Blog

January 2015

LinkedIn Phishing Email Scam Alert
This is security advisory for our readers who have LinkedIn accounts. We have been made aware of a phishing email scam that is targeting LinkedIn users. Scroll down to read more about this. Users of the popular business-oriented social networking service LinkedIn are apparently receiving emails that seem to be...
If our readers can recollect, last year we had a blog post about the arrival of WhatsApp Plus, a third party/modified version of WhatsApp. Just yesterday, we were made aware of an interesting incident about this app. Read all about it below. A couple of days ago, users of WhatsApp...
Bitcoins have been in the news recently for various reasons and their popularity has also led to several scams, thefts and hacks aimed at them. It is found that exploit kits for targeting Bitcoins are readily available in the underground community and these are proving to be highly lucrative as...
We check our Gmail account for personal emails, offers, social media updates, promotions, etc., almost every day. But, reviewing our account’s security setting to ensure that it stays safe against malware and hackers is not something that most of us do. In this post, we will take you through a...
Going by the saying “Prevention is better than cure”, we have compiled a list of the most dangerous keywords or terms to search on the Internet. Let’s have a look at them… People search anything and everything online; from a plain search term like “Origin of cricket” to bizarre search...
The Christmas holidays were not the best times for several console gamers as Sony PlayStation Network and Microsoft Xbox Live suffered several hours of downtime and outage. It later came to light that the cause behind this was a deliberate DDoS attack on the networks by a group that call...
Security analysts have always believed that fingerprints are a foolproof replacement for passwords and authentication protocols. However, a new development in this matter has literally toppled this theory and altered the game. When fingerprints are used as an authentication protocol, the single biggest concern is what to do if the...