Kumar AS.

Senior Cybersecurity Practitioner with more than a decade of experience under his belt in different roles. Specializing in Fortifying Defenses, Data Loss Protection, Email and Web protection and other security technologies.

The World this week (19th to 25th April, 2021)

ransomware attack, business computer hacked

The Internet was meant to make the world a smaller place. But it actually feels smaller without it — Transcendence – 2014 Above quote from character Max Waters feels more relevant today than ever. While the world is fighting Covid-19, the hackers and Cybercriminals are at work round the clock exploiting whatever they can. Apple Data Stolen from Manufacturer Quanta …

Read More »

Apple Airdrop Flaw and How to protect Yourself

hacker exploiting system vulnerability

Do you use Apple? Well if you do the chances are even if unlike me, you are not a fan of AirDrop, you would have used it a few times if not more. Here is what you need to know about AirDrop flaw. According to German researchers from Technische Universitat Darmstadt , it’s possible for strangers to discover the phone …

Read More »

Legacy Systems: Disadvantages and advantages

disadvantages of legacy systems

The investigation results from the Japanese gaming company Capcom attack released recently, have once again highlighted the disadvantages of legacy systems. But what are legacy systems anyway? Legacy Systems are older applications, outdated firmware, and devices that are end of support from the manufacturer or are not updated for a really long time. If you think you do not use …

Read More »

How to Secure Password: Best practices for 2021

how to secure password

Always remember the unpleasant fact that you can and probably will at some time get compromised. It may or may not be due to a mistake. Following the best practices around how to secure password curated by our research team will help you improve your security posture considerably. It will also help you to contain the damage if one of …

Read More »