Articles about Information Security
Contrary to popular belief, information security isn’t just limited to securing information from unauthorized and unwanted access. It also entails preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording, and destruction of any kind of information. Interestingly, although we’ve begun laying emphasis on information security in the digital age, the concept can be extended to information in physical form as well. A good information security system is built around three pillars—confidentiality, integrity, and availability. Confidentiality means that the protected information isn’t disclosed to foreign entities and processes. Integrity refers to maintaining the completeness of the secured information. This means that all the secure data should be concurrently updated as required in case of a change in any secured element. Last;y, availability refers to the fact that the secured information should be accessible to those that have protected it and not others. These three principles are collectively known as the CIA of information security. It should be noted that there is no concrete definition of information security but most interpretations collectively agree upon the same fundamental concept.

23 Nov 2021
TechnologyPrivacy-centric browser DuckDuckGo has introduced a new feature called App Tracking Protection integrated into its browser app for Android.

21 Nov 2021
TechnologyCybersecurity firm Kaspersky Labs has discovered seven applications spreading the infamous Joker malware through the Google Play Store.

13 Sep 2021
TechnologyBad actors have begun circulating tutorials and exploits on hacking forums that make use of a zero-day vulnerability in Windows MSHTML that Microsoft revealed last Tuesday.

11 May 2021
TechnologyAmidst the overflow of information being disseminated across the social media platforms, stopping the spread of false information and fake news has become more important than ever.

27 Apr 2021
BusinessDespite facing severe global backlash for its unilateral privacy policy change, Facebook-owned instant messaging service WhatsApp decided it's a good idea to remind users of the policy change and the fast-approaching implementation deadline.

13 Apr 2021
TechnologyIf you have been receiving multiple two-factor authentication (2FA) requests for your WhatsApp account, it is likely that someone is attempting to shut your account down.

12 Apr 2021
TechnologyBarely a week has passed since Mark Zuckerberg-led Facebook sprang a data leak that put the personal data of around 533 million users out in the open.

12 Apr 2021
TechnologyOver the weekend, it was reported that invite-only audio-based social network Clubhouse suffered a data breach that affected around 1.3 million users.

10 Mar 2021
BusinessIn a report that studies the link between cybersecurity and its impact on brand value, Infosys and Interbrand said that the world's top 100 brands stand to lose $223 billion in the event of a data breach.

26 May 2018
IndiaGiven the vast prospects that it offers, Engineering remains one of the most preferred courses in India after Class-12.

22 May 2018
IndiaSouth India is home to some of the best engineering institutes in the country, making it one of the most preferred destinations for engineering aspirants.

05 Apr 2018
IndiaGiven the vast prospects that it offers, Engineering remains one of the most preferred courses in India after Class-12.

10 Nov 2017
PoliticsThe Union Home Ministry has created two new divisions to monitor radicalization activities and cyber fraud, apart from merging others.