Cyber Security

March 2, 2017
Top Cyber Attacks of 2016

Top Cyber Attacks of 2016

Government agencies, corporates firms and leading banks – all have faced cyber-attacks in past. Here is a summary of some of the biggest cyber-security attacks, breaches and data thefts that came into light in 2016.

February 21, 2017
Encryption Algorithms - RSA, AES, Twofish, Blowfish, SHA, MD5, 3DES,

Encryption Algorithms

Some of the most commonly used encryption algorithms are: Triple DEC/DEC, RSA, AES, Blowfish, Twofish, MD5, SHA, HMAC, etc. In this blog post we explain these encryption algorithms in detail.

February 13, 2017
Encryption Cyber Security

Encryption

In the contemporary world where the news about data leaks and security breaches have become quite frequent, cyber-security and more specifically encryption is an important concept for many companies to understand and implement. Security breaches and data leaks cost millions of dollars to organizations.

January 16, 2017
Mobile Applications & Security Vulnerabilities

Mobile Applications & Security Vulnerabilities

There are over 2 billion smartphone users in the world today. The enormous rise in the use of smartphones globally has also led to a surge in the usage of mobile applications. There are over 2.2 million Android based applications in Google PlayStore and over 2 million iOS applications in Apple's AppStore.