vulnerability management

Rivet Vulnerability Management to Reduce Threats in IT System

Cyber-attacks are rapidly growing in number and in threat as far as modern day business environments are concerned. That is the reason why businesses are encouraged to keep an eye on the loopholes that may be leveraged for such attacks. Those cyber criminals only need small gaps to execute attack. I
norton symantec antivirus

ClickSSL Weekly InfoSec Snipper February 22, 2016

Norton Antivirus is the top line Antivirus-AV-Test Says AV-Test has published its research on best antivirus products, which is based on two categories: for users and for corporate users. Symantec has won two categories award with its Norton security antivirus program. While on performance base,

ClickSSL Weekly InfoSec Snipper February 15, 2016

Malvertising campaign targeted Skype Users F-Secure researcher found a malvertising campaign that has delivered via Skype. The campaign was carried malicious JavaScript code that can take control of browsers and redirects them to a random web page. This web page contained exploit kit that scans u
web application logic flaws

10 Worst Web Application Logic Flaws

Web application flaws are attractive fruits for hackers and Web is a best place to find the web application flaws. Web application development has grown very tricky courtesy of smart attackers who can spot flaws in this application-and you cannot imagine the outcome of such a flaw! This article diss
No More Deceptive Download Buttons

ClickSSL Weekly InfoSec Snipper February 8, 2016

University of Central Florida Admin suffered from Data breach University of Central Florida administration faced data breach and allowed attacker to steal data of more than 63K staff members and past students. The officials announced about the breach on February 4 but they had idea about the brea
technology age of development threats

Users’ Privacy at Stake with Emerging level of Technology

Let's face it, in this day and age, nothing is private. Whenever we log on to a computer, our sessions are logged. If we access somewhere from a mobile device, it knows, pings a tower, and relays the signal to and from while you are using the network. So how can someone be protected when hackers and
google chrome site encryption

ClickSSL Weekly InfoSec Snipper February 1, 2016

One in Twenty Android Devices is Pre Booted Duo Security found that android devices are at risk as they found that one in twenty android devices is jailbroken. If Organization allows BYOD then it can put company data at risk in case the device is stolen or lost. Moreover, one in three users does
cyber security predictions 2016

Cyber Security Predictions for 2016

Cyber security is very crucial field in this digital age. As long as you continue using the internet for various purposes, you will definitely have to keep an eye on security. In fact, cyber-attacks can have detrimental effects. Think of the amount that has been lost and other persons who have explo