PayPal lures the masses to locate chinks in its armor after a recent cross-site scripting bug exposed a critical vulnerability in its website.
Topic : Legal
Simply put, deception technology uses decoys to misdirect the attacker and prevent him/her from going deeper into the network and reaching the intended target. A conversation with Rajpreet Kaur, senior research analyst, Gartner reveals how ‘honey-trapping’ hackers could give you a leg up.
Is the IT head alone responsible for a security breach? Jayanta Bhowmik, CTO, Apeejay Surrendra, talks about how the mind set of all organizations need to change in order to make every individual realize their responsibility of securing their company data.
A judge ruled Thursday that Uber’s in-house counsel should have access to the material
Haryana government has decided to establish a state-of-the-art cyber forensic laboratory, equipped with high-end tools at the premises of Haryana Police, Gurgaon.
The U.S. has shut down the site and the alleged owner has been arrested
Pokemon Go represents a tremendous security threat. As with all tremendous threats, it can also be your greatest opportunity.
The current Apple vs FBI case potentially has huge ramifications for security and privacy here in India and will affect our digital future
As society and the enterprise embrace disruptive technologies without knowing the legal tenets and ramifications, cases of cybercrime would increase, leading people to lose money and organizations to lose repute with money, says Prashant Mali, President at Cyber Law Consulting.