Replace OTPs with USB Security key

Arpan SinhaCyber Security

Security key

Two-factor authentication provides an extra layer of security to your account. It provides a method of combining two different kinds of login approaches to add some extra security, but that’s not enough. 2FA is stronger than password-based authentication, but it … Read More

Smart watches and Heaps of Threats

Arpan SinhaCyber Security

Ever fancied owning a smartwatch? Or do you own one? Well, you might be stunned after knowing that these wearable devices pose a lot of security risks. Smart watches, smart bands, and even wireless panels can pose a threat to … Read More

Using Virtual Machines? Beware of VENOM

Arpan SinhaCyber Security

What is the VENOM? VENOM is a security vulnerability in floppy drive codes in various virtual computer platforms. It is a backronym for Virtualized Environment Neglected Operations Manipulation, which basically means that in a virtual machine, there are some neglected … Read More

Pretty Good Privacy

Rachiyta JainCyber Forensics, Cyber Security

PGP stands for Pretty Good Privacy. It is an encryption and decryption standard used widely these days. This post will tell you what exactly a PGP is and how it works. In another post, I will tell you how to … Read More