Red Hat acquires Noobaa

Red Hat acquires Noobaa

Soon after Red Hat’s acquisition by IBM, Red Hat is now acquiring Noobaa. These two moves are related and have been seen as an excellent business strategy, to gain technological advantage. The worth of IBM’s Red Hat acquisition was 34 billion dollars. In turn, Red Hat...
Dark Web

Dark Web

Dark Web, also known as ‘Darknet’, denotes an encrypted portion of the internet which is not indexed by search engines (i.e. It cannot be found in SERP (Search Engine Result Pages)) and which can only be accessed through specific softwares, configurations, or...
Ransomware

Ransomware

  Ransomware is a malware designed to block access to a computing system (locking data in that system / threaten to publish the victim’s data) via encryption, until a demanded some of money is paid. As per records, ransomware variants were found as early as...
Agent Tesla

Agent Tesla

Agent Tesla – a highly effective as well as user-friendly password stealing program which has been built using Microsoft .Net Framework and infected computers since 2014 – has gained popularity recently by having more than 6,300 customers who pay a monthly...
National Cyber Security Awareness Month (NCSAM) – October 2018

National Cyber Security Awareness Month (NCSAM) – October 2018

Since 2004, NCSAM has been observed in the month of October, in the United States of America (USA). NCSAM stands to encourage vigilance and protection by computer users. All of us know that in today’s IT enabled world, national security goes hand in hand with...

Cyber attack types to watch out for in 2018

  Along with quick technical enhancements, security risks are enormous in today’s cyberspace.  As per forecasts, worldwide cybercrime rates will cost 2 trillion dollars in 2019. Newer types of security threats will emerge every year. Let’s look at some of the...