tag:blogger.com,1999:blog-1365931735817725983.comments2024-01-11T09:11:21.813+05:30Yash KadakiaYash Kadakiahttp://www.blogger.com/profile/13205115249569575292noreply@blogger.comBlogger19125tag:blogger.com,1999:blog-1365931735817725983.post-87474018843841657872016-05-06T18:55:16.320+05:302016-05-06T18:55:16.320+05:30Businesses are increasingly comfortable with secur...Businesses are increasingly comfortable with security measures put in place to protect cloud services and the data housed with them, new research has revealed, and most companies have formal policies for moving processes to the virtual realm.<br /><a href="https://www.idealsvdr.com/virtual-data-room-reviews/" rel="nofollow">data room review</a>Anonymoushttps://www.blogger.com/profile/14036616259587055782noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-47956990640468647632015-12-01T18:56:16.321+05:302015-12-01T18:56:16.321+05:30Great that you used the uncomfortable questions to...Great that you used the uncomfortable questions to change course and build a great company !Peterhttps://www.blogger.com/profile/13654077280622282040noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-51561040555048917652015-10-01T16:38:42.687+05:302015-10-01T16:38:42.687+05:30This technical post helps me to improve my skills ...This technical post helps me to improve my skills set, thanks for this wonder article I expect your upcoming blog, so keep sharing.<br />Regards,<br /><a href="http://www.informaticatraininginchennai.co.in/" rel="nofollow">Informatica training in chennai</a>Anonymoushttps://www.blogger.com/profile/15976345767746551371noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-7425657505829151462015-07-09T09:00:07.408+05:302015-07-09T09:00:07.408+05:30Nice article i was really impressed by seeing this...Nice article i was really impressed by seeing this article, it was very interesting and it is very useful for Learners..<br /><a href="http://www.joinfita.com/ethical-hacking-course-in-chennai/" rel="nofollow">Ethical Hacking Course Chennai</a>prakeshhttps://www.blogger.com/profile/17235931586729430579noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-18893014573280407952015-06-23T09:40:07.600+05:302015-06-23T09:40:07.600+05:30Thank you provide valuable informations and iam se...Thank you provide valuable informations and iam seacrching same information <a href="http://www.joinfita.com/ethical-hacking-course-in-chennai/" rel="nofollow">Ethical Hacking Courses</a>vijayhttps://www.blogger.com/profile/10141796675310184859noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-68997996720594447922013-10-04T11:31:54.915+05:302013-10-04T11:31:54.915+05:30I Really Enjoyed The Blog. I Have Just Bookmarked....I Really Enjoyed The Blog. I Have Just Bookmarked. I Am Regular Visitor Of Your Website I Will Share It With My Friends Thanks and I promises I will visit your blog again.<a href="http://www.bwcmobile.com/" rel="nofollow">Professional Website Design Company</a>Anonymoushttps://www.blogger.com/profile/04293459738241726173noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-24122272808927388842012-10-24T03:16:24.484+05:302012-10-24T03:16:24.484+05:30Interesting technique, I didn't know that Gmai...Interesting technique, I didn't know that Gmail allowed wild cards. I will start using them now. What do you think we can do to limit this spam after we identify the agency ? What if there is no way to unsubscribe ? I'd like to hear your thoughts on this - I am a security consultant who lives and works in USA and things are not much different here. Although many organizations *claim* to keep your information safe and secure, they still pass it around. NaPsTeRhttps://www.blogger.com/profile/03963337654062492733noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-62960297908464465902012-06-03T07:00:08.806+05:302012-06-03T07:00:08.806+05:30aaahhhh loved this blogaaahhhh loved this blogPriya Srivastavnoreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-49527241371049524062010-02-17T20:52:19.910+05:302010-02-17T20:52:19.910+05:30Really Nice article, as you said "security is...Really Nice article, as you said "security is not so difficult. All it needs is for someone to sit down, make a step by step list of their various processes"....very trueSurmandal Xhttps://www.blogger.com/profile/17334938078817578979noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-34410543750982327272010-02-12T09:55:52.661+05:302010-02-12T09:55:52.661+05:30"Proper and well thought out processes and po..."Proper and well thought out processes and policies could in the long-term be the difference