Microsoft 22nd Security Intelligence Global Report.

Microsoft has published its 22nd bi-annual Security Intelligence Report (SIR), detailing the global trends in malicious behavior both on and offline. The report collects data from across Microsoft’s portfolio of services and software, and takes a broad look at emerging threats and mitigating efforts on the part of security researchers. The Security Intelligence Report can …

Cyberspace: Legal Aspects for Private Sector

The number of countries carrying out highly effective low-cost cyber operations is on the rise in private sector organizations – regardless of industry vertical – need to be particularly aware of the cyber threat from emerging nation states. Whenever a significant cyber group is identified, especially one that is associated with a nation state, private …

FLARE Virtual Machine: In depth of Cyber Research & Analysis.

Virtual Machine (VM) as you all know Guest OS on Host for Research & Analysis. We can use Hyper V , Virtualbox  & Vmware. The Virtual Machine is a Guest OS installation with numerous tweaks and tools to aid analysis. Unfortunately trying to maintain a custom VM : tools frequently get out of date and …

RDP Risk : Enterprise Data Exposed

Millions of ports are being left open online, and many of these are being exposed to potential attackers through the remote desktop protocol (RDP). An internet wide scan by researchers at Rapid7 discovered that there were more than 11 million devices with open 3389/TCP endpoints. More than 4.1 million of these open ports were using …

Apple Security Chip Decryption Key Exposed By Hacker, But It’s Still Secure

Secure Enclave Processor (SEP) is a security chip that Apple started putting in iPhones since the release of iPhone 5S. The security co processor, with its own operating system SEPOS, is separate from the main processor of the device and prevents it from accessing sensitive data directly, such as the information stored for TouchID. SEP’s work …

Indian Govt noticed 21 phone manufacturer for detailed response

Wary of hacking and stealing of information from smartphones, the government has sent notices to Chinese and other device makers to provide the framework and procedures followed for data security. As many as 21 phone makers, including leading Chinese brands have been asked to give "detailed, structured written response" on how they secure data and …

Human strategy about Artificial Intelligence

How do you feel about artificial intelligence, technology that displays human-like intelligence? Perhaps both, perhaps neither – but whether you are considering marketing AI or marketing with AI, how the public – not tech luminaries – feel about AI, matters. Too much talk is focusing on technology rather than humanity with respect to AI. We need to better understand how …