Blog

December 2012

4

Estimated reading time: 2 minutes

2012 has been an eventful year for malware and security threats. A number of innovative social engineering tricks, malwares and threats reared their ugly heads and caused losses all around the world. We witnessed all kinds of attacks by hackers and posted a number of findings on our blog. Here...
22

Estimated reading time: 2 minutes

The festive season brings with it heart warming wishes and some great online deals for shoppers and discount seekers. Online retailers present some great discounts and add-ons at this time of the year and online sales see a massive surge in activity as a result. Unsurprisingly, attackers and phishers use...
1 Comment

Estimated reading time: 2 minutes

Major security flaw found in Samsung devices, Samsung working on solution Samsung manufactures the Exynos 4 quad-core and dual-core chips for its flagship products like Samsung Galaxy S3 and the Galaxy Note II. However, a security flaw has been discovered in these SoC (system on a chip) processors that makes...
3

Estimated reading time: 2 minutes

German legislators have stoked the fires of Facebook privacy by ordering the social network to allow anonymous accounts and pseudonyms in place of real names of people. This demand originated from Schleswig-Holstein, the northernmost state of Germany. A data protection agency called Unabhaengiges Landeszentrum fuer Datenschutz (ULD) has emphasized the...
7

Estimated reading time: 3 minutes

Just like smartphones arrived in most markets and obliterated regular feature phones, smart TV’s are expected to change the way we interact with our television sets. A smart TV, or hybrid TV, comes integrated with several web 2.0 applications and widgets that allow users to access the Internet and obtain...
2

Estimated reading time: 2 minutes

Bangalore biggest target of cyber crimes in 2012 The cyber criminal cell at the Criminal Investigation Department (CID) has reported that out of all Indian cities, Bangalore faced the most number of cyber crimes in 2012. Close to 400 reported incidents have been witnessed till the end of November in...
2

Estimated reading time: 3 minutes

Twitter is a great platform for sharing news, opinions and links. Created in 2006, Twitter has more than 500 million active users today and generates more than 350 million tweets every single day. This has naturally led to several phishing attacks over the microblogging platform. The fact that links are...
12

Estimated reading time: 3 minutes

We recently published a post about the inherent dangers of passwords and how they are increasingly vulnerable thanks to user negligence. With so much data being safeguarded by elemental passwords, the need for a refined security layer is imperative. However, a common question we received was about how attackers actually...
1 Comment

Estimated reading time: 2 minutes

Malware exploits Windows AutoRun Strains of malware that spread via the AutoRun feature that automatically launches programs when a USB drive or a disk is inserted into a machine is on the rise today. These kinds of malware exploit a certain bug in the AutoRun software so it is recommended...
10

Estimated reading time: 3 minutes

Every individual who is active on the Internet has a secret to protect. This secret is usually just a few characters long and is commonly known as the password. But how effective can a password really be? Passwords are a 20th century creation that were effective back when there was...