between whether a user clicks a malicious phishing link or reports it"<br /><br />Couldn't agree better. Banks just don't take phishing seriously. Major banks like ICICI and HDFC are actually promoting phishing by creating fake domains like icici-homeloans.com and hdfcbankcarloans.co.in, and actively marketing it on the internet to generate leads. <br /><br />You can read the complete article over here http://blog.530geeks.com/2010/02/indian-banks-promoting-phishing.html530 Geekshttps://www.blogger.com/profile/01670211456639783830noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-18996528643214932212009-09-18T02:58:46.471+05:302009-09-18T02:58:46.471+05:30i do agree parts of as same one of my website blog...i do agree parts of as same one of my website blog had also been effected with conficker but most of the online scanner passed it but one video was always hitting the screen.....like a bomb ticker..... antivirus are updated only when a new virus is there antivirus never comes before virus..virus comes before antivirus <br />we shouldnt forget that..Unknownhttps://www.blogger.com/profile/04478330061900328529noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-63616428531848880712009-09-18T02:41:57.214+05:302009-09-18T02:41:57.214+05:30i really agree with you , home users have to get e...i really agree with you , home users have to get educated and use more tougher passwords if they dont know they have get others help who know a bit of wireless and its security <br />a few ppl in bangalore a team called indiancyberarmy has taken the intiative and have started the awareness....<br />http://www.timesnow.tv/Wi-fi-an-easy-target-for-terrorists/videoshow/4326506.cmsUnknownhttps://www.blogger.com/profile/04478330061900328529noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-10546519785164519942009-09-08T07:57:34.340+05:302009-09-08T07:57:34.340+05:30Excellent! Thank you...Excellent! Thank you...hardwire187https://www.blogger.com/profile/17172316629557902225noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-64358122891582538442009-01-10T18:37:00.000+05:302009-01-10T18:37:00.000+05:30Though admittedly I can't understand half of what ...Though admittedly I can't understand half of what you wrote, I got the gist of it. Yeah, when it comes to security, one solitary AV -- be it any of renowned names -- has often been found wanting against the tougher nuts.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-30050305061381523192008-11-18T20:17:00.000+05:302008-11-18T20:17:00.000+05:30Thanks for the link, was a very interesting read.Thanks for the link, was a very interesting read.Yash Kadakiahttps://www.blogger.com/profile/13205115249569575292noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-89365394993223912692008-11-05T04:26:00.000+05:302008-11-05T04:26:00.000+05:30This has been such a hot topic at our blog, in fac...This has been such a hot topic at <A HREF="http://www.breakingpointlabs.com" REL="nofollow">our blog</A>, in fact just yesterday one of our guys put up some new clickjacking techniques, thought I would share after reading your post.<BR/><BR/><A HREF="http://www.breakingpointsystems.com/community/blog/clickjacking-technique-using-the-mousedown-event" REL="nofollow">Here is the post</A> if interested.<BR/><BR/>/kffKyle Flahertyhttps://www.blogger.com/profile/00370708864042561084noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-10371585160809286242008-10-25T13:04:00.000+05:302008-10-25T13:04:00.000+05:30Yash, I completely agree with you on this, Phishin...Yash, I completely agree with you on this, Phishing is going to be really big in da future.<BR/>Unless there is more awareness and alertness maintained by endusers as well as institutions this is going to reach major proportions.Kingashhttps://www.blogger.com/profile/10014854562110194504noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-70649049315130076682008-08-02T17:34:00.000+05:302008-08-02T17:34:00.000+05:30If you can find a bank in India without an SQL Inj...If you can find a bank in India without an SQL Injection on its front page, let me know :(<BR/><BR/>Security in banks here, is limited to an old guard at the gate who is asleep most of the time.Yash Kadakiahttps://www.blogger.com/profile/13205115249569575292noreply@blogger.comtag:blogger.com,1999:blog-1365931735817725983.post-8055066813916981912008-08-02T01:56:00.000+05:302008-08-02T01:56:00.000+05:30May be it's high time you moved your money from th...May be it's high time you moved your money from that bank!! :)Ragib Hasanhttps://www.blogger.com/profile/12989917702720113557noreply@blogger.com