Cyber SecurityWhat is ethical hacking & why ethical hackers are crucial to organizations?April 25, 20190Introduction Ethical Hacker also knew as white hat hacker is a security professional. An Ethical Hacker primarily is responsible to…
SecurityNotPetya Technical AnalysisJuly 3, 20170NotPetya Technical Analysis NotPetya (or “Nyetna” as it has also been named) spreads to other systems on the network without…
SecurityPetwrap Ransomware AnalysisJune 28, 20170Petwrap Ransomware Analysis Petwrap ransomware or Petya/NotPetya, is the recent new ransomware affecting computer networks. On the morning of June…
SecurityWannaCry Ransomware AnalysisJune 28, 20170WannaCry Ransomware Analysis WannaCry ransomware has been the most widespread ransomware. A ransomware is a type of malicious software designed…
SecurityDEFENCE PolicyMay 7, 201510 CommentsA Strong Strategic Foreign Policy Framework of Country lies in the Strength of Defence Partnership in-between. World’s strongest partnership develops…
SecurityCRPF protests in KashmirApril 19, 20155 CommentsNature is our very existence, for, if it was not for nature we would not have got the gift of…
SecurityCargo SecurityApril 19, 20155 CommentsEvery year, about $30 billion value of payload is lost, by Federal Bureau of Investigation, and rates of freight burglary…
SecurityTestingElectrostatic DischargeMarch 25, 201517 CommentsElectrostatic discharge is used in hardware testing. ESD (electrostatic discharge) is a kind of test that hardware usually has to…
Information TechnologySecurityHow secure is your Web Login?March 22, 201514 CommentsAhh i’m safe i have a difficult password for all my accounts! no one will dare crack it! Well this…
SecurityVisual cryptographyFebruary 10, 20156 CommentsVisual cryptography (VC) was introduced by Moni Naor and Adi Shamir at EUROCRYPT 1994. Visual cryptography is a cryptographic technique…