Using Virtual Machines? Beware of VENOM

Arpan SinhaCyber Security

What is the VENOM? VENOM is a security vulnerability in floppy drive codes in various virtual computer platforms. It is a backronym for Virtualized Environment Neglected Operations Manipulation, which basically means that in a virtual machine, there are some neglected … Read More

Visual Search Superfish Searching Way Beyond Limits !!

Rachiyta JainCyber Security

  Lenovo has finally accepted to Superfish,  a vulnerability found last November in Lenovo products. Superfish  which comes preinstalled in laptops intercepted customers’ encrypted Web traffic making all secure data open. Though the harm has been done, Lenovo apologised for … Read More

VoIP in India-What’s it like?

Nitish ChandanCyber Security, Law

VoIP in India Voice over IP is not a new concept to the regular internet user. It is the routing of voice conversation over the internet rather than the PSTN (Public switched telephone network). You talk over viber, skype or … Read More

Network Sniffing and Security Measures

Nitish ChandanCyber Security

 Network Sniffing in Detail and Security Measures Sniffing is a common word in everyday parlance. However, does it have any alternative usage in the realm of Cybersecurity? How about using Network Sniffing as a cybersecurity jargon? Currently, most of the … Read More