Menu
Print Edition of the Magazine, Available from JANUARY 2024 onwards, Contact us to subscribe.
Login with your registered email.
If incase your password is not working we request you to please reset your password.
Login with your registered email or social accounts.
Register here to explore the world of automation.
Enter your username / registered email address to recover your password.
25-08-2020
In the attacks analyzed by WebARX, the cybercriminals are injecting a JavaScript file that redirects visitors to their o
22-08-2020
The study is based on responses from over 1,000 business decision makers in India, Australia, New Zealand, Singapore, an
15-08-2020
On 5th August 2020, USA government has announced the Expansion of the Clean Network to Safeguard America’s Assets. The
10-08-2020
According to researchers, these vulnerabilities have impacted to all Mercedes-Benz connected cars in China over 2 millio
06-08-2020
Recent report published by leading cybersecurity firm Trend Micro in partnership with researchers at the Polytechnic Uni
30-07-2020
Have you patched SAP system? Cybercriminals are doing massive internet scans for SAP systems affected by RECON Vulnerabi
25-07-2020
According to recent studies, many PDF Applications are found vulnerable to Shadow attack. The trick behind any Shadow At
19-07-2020
Botnet is known as “Zombie Army” in Cybercrime world. After around five months of silence, again dangerous Emotet Bo
What is Vulnerability Assessment & Penetration Testing (VAPT), what is importance of it to any organization and what are
17-07-2020
Companies in the global market are focuses to use automated technology based on autonomous principles are primarily disr
12-07-2020
Due to current COVID-19 Lockdown situations worldwide, since 2020 year start Zoom has seen a high increase of new monthl
06-07-2020
Snake ransomware variant is designed to target industrial control systems. It is harmful to processes of SCADA systems,
11-06-2020
Businesses in the world all have some issues that can embrace and optimize through the use and adoption of digital trans
07-06-2020
Connected devices are network-connected devices focused to maintain a connection between two or more platforms to furthe
24-05-2020
Threat Intelligence or cyber threat intelligence is an internet-based concept used for organizations to understand the t
15-04-2020
Reliance on digital infrastructure due to increased shift on remote working increasing cybersecurity risk mainly because
11-04-2020
At present, TikTok has become the fastest growing social media channel worldwide which draws an alternative version of o
Huawei that has been caught in the crossfire of a larger US-China trade and technology war, has quietly delivered masks
28-03-2020
Enterprises in the current scenario are rushing to keep their businesses working, which is creating a significant risk t
08-02-2020
Ministry of Electronics & IT and DSCI launched ‘Cyber Security Grand Challenge’ with combined prize money of INR 3.2
© 2019 IED Communications Ltd | All right reserved. www.industrialautomationindia.in