Blog

October 2013

1 Comment

Estimated reading time: 4 minutes

Small enterprises in America are increasingly targeted by cyber criminals based in China. It may seem that hackers are interested in their money or data, but the fact is, the waters are deeper than this. If you think that cyber crooks only have their eyes on big enterprises, then you...
5

Estimated reading time: 2 minutes

The BlackBerry Messenger has been finally rolled out on the streets for Android users. So, while you may be going all gaga over the new and sleek IM, ensure that you are getting the real deal and not just another shady, phony BBM messenger.   The BlackBerry Messenger for Android...
0

Estimated reading time: 2 minutes

Official PHP Website Falls Prey to Hackers Did you recently visit the official website of the open-source PHP programming language? Let’s hope you did not. News are up that the site has been compromised, and is being used to drop a Trojan horse onto systems used to visit the site....
  • 10
    Shares
118

Estimated reading time: 4 minutes

A few weeks back we had informed our readers about CryptoLocker – a new type of a ransomware that has been let loose on the Internet. This post discusses some more important facts about this malware, and steps you must take to prevent it from affecting your computer. What is...
  • 9
    Shares
1 Comment

Estimated reading time: 4 minutes

When we speak of online safety for kids, our first priority should be setting up a guard against online predators. These obnoxious people are everywhere on the Internet, just waiting with their net to trap an easy prey. Parental guidance and a little awareness can go a long way into...
0

Estimated reading time: 2 minutes

Information Security’s Worth in India will be 25 crore this year In the wake of rising cyber threats, information security in the country will be fueled by an average of 25 crore in 2013. This is according to a State of Information Security Survey 2014, conducted by Pricewaterhouse Coopers (PwC),...
0

Estimated reading time: 5 minutes

In our earlier blog post, we talked about the top 20 malware plaguing the Android platform. In this post, we will give you an insight into how each of these malware function once they gain entry into targeted devices. The Top 20 Android Malware 1. Android.FakeRun.A • Android.FakeRun.A is designed...
3

Estimated reading time: 5 minutes

Since the time Android made its entry into the Smartphone arena, it ruffled quite a few players; even the big ones. At present time, Google Android grips a tight 51.6% of the US market share (source: www.androidcentral.com, report as of August 2013). The open source nature of Android has made...
0

Estimated reading time: 3 minutes

WhatsApp Site taken down by Hackers WhatsApp has again made the headlines, thanks to a hacking group called KDMS Team. Netizens who visited the Web site of the most popular instant messaging service, reported defacement of the site. The company issued a statement admitting that their Web site was hijacked...
3

Estimated reading time: 2 minutes

Adobe Hacked – Data of 2.9 million Customers Compromised! Adobe has announced in its blog of a major security breach that compromised the data of 2.9 million of its customers. According to the company’s chief security officer, the hacked data mainly included customer IDs, encrypted passwords, encrypted credit and debit...