Internet of Things

January 16, 2017
Mobile Applications & Security Vulnerabilities

Mobile Applications & Security Vulnerabilities

There are over 2 billion smartphone users in the world today. The enormous rise in the use of smartphones globally has also led to a surge in the usage of mobile applications. There are over 2.2 million Android based applications in Google PlayStore and over 2 million iOS applications in Apple's AppStore.

January 12, 2017
Wearable Technology & Security Concerns

Wearable Technology & Security Concerns

Wearable technology is most often advocated as one of the greatest application of Internet Of Things considering the fact that wearables have the potential to completely transform the way we live, today and in future. The use of wearable technology has been on a rise in last few years, and so are the security concerns that come along.

November 12, 2016
Blockchain Technology and Cyber Security - Kryptotel

Blockchain Technology and Cyber Security

Blockchain technology was first introduced in digital currencies or crypto-currencies (Bitcoins) in the year 2009. Blockchain technology goes far beyond the crypto-currencies, it is going to revolutionize the digital interactions in coming years. Blockchain technology will revolutionize the cyber security and has the potential to disrupt many industries.

August 22, 2016
Types of VPN Protocols

What are different VPN Protocols?

VPN solutions are based on different VPN security protocols. Each of these VPN protocols offer different features and levels of security. Some of the VPN protocols commonly used are explained..