Trend Now
Top Penetration Testing Tools
What is Penetration Testing
Penetration testing, commonly referred to as pen testing, involves an authorized simulation of a cyber attack on a computer system to...
Featured Post
Recent Updates
Top Penetration Testing Tools
What is Penetration Testing
Penetration testing, commonly referred to as pen testing, involves an authorized simulation of a cyber attack on a computer system to uncover exploitable vulnerabilities. This process is conducted by ethical hackers...
What is Phishing?
Phishing is a kind of scam that happens online, where criminals send emails which appear to have come from a legit company and request you to provide some sensitive information. They do this by...
How to Keep Your Personal Information Secure
For businesspeople, identity theft is a genuine threat for which precautions must be taken. All the way from financial statements to credit card information, everything needs a safety lock on it to ensure protection....
VeriSign and Microsoft tie-up to tackle phishing
The solutions take advantage of technology from Microsoft, code-named "InfoCard," the Microsoft Internet Explorer 7 browser, as well as VeriSign Secured Sockets Layer (SSL) certificates and the newly launched VeriSign Identity Protection (VIP) to...
Microsoft to spend $4B in China
Microsoft China spokesperson Roger Chen noted that the hardware purchases will consist mainly of Xbox products manufactured in China.
The deals have been made following a trip by Chinese president Hu Jintao to America, during...