Internet Security

February 21, 2017
Encryption Algorithms - RSA, AES, Twofish, Blowfish, SHA, MD5, 3DES,

Encryption Algorithms

Some of the most commonly used encryption algorithms are: Triple DEC/DEC, RSA, AES, Blowfish, Twofish, MD5, SHA, HMAC, etc. In this blog post we explain these encryption algorithms in detail.

February 13, 2017
Encryption Cyber Security

Encryption

In the contemporary world where the news about data leaks and security breaches have become quite frequent, cyber-security and more specifically encryption is an important concept for many companies to understand and implement. Security breaches and data leaks cost millions of dollars to organizations.

January 16, 2017
Mobile Applications & Security Vulnerabilities

Mobile Applications & Security Vulnerabilities

There are over 2 billion smartphone users in the world today. The enormous rise in the use of smartphones globally has also led to a surge in the usage of mobile applications. There are over 2.2 million Android based applications in Google PlayStore and over 2 million iOS applications in Apple's AppStore.

January 12, 2017
Wearable Technology & Security Concerns

Wearable Technology & Security Concerns

Wearable technology is most often advocated as one of the greatest application of Internet Of Things considering the fact that wearables have the potential to completely transform the way we live, today and in future. The use of wearable technology has been on a rise in last few years, and so are the security concerns that come along.