Welcome to my blog

Samsung Galaxy S3 GT-I9300 to Androi...

There have been lots of custom ROMs for the Samsung Galaxy S3 based on Google’s latest version of Android, 5.0 Lollipop. A majority devices like the S3, Xperia and Nexus have received 5.0 Lollipop builds....

Is Bio hacking a security risk? The ...

Bio hacking – technology and humans have never been so close, they complement each other. But what are the security and privacy risks? IS BIOHACKING A SECURITY RISK? Imagine a world where our day to day...

SplashData published the list of Wor...

SplashData has published its annual report on the used of passwords that includes the list of the Worst passwords of 2014. Here we are to analyze the annual study published by SplashData, titled “123456”...

25 billion Cyber Attacks hit systems...

The National Institute of Information and Communications Technology revealed that more than 25 billion cyber attacks hit  systems in Japan during 2014. I decided to write this post to highlight the importance...

The Future of Data Security: DNA Cry...

DNA Cryptography can be defined as a hiding data in terms of DNA Sequence. Why DNA Cryptography and which are the principal benefits for its adoption? DNA Computing Information Security is very vital in...

How To Protect Your Cisco Device (Ro...

Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Honeypots are modifying the way people think about security....

Powered by WordPress | Designed by Elegant Themes