2022 Tech Forecast

The security precautions related to computer information and access address four major threats: (1) theft of data, such as that of military secrets from government computers; (2) vandalism, including the destruction of data by a computer virus; (3) fraud, such as...

BusyBox flaws highlight need for consistent IoT updates

Security researchers have found and reported 14 vulnerabilities in the BusyBox userspace tool that’s used in millions of embedded devices running Linux-based firmware. While the flaws don’t have high criticality, some of them do have the potential to...

Tabletop exercises: Six sample scenarios

A tabletop exercise is an informal, discussion-based session in which a team talks through their roles and responses during an emergency, walking through one or more example scenarios. It’s a great way to get business continuity plans off the written...

Malware detection in 9 easy steps

All antivirus software misses a significant percentage of malware. This is because professional malware writers design their malware and botnet ecosystems to self-update whenever they start getting detected. While antivirus engines eventually sniff out millions of...

Digital Signature

Digital signature is an electronic signature used to verify the identity of the sender/ signer of a message and also to ensure the correctness and validity of information in electronic transactions. The use of recognized digital signature can fulfil requirements of...