Quantcast
Channel: Security Archives - Fingent
Browsing all 19 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Mobile payments: An Intruder in Disguise?

With great power comes great responsibility. We’ve all heard of that haven’t we. Well, here is a little modified version of that – “With great benefits come great risks”. Yes, it’s true. Especially in...

View Article



Image may be NSFW.
Clik here to view.

Electronic Identity Theft: How to Protect Your Digital Life

When Angela Bennet in “The Net”, wakes up from her sleep at the hospital, after being unconscious for three days, she realizes that all records of her life have been deleted. She has been checked out...

View Article

Image may be NSFW.
Clik here to view.

Ubiquity of Software in Audits and Inspections

Let’s think for a moment, of the technology driven world that we live in now and how much the all pervasive technology has changed the way that we all live our daily lives. From our personal spaces to...

View Article

Image may be NSFW.
Clik here to view.

Can You Find Data Privacy in the Internet of Things Era?

By now, we all know that we are living in the midst of billions of devices and machines that are connected to the internet and to each other. Need more evidence to believe it? Well, Gartner predicts...

View Article

Image may be NSFW.
Clik here to view.

How to Enhance Application Security Immediately – 5 Simple Techniques

Do you remember the popular, James Stewart starrer, 1946 classic “It’s a Wonderful Life? Ahh fantasies! According to this movie, every time a bell rings, an angel gets wings. Applying the same theory...

View Article


Image may be NSFW.
Clik here to view.

Better Software Development Incorporates Security Within the System

The more advanced the technology, greater the security risks. Instances of cyber breaches, ranging from hackers stealing consumer’s bank account to hacking nuclear power plants, are all too...

View Article

Image may be NSFW.
Clik here to view.

How to Keep Your Business Safe Amidst the Rising Smartphone Malware Menace

Smartphone malware rose by 400% in 2016, and touched an all-time high, with an estimated 8.5 million malicious installation packages in existence! With mobility in the middle of a golden boom, it is no...

View Article

Image may be NSFW.
Clik here to view.

Making Sense of the Recent Ransomware Attacks: Wannacry Malware

Wannacry? If you have been inflicted with this latest piece of deadly malware that is wreaking havoc in cyberspace, there’s  little else to do but cry! However, understanding what the menace is, and...

View Article


Image may be NSFW.
Clik here to view.

Chatbot Security Measures You Need To Consider

6 Chatbot Security Practices You Need To Implement According to a survey by Oracle, regarding the benefits of using chatbots for their consumer-facing products, which included responses from 800...

View Article


Image may be NSFW.
Clik here to view.

Artificial Intelligence and Machine Learning: The Cyber Security Heroes Of...

How AI and Machine Learning are Driving Cyber Security in FinTech? Being a subset of the financial services domain, FinTech is targeted by hostile cyber villains. Industries thus require secure...

View Article

Mobile payments: An Intruder in Disguise?

With great power comes great responsibility. We’ve all heard of that haven’t we. Well, here is a little modified version of that – “With great benefits come great risks”. Yes, it’s true. Especially in...

View Article

6 Proven Ways for Businesses to Combat Cloud Security Risks

Cloud security threats: How to protect your data and mitigate risks? Be it Google G-Suite, Dropbox, Adobe, Salesforce, or Microsoft Office 365, almost every business uses cloud services for their...

View Article

How Smart Contracts Enable Banks and Financial Institutions to Solve KYC...

Smart Contracts to Streamline KYC: A Big Leap in FinTech  The advent of online transactions has brought in improved convenience, speed, and cost advantages across various aspects of our lives. KYC...

View Article


--- Article Not Found! ---

*** *** *** RSSing Note: Article is missing! We don't know where we put it!!. *** ***

View Article

--- Article Not Found! ---

*** *** *** RSSing Note: Article is missing! We don't know where we put it!!. *** ***

View Article


--- Article Not Found! ---

*** *** *** RSSing Note: Article is missing! We don't know where we put it!!. *** ***

View Article

Secure Software Development – CTO’s Guide

Secure Software Development – CTO’s Guide Considering the recent surge of cyber-attacks, securing a newly built software application is of the utmost importance, now more than ever! “The hacker didn’t...

View Article


How Biometric APIs Will Replace Passwords on Mobile Apps

Technology successively progresses all around us; from the simplest basic Google searches to the working of aircraft, technology has indented its value in everyday life. Biometric APIs are not a...

View Article

A Quick Guide On Open Source Security and Risk Management

“In the digital era, privacy must be a priority. Is it just me, or is secret blanket surveillance obscenely outrageous?” – Al Gore The internet is a great big place with infinite doorways. It...

View Article
Browsing all 19 articles
Browse latest View live




Latest Images