Using Virtual Machines? Beware of VENOM

Arpan SinhaCyber Security

What is the VENOM? VENOM is a security vulnerability in floppy drive codes in various virtual computer platforms. It is a backronym for Virtualized Environment Neglected Operations Manipulation, which basically means that in a virtual machine, there are some neglected … Read More

Bleep: A More Secure Way to Message

Arpan SinhaCyber Security

Have you ever wondered if your text messages might be at risk? Text messages use server-based peer-to-peer messaging techniques, which means that the server’s database stores all your text messages, which can compromise your data and identity. Moreover, along with … Read More

Your Google Search History !

Rachiyta JainCyber Security

Does deleting your browser history give you a sigh of relief? Think again. Google maintains track of all your history since your first search.  This does make almost everybody think twice because, at some point or the other, we all … Read More

Some tips to avoid Facebook Identity Theft

Arpan SinhaCyber Security

Facebook is the most widely used social networking platform, and hence the most vulnerable one. Most of the identity thefts around the web happens through Facebook, thus you mustn’t hold your guard down for any reason. Here are a few … Read More