Using Virtual Machines? Beware of VENOM

Arpan SinhaCyber Security

What is the VENOM? VENOM is a security vulnerability in floppy drive codes in various virtual computer platforms. It is a backronym for Virtualized Environment Neglected Operations Manipulation, which basically means that in a virtual machine, there are some neglected … Read More

Pretty Good Privacy

Rachiyta JainCyber Forensics, Cyber Security

PGP stands for Pretty Good Privacy. It is an encryption and decryption standard used widely these days. This post will tell you what exactly a PGP is and how it works. In another post, I will tell you how to … Read More

Online Security Moves a Step Ahead

Rachiyta JainCyber Security

The world has not yet stopped gaping at the two-factor authentication process while uQontrol, a US-based start-up company, has already introduced a three-factor authentication; taking online security to an all-new level. What is the Qkey? Physically, the Qkey is similar … Read More

Your Google Search History !

Rachiyta JainCyber Security

Does deleting your browser history give you a sigh of relief? Think again. Google maintains track of all your history since your first search.  This does make almost everybody think twice because, at some point or the other, we all … Read More

Some tips to avoid Facebook Identity Theft

Arpan SinhaCyber Security

Facebook is the most widely used social networking platform, and hence the most vulnerable one. Most of the identity thefts around the web happens through Facebook, thus you mustn’t hold your guard down for any reason. Here are a few … Read More