Blog

July 2013

What’s common between most small and medium enterprises? It is a false sense of IT security that they have. Most of these industries assume that they are too small to risk any cyber attack, and it is this very notion that cyber crooks take advantage of. This post explains why...
Have you recently received any news which goes, “Obama speech to urge ‘refocus’ on economy” via any unsolicited email, which seems to have been sent by CNN? If yes, then let’s hope you have not clicked any of the links embedded in the email. This feat is yet another of...
Internet scams are spreading rampantly across the world. And guess what the most popular carrier of such scams is? No prize for guessing – our beloved internet darling, email. This post gives you a quick read on some of the most common online scams that are spread via emails. 1....
Truecaller Gets a Bad Cyberattack Call Apparently, the website of popular online phonebook app, Truecaller, experienced a cyberattack, letting hackers gain unauthorized access to some data. The company has confirmed the same in its official blog. It seems, the Syrian Electronic Army is responsible for the cyberattack. News is up...
What are the odds of getting back a lost or a stolen laptop? Sure, there are many types of laptop tracking software available on the market, yet, reportedly, 46% of lost laptops have no anti-theft protection. Why so? Well, this could be because: Most might think that such software is...
Here’s a reminder for all our readers – Microsoft will no longer be providing any services to Windows XP operating system from April 8, 2014. In other words, machines still running this OS, will no longer receive security updates, and will be out of all kinds of support (paid or...
Chat rooms can be a great online space to hang out for kids and especially teens who share similar interests, thoughts or experiences. But at the same time, the same place can be a dark and dingy alley infested with online predators. This post gives you an insight into some...
Pune Cops Shut Down 25 Suspicious Bank Accounts The infamous Nigerian scam is yet again making the headlines, and this time in the city of Pune. Reportedly, many people have been duped by miscreants running this scam. The fraudsters used text messages, emails, and websites to trick their targets. Fortunately,...
When it comes to enterprise security, there’s a lot at stake; consumers, operations, business relationships, work force, brand image, and financial status, to name a few. While the number of enterprise security threats can be in hundreds, in this post, we have discussed some of the most critical ones. Top...