Blog

April 2013

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out certain actions or giving away confidential information is known as Social Engineering. And this is a rampant form of exploitation. Why? If you can get access to anything you want just by...
Adobe Systems has released improved versions of Flash Player, Shockwave Player and ColdFusion to patch critical vulnerabilities in these. As stated by Adobe “these vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system” The new versions of Flash Player for Windows and...
This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy in the app. In Instagram the key word is ‘public.’ Once an Instagram profile has been created, anyone can browse these online profiles and “follow” other Instagram users. Here comes the...
In an earlier post we talked about various apps and the risks associated with them. In these subsequent posts, we will scratch the surface a little bit and dig a little deeper to understand the privacy implications of one app in particular – Instagram. Now, that our very own Big...