousness, people barely recall doing a bank transaction, because Digital transformation has moved transactions from traditional to smartphones, ATM’s and online. This type of financial convenience has already enhanced customers expenses. users Day to Day life has adopted online transactions and authorization with just a click of a […]

Read more

Sectigo IoT: Sectigo Acquires Icon Labs

    Sectigo (formerly Comodo CA), the world’s largest commercial SSL Certificate Authority (CA) and a leader in web security solutions, has acquired Icon Labs. They are provider of cross-platform security solutions for embedded OEMs and Internet of Things (IoT) device manufacturers. It is a big move with a large trend – as Certificate Authority […]

Read more

INFOGRAPHIC – YOUR GUIDE TO DOCUMENT SIGNING SOFTWARE

Every business (whether small or big) produces tonnes of documents like sales invoices, business contracts, purchase notes, credit notes etc. These documents do require the signature of the respective signatory. This guide is designed to give you complete information about how document signing software can ease the process of document signing. Every signatory, on average, […]

Read more

IRDAI Guidelines on Cyber Security.

The suggestions/framework designed by the two groups were presented before IRDAI in January 2017 which then compiled into Cyber-security guidelines by IRDAI on April 7, 2017. Given are the few key highlights

Read more

Risks of a Free SSL Certificate.

A commercial website needs to be trusted by a visitor, as it involves Financial Security, read the risks and disadvantages of using a free SSL Certificate Vis-a-vis paid SSL Certificate.

Read more

Comodo CA is now Sectigo.

The world’s largest commercial Certificate Authority (CA) and a leading web security solutions company, enabling organizations worldwide to secure their identities, web presence and connected devices.

Read more

Google’s new Mandate for .app TLD

  Top Level Domain (TLD) is the term that appears after the domain name. For eg. abc.com, here “abc” is the domain name and “.com” is the TLD. Below are few well known TLD’s .net, .org, .edu, etc. There are other types like .digital, .music, .blog and some are location specific like .in (India), .uk […]

Read more

    Page 2 of 5123
© 2024 - All rights reserved.