cybersecurity - search results
If you're not happy with the results, please do another search
AppTrana which is SaaS based web application security product will offer instant and affordable fully managed hack protection for all size of business in India, said company
A cyber security company Seqrite, along with its partner seQtree on 29th September, discovered a possible breach at India’s National Internet Registry and notified it to the Indian government.
To make things more convenient and easy, Apple’s new iPhone X has removed the home screen button and has put up a face recognition technology to unlock the iPhone. The new biometric FaceID uses a 3D scan of the face as a password to unlock the device. Some of the experts say, Apple might be exposing its users to a serious security risk.
Image makeover after failing Dera test? Haryana govt launches IT & ESDM policy, startup policy, cybersecurity policy, eGov portal, IoT centres in Digital Haryana Summit
Haryana government in association with industry lobby body National Association of Software and Services Companies (NASSCOM) organised the first edition of Digital Haryana Summit today.
Locky Ransomware Attack: CERT-In issues warning, cybersecurity firm Trend Micro says no incidence reported by Indian customers
In the wake of Locky Ransomware attack and the India's Computer Emergency Response Team (CERT) issuing alert across the country, cybersecurity firm Trend Micro has stated that there are no incidence reported by Trend Micro’s customers in India at present.
Giving push to Prime Minister Narendra Modi Digital India initiative, the Union government has decided to fund upto Rs 5 crore for R&D on cybersecurity in India.
Hack iPhone, Samsung S8, Google Pixel, Huawei Mate9 pro, win $500,000 from cybersecurity firm Trend Micro
Yes, it is true! hack the iPhone, Samsung S8, Google Pixel, Huawei Mate9 pro and you could win $500,000 in prizes from cybersecurity firm Trend Micro.
Cybersecurity firm Trend Micro said that Trend MicroDeep Security server security product is available to customers of VMware Cloud on AWS
Unauthenticated protocols, outdated hardware, weak user authentication, weak file integrity checks, vulnerable windows operating systems, undocumented third-party relationships may help your adversaries undermine your industrial operations, says FireEye.