What's New
  • One day Awareness programme of the Master Trainers from various stakeholders on Cyber Security Awareness Campaign 31-01-2020 at Rabindra Tirtha Auditorium, New Town, Kolkata
  • Microsoft Warns of Unpatched IE Browser Zero-Day That's Under Active Attacks -

    Two days back, Microsoft issued an emergency security advisory warning millions of Windows users of a new zero-day vulnerability in Internet Explorer (IE) browser that attackers are actively exploiting ...

  • Cryptographic Hash Keys are here to stay -

    Cryptographic hash function is an algorithm which can be executed on data, like a file or a password, to create a value called a checksum. A hash function takes an input, or a message and returns with ...

  • Scam on Facebook: Man gets cheated twice of over Rs 1 lakh and this can happen to you too -

    A man residing in Thane got cheated by the same scamster twice on Facebook when he wanted to sell his furniture. The victim posted an ad on Facebook for the same. Three days later, he got a call from ...

  • Gmail’s five security features you should start using now -

    Two-step verification makes it impossible for hackers to gain access to a user’s account as it requires a user to enter a unique code that is generated every time they try to access their account ...

  • Top 10 Dangerous DNS Attacks Types and The Prevention Measures -

    DNS stands for Domain Name System which remains under constant attacks, and thus we can assume there is no end in sight because the threats are growing increasingly nowadays. DNS generally uses UDP ...

  • Google’s Project Zero is now being more considerate with how it discloses security vulnerabilities -

    Google’s Project Zero cybersecurity team is trialling a new policy where it won’t make security vulnerabilities public early after a fix has been issued. “Full 90 days by default, ...

  • How UPI-based frauds take place -

    In October, UPI based transactions have hit a landmark of one billion transactions. Therefore, as methods of making payments have become technologically advanced, fraudsters have also evolved different ...

  • 6 Unique InfoSec Metrics CISOs Should Track in 2020 -

    Many have found themselves in a position where they are spread so thin across their security stack that duplication of effort and smooth collaboration amongst their tools and teams has become highly ...

  • National Cyber Crime Reporting Portal Launched For Citizens to Report Cyber Crimes Online -

    Union Home Minister inaugurated the Indian Cyber Crime Coordination Centre (I4C) and also the dedicated National Cyber Crime Reporting Portal to the nation, a citizen-centric initiative that will enable ...

  • Hackers attack Indian healthcare website, steal 68 lakh records -

    Without naming the website, FireEye said cyber criminals -- mostly China-based -- are directly selling data stolen from healthcare organisations and web portals globally including in India in the underground ...

  • CERT-In warns WhatsApp users about a new vulnerability -

    The vulnerability, which does not require any form of authentication from the victim, executes when the maliciously crafted file is downloaded on the receiver’s system. Indian Computer Emergency ...

No upcoming event

  • Order 1
  • NOTIFICATION 1
  • TENDER 1