Red Hat acquires Noobaa

Soon after Red Hat’s acquisition by IBM, Red Hat is now acquiring Noobaa. These two moves are related and have been seen as an excellent business strategy, to gain technological ...

read more

Dark Web

Dark Web, also known as ‘Darknet’, denotes an encrypted portion of the internet which is not indexed by search engines (i.e. It cannot be found in SERP (Search Engine Result ...

read more

Kali Linux

Kali Linux is a debian-derived Linux distribution designed for ‘digital forensics’ (Often used as a synonym for ‘computer forensics’, it is the science encompassing the recovery and investigation of digital ...

read more

Arch Linux

Arch Linux is an independently developed Linux distribution (i.e. operating system) for computers based on x86-64 architecture. Composed of free and open source software, it supports community involvement. Arch Linux ...

read more

The Morris Worm story

Morris Worm (also known as the ‘great worm’ or ‘internet worm’) is the notorious computer worm which is believed to be one of the first to be distributed on the ...

read more

Ransomware

  Ransomware is a malware designed to block access to a computing system (locking data in that system / threaten to publish the victim’s data) via encryption, until a demanded ...

read more

IBM to acquire Red Hat: an overview

IBM’s announcement to acquire RedHat – the open source distribution giant – hit the headlines on last Sunday. This deal was done at a premium of more than 60% and ...

read more

Agent Tesla

Agent Tesla – a highly effective as well as user-friendly password stealing program which has been built using Microsoft .Net Framework and infected computers since 2014 – has gained popularity ...

read more

Cyber attack types to watch out for in 2018

  Along with quick technical enhancements, security risks are enormous in today’s cyberspace.  As per forecasts, worldwide cybercrime rates will cost 2 trillion dollars in 2019. Newer types of security ...

read more

An effective cyber attack recovery plan for enterprises

  In this digital-era of quick technical advancements, security threats are of ever-increasing concern. Cyber crime rates increase every year; so, being proactive against security risks by having an effective ...

read more

Search

August 2019
MTWTFSS
« Dec  
 1234
567891011
12131415161718
19202122232425
262728293031