Analysis articles

IBM and Bluewolf Launch New Salesforce Practice in India

IBM and Bluewolf Launch New Salesforce Practice in India

Global Salesforce consulting agency Bluewolf, an IBM Company, today announced the launch of a new practice to drive digital transformation and customer experience locally in India with Salesforce, the global leader in CRM. The dedicated practice will leverage Bluewolf’s deep expertise and delivery capabilities in Salesforce, augmented intelligence (AI), and innovation strategy, combined with IBM’s

Large Scale Petya Ransomware Attack in Progress, Spreading Fast Globally

A large-scale ransomware attack reported to be caused by a variant of the Petya ransomware is currently hitting various users, particularly in Europe. This variant, RANSOM_PETYA.SMA, is known to use both the EternalBlue exploit and the PsExec tool as infection vectors. Users and organizations are thus advised to perform the following mitigation steps immediately in

IoT Monetization Market Worth 443.27 Billion USD by 2022

According to the new research report “IoT Monetization Market Case Studies, and Use Cases, by Application (Retail, Industrial, Automotive & Transportation, Building & Home Automation, Consumer Electronics, Energy, Agriculture, and Healthcare) and Geography – Global Forecast to 2022”, published by MarketsandMarkets, the market is expected to grow from USD 23.09 Billion in 2015 to USD

Multiple Smart Components Are Vulnerable to Cyber Attacks

Kaspersky Lab researchers examined a number of digital kiosks and interactive terminals used in modern cities for different purposes – from paying for different services through to entertainment – and discovered that a lot of them contain vulnerabilities that can expose private user data and be used to spy or spread malicious code. Along with

Gugi Banking Trojan Outsmarts New Android 6 Security

Kaspersky Lab experts have discovered a modification of the Gugi banking trojan that can bypass new Android 6 security features designed to block phishing and ransomware attacks.  The modified trojan forces users into giving it the right to overlay genuine apps, send and view SMS, make calls, and more.  It is spread through social engineering

Delving Deeper to Understand A Cyber Attack

Considering the growing number of advanced cyber attacks, cyber security experts advise CIOs in Asia Pacific to analyse and understand the different phases of a cyber-attack to build better cyber defences in their corporate network. In the past, it was much easier for firewalls to detect significant threats to the network. This was because traffic

Why Indian Companies Are Losing Customers?

Fifty four percent of Indian consumers prefer dealing with human beings over digital channels to solve customer services issues, according to new research from Accenture. The report also found that 88 percent of consumers have switched provider in the past year due to poor customer service, with internet service providers, retailers and banks being the

Hindi language safe to communicate crucial data

We are all worried about the constantly sophisticating cyber-attacks. But have we ever wondered the language we use the most is the same language that spammers are using! Trend Micro Incorporated released its annual security roundup report which dissects the most significant security incidents from 2015. One of the top activities noted included English language emerging as the highest

Advanced Security Trends for 2016

ESS DISTRIBUTION, announced the latest trends for 2016 revealed by ESET’s Research Laboratories. With the on-going advances in technology and the rapid growth in the number of connected devices to the internet,more and more people are at risk of experiencing or being targeted by a cyber-attack. This will apply to all types of businesses, industries

Key Factors behind Cyber Attacks

RADWARE  released their Global Application & Network Security Report 2015-16. The report outlines top-level findings of the Radware industry survey on cyber attacks in the past year and offers best practice advice to organizations in planning for cyber-attack protection in 2016. The report observes that the new generation of cyber attackers are demonstrating more patience and persistence, leveraging “low