Articles about Information Security

Contrary to popular belief, information security isn’t just limited to securing information from unauthorized and unwanted access. It also entails preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording, and destruction of any kind of information. Interestingly, although we’ve begun laying emphasis on information security in the digital age, the concept can be extended to information in physical form as well. A good information security system is built around three pillars—confidentiality, integrity, and availability. Confidentiality means that the protected information isn’t disclosed to foreign entities and processes. Integrity refers to maintaining the completeness of the secured information. This means that all the secure data should be concurrently updated as required in case of a change in any secured element. Last;y, availability refers to the fact that the secured information should be accessible to those that have protected it and not others. These three principles are collectively known as the CIA of information security. It should be noted that there is no concrete definition of information security but most interpretations collectively agree upon the same fundamental concept.

DuckDuckGo's latest feature prevents apps from tracking Android users

23 Nov 2021

Technology
DuckDuckGo's latest feature prevents apps from tracking Android users

Privacy-centric browser DuckDuckGo has introduced a new feature called App Tracking Protection integrated into its browser app for Android.

Seven apps found spreading Joker malware on Google Play Store

21 Nov 2021

Technology
Seven apps found spreading Joker malware on Google Play Store

Cybersecurity firm Kaspersky Labs has discovered seven applications spreading the infamous Joker malware through the Google Play Store.

Windows MSHTML zero-day vulnerability actively exploited for remote code execution

13 Sep 2021

Technology
Windows MSHTML zero-day vulnerability actively exploited for remote code execution

Bad actors have begun circulating tutorials and exploits on hacking forums that make use of a zero-day vulnerability in Windows MSHTML that Microsoft revealed last Tuesday.

Facebook tests 'Read First' prompts to check misinformation

11 May 2021

Technology
Facebook tests 'Read First' prompts to check misinformation

Amidst the overflow of information being disseminated across the social media platforms, stopping the spread of false information and fake news has become more important than ever.

Once again, WhatsApp is reminding users about privacy policy deadline

27 Apr 2021

Business
Once again, WhatsApp is reminding users about privacy policy deadline

Despite facing severe global backlash for its unilateral privacy policy change, Facebook-owned instant messaging service WhatsApp decided it's a good idea to remind users of the policy change and the fast-approaching implementation deadline.

#BugAlert: Here's how anyone can suspend your WhatsApp account

13 Apr 2021

Technology
#BugAlert: Here's how anyone can suspend your WhatsApp account

If you have been receiving multiple two-factor authentication (2FA) requests for your WhatsApp account, it is likely that someone is attempting to shut your account down.

Another database of leaked Facebook users' phone numbers found online

12 Apr 2021

Technology
Another database of leaked Facebook users' phone numbers found online

Barely a week has passed since Mark Zuckerberg-led Facebook sprang a data leak that put the personal data of around 533 million users out in the open.

Was data of 1.3 million Clubhouse users actually leaked?

12 Apr 2021

Technology
Was data of 1.3 million Clubhouse users actually leaked?

Over the weekend, it was reported that invite-only audio-based social network Clubhouse suffered a data breach that affected around 1.3 million users.

Infosys: Top brands could lose $223 billion to data breaches

10 Mar 2021

Business
Infosys: Top brands could lose $223 billion to data breaches

In a report that studies the link between cybersecurity and its impact on brand value, Infosys and Interbrand said that the world's top 100 brands stand to lose $223 billion in the event of a data breach.

#CareerBytes: Best engineering colleges, other than IITs, NITs

26 May 2018

India
#CareerBytes: Best engineering colleges, other than IITs, NITs

Given the vast prospects that it offers, Engineering remains one of the most preferred courses in India after Class-12.

8 popular engineering colleges in South India

22 May 2018

India
8 popular engineering colleges in South India

South India is home to some of the best engineering institutes in the country, making it one of the most preferred destinations for engineering aspirants.

Best engineering colleges (other than IITs, NITs) after 12th Class

05 Apr 2018

India
Best engineering colleges (other than IITs, NITs) after 12th Class

Given the vast prospects that it offers, Engineering remains one of the most preferred courses in India after Class-12.

Home Ministry gets new divisions to fight cyber crime, radicalization

10 Nov 2017

Politics
Home Ministry gets new divisions to fight cyber crime, radicalization

The Union Home Ministry has created two new divisions to monitor radicalization activities and cyber fraud, apart from merging others.