Web Security

Oracle fixes Spectre with retpoline supported UEK4 

Oracle updated the UEK4 (Unbreakable Enterprise Kernel) to include support for retpoline, that can mitigate the Spectre from all the processors with Variant 2 vulnerabilities. The Meltdown and Spectre...

Let’s Encrypt to now issue free Wildcard certificates through ACMEv2 

Let’s Encrypt, the non-profit certificate authority, has announced that wildcard certificates and ACMEv2 will now be supported. With this announcement, Let’s Encrypt takes a step ahead to make HTTPS a...

India faced over 53,000 cyberattacks in 2017: CERT report 

More than 53,000 cyber security incidents took place in India last year, as per a report by Indian Computer Emergency Response Team (CERT-In). The report was submitted to Indian Parliament by IT Minis...

Plesk and Acronis partner to provide easy server-backup and recovery solution 

Plesk, the leading WebOps platform provider, recently announced its partnership with Acronis, a global leader in hybrid cloud data protection and storage. Plesk will now integrate Acronis Backup Cloud...

Cisco makes technology to identify malware in encrypted traffic generally available  

Cisco announced the general availability of Encrypted Traffic Analytics (ETA), the technology which can detect the malware in encrypted traffic. ETA was available for preview since June 2017, where Ci...

Microsoft open sources Project Cerberus to protect firmware from cyberthreats 

Microsoft has unveiled the blueprint for a new open sourced industry standard for platform security called Project Cerberus. It will enable organizations to tighten the security around cloud environme...

The U.S. Cloud Computing Industry Stands to Lose $22 to $35 billion as a Result of PRISM Exposé

The recent revelations about the extent to which the National Security Agency (NSA) and other U.S. law enforcement and national security agencies have used provisions in the Foreign Intelligence Surve...

How Important is Server Location For Your Business?

Almost every business relies on some form of server technology, but does the location of this technology truly matter? Where does your data normally end up? An increasing number of businesses are comi...

An Infographic: Understanding Identity theft, Computer viruses and General Internet safety

OpenCollege recently developed this go-to resource on Cyber Safety, which is a compilation of various internet safety tips and tricks one needs to be aware with while surfing the web. Covering many se...

An Infographic: Is Cloud Based Security Right For Your Company’s Web and Email Systems?

An implementation checklist for Cloud security with in-depth analysis of its modus operandi, merits and options available:

Exposing SnapDeal.com: India’s largest Online Shopping platform is unsafe and vulnerable to theft

Indian e-commerce is growing at an incredibly frantic pace. There are tons of new e-commerce sites mushrooming in variety of verticals spanning electronics, books, gift items, vitamin supplements, for...

Understanding Role of Code Signing Certificates in Mobile Application Security

Mobile Applications have met with wide acceptance globally, thanks to their easy installation, streamlined interface, great user experience, and the ability to download them easily via online and offl...

Skip to toolbar