Blog

April 2014

Is your enterprise Firewall blocking all potentially damaging traffic at the perimeter? Or are certain groups within the organization being given the permission to add exceptions to the Firewall list? Studies have shown that although Firewalls are implemented and configured by IT departments, many organizations actually face data breaches and...
If our readers can recall, we had put together a list of some common Facebook online scams that people fall prey to. Adding to this list is another scam that is doing the rounds on the Internet. We call it the ‘Facebook Online Lottery Scam.’ Here’s a brief about what...
Last week we wrote a blog about Heartbleed, the latest security bug that turned up around the world and caused global mayhem. The bug targeted the SSL encryption of web services that used OpenSSL, and this meant pretty much every major web service was affected. Moreover, security researchers subsequently found...
The new Flipkart app is pretty amazing, isn’t it? If you haven’t tried it out as yet, you definitely should. However, there are several things you need to keep in mind when you make an online purchase through your smartphone. Most people wrongly believe that smartphones are malware free and...
Last week we brought you some interesting news excerpts about the nasty security bug called Heartbleed and how a 5 year-old-boy hacked into his father’s Xbox One. Let’s see what this week has got for you. Incidents of personal data theft rise at an alarming rate According to a study...
Password leaks and targeted attacks are nothing new and the latest security bug related to a massive loss of passwords across the world is ‘Heartbleed’. This bug has received a lot of media coverage over the last few days, so there is a lot of confusion about what it is...
There has been a severe password outage this week thanks to the already famous ‘Heartbleed’ breakdown. Millions of passwords, credit card numbers and other sensitive data have been revealed so it is strongly advised that you change all your passwords immediately. Other security news updates pale in comparison to this...
“Antivirus here and there, which one to trust…” Okay that might be a bad phrase, but you get the point right. Fake antivirus software are in line with some of the major threats prevalent on the Internet today.  Many people have ended up paying money for such software which are...
The widespread adoption of Wi-Fi network connectivity by enterprises and IT departments worldwide has now exposed enterprise networks to a new dimension of vulnerability in the form of wireless hackers and casual intruders. Wireless connectivity certainly helps organizations connect their devices more efficiently and it also improves their bottom line...