E Com Security Solutions: Security Blog

The Official Security Blog of E Com Security Solutions for advancing the security capabilities of leading businesses and organizations throughout the world.

­

Dropbox Hacked Accounts are now available for Download!

68 Million Drop Box accounts that were hacked in 2012, are leaked iin 2016 and went for sale on Darknet Last month. It is now available for free download. Dropbox, the online storage platform has suffered a massive blow back in August when the company learned that over 60 million

October 4th, 2016|Categories: Cyber Crime, Security NEWS|

India Today Magazine Recognized Pavankumar Bolisetty, as “World – renowned Cyber Security Expert”

Pavankumar Bolisetty's Interview with India Today Magazine, which is published on October 03, 2016.

How to know if you’re at risk in Yahoo hack

If you're wondering what to do after hearing about the massive data breach, follow these steps to make sure you're safe. Yahoo on Thursday revealed a hack that compromised 500 million user accounts, and yours might be among them. It's the largest-ever publicly disclosed data breach, and it could affect

September 22nd, 2016|Categories: Cyber Crime, Cyber Security, Security NEWS|

Indian Cyber Security Expert, Pavankumar Bolisetty, is Nominated as Finalist for the Global CISO of the Year Award

India's best ethical hacker and an Indian entrepreneur, fondly referred to as the "Indian Firewall", has been nominated as a finalist for the EC Council Foundation's Global CISO (Chief Information Security Officer) of the Year Award, 2016. Pavan kumar Bolisetty, founder of E Com Security Solutions' and fondly referred to

September 11th, 2016|Categories: news|Tags: , |

Over 25,000 IoT CCTV Cameras Used In DDoS Attack

The Internet of Things (IoTs) or Internet-connected devices are growing at an exponential rate and so are threats to them. Due to the insecure implementation, these Internet-connected embedded devices, including Smart TVs, Refrigerators, Microwaves, Set-top boxes, Security Cameras and printers, are routinely being hacked and used as weapons in cyber

July 2nd, 2016|Categories: Cyber Security|Tags: , |