In this article, we will look at techniques which are being used by various android developers to detect if the device is rooted or not. What is rooting? Rooting allows users of the Android Operating System to gain administrative control Read more…
In today’s digital age, the threat landscape is constantly evolving, making it crucial for individuals and organizations to prioritize threat detection. By staying one step ahead of potential threats, we can mitigate risks and protect sensitive information. This article explores Read more…
While providing cyber security services such as VAPT and compliances, we come across many customers. Most of those are either IT heads or CxO’s. Not all of those are aware about the world of cyber security, and they have their Read more…
Cyber Security Myth Debunked – More than one antivirus help the infrastructure to be secure
Fact : It can be more harmful than a help if two separate antivirus are running on the system. Year:2015 Said by “IT Admin of a mid-size Manufacturing company” “We used to be worried about cyber security but not anymore. Read more…
Fact : PHP or .NET are not secure by default. Its IT person’s skill to secure those. Year:2014 Said by “CTO of an IT product company” “The sole reason we chose PHP over .Net is because PHP is most secure Read more…
Fact : Physical security is a small component of the big IT infrastructure security puzzle. Many more controls are needed to achieve better data security Year:2013 Said by “IT head of a large scale Manufacturing company” “Thanks for visiting us Read more…
Fact : When teams work from home and connect to office network, the internal vulnerability assessment actually becomes more important than ever. Year:2020 Said by : IT admin of Small scale IT services company “Since we are working from home Read more…
Fact : ISO27001 or any other compliance needs a detailed review of risks which cannot be captured using a mere checklist. Year:2019 Said by : CEO of an IT services company “We want to implement ISO27001 but why do you Read more…
Fact : Its not the cost of firewall, but how you configure it securely is what matters the most Year : 2018 Said by : IT head of a mid-size Pharma company “We are running without a security problem for Read more…
Fact : Linux and Windows both are equally insecure or secure. Year : 2017 Said by : IT head of a mid-size bank “We run our entire banking on Linux OS. None of the servers are Windows, so there is Read more…