Blog

May 2012

4

Estimated reading time: 3 minutes

We would like to update our readers about the findings of Flamer, the recent information stealing malware which is making news in Cyber Space. Investigation shows that a few of the malicious Flamer components were reported in the Online Scanner portal around 2 years and 10 months ago (in August...
7

Estimated reading time: 2 minutes

Our Malware Analysis team has discovered a highly complex malware (Trojan.Flamer.A) that is written using the ‘Lua’ programming language. This malware is on par, if not stronger, than previously seen similar threats, Stuxnet and Duqu. The Iranian CERT (Computer Emergency Response Team) has many names for this worm – ‘Flame’,...
2

Estimated reading time: 1 minute

Anonymous, the faceless worldwide hacktivist group, is staging a series of protests in India on June 9 as part of the ‘Occupy India’ movement. These protests are in response to the blocking of popular file sharing websites like ‘The Pirate Bay’ and video sharing websites like ‘Vimeo’ by ISPs in...
2

Estimated reading time: 2 minutes

In the last post on hacktivism, we briefly mentioned three different types of hackers – white-hat hackers, grey-hat hackers and black-hat hackers. This post will delve into these three and help you understand the categories better. A hacker, as we all know by now, is someone who utilizes his understanding...
2

Estimated reading time: 3 minutes

Hacktivism is a rising threat to cyber security that we are sure to see more of in the coming years. Out of the 174 million reported cyber crimes in 2011, around 100 million of them are related to hacktivism. This term refers to the hacking of networks or websites by...
5

Estimated reading time: 2 minutes

India is gradually coming down to the draconian path of Internet governance – a fact that is a tremendous cause for concern. The Internet is meant to be a free platform but India is now lending her voice to a growing cacophony from China, Cuba, Russia and the UAE to...
12

Estimated reading time: 2 minutes

Simon Milner, Head of Policy in Facebook, Britain, recently declared that Facebook is planning to abolish the act of disallowing children below 13 years of age from becoming members (this CNET post explains the situation well). The opinions obviously are divided straight down the middle. Many parents feel that this...
12

Estimated reading time: 1 minute

As the proliferation of the Internet and the use and abuse of Web 2.0 increases, computer users are exposed to zero-day threats and risks that propagate in real-time. Any access to the Internet without protection is no doubt clogged with spyware, adware and dangerous bots. It doesn’t stop at this,...
0

Estimated reading time: 3 minutes

The massive popularity of Android smartphones has brought several features and options of the OS to the public domain. One of these options remains the ability to ‘root’ the device. Rooting an Android phone implies gaining (superuser) access to the kernel code of the software and using this access to...
1 Comment

Estimated reading time: 3 minutes

Social media networks are very good hunting grounds for scammers and this is another such instance of a new scam (targeting Android) spreading on Twitter. This scam consists of enticing tweets that tempts users to click them. The links in these messages carry a ‘.TK’ extension and direct the users...