Blog

Mobile devices

Security news updates from the week gone by

 December 15, 2012

Estimated reading time: 2 minutes

Bangalore biggest target of cyber crimes in 2012 The cyber criminal cell at the Criminal Investigation Department (CID) has reported that out of all Indian cities, Bangalore faced the most number of cyber crimes in 2012. Close to 400 reported incidents have been witnessed till the end of November in...

Security news updates from the last week

 December 1, 2012

Estimated reading time: 2 minutes

This week was a rather busy one in the security industry. Here are some of the notable highlights that you should not miss out on. Authorized email monitoring increases by 36% in September 2012 According to reports, email monitoring by national security agencies has jumped by 36% in September 2012....

How smartphone attacks make money at the expense of the victim?

 November 28, 2012

Estimated reading time: 4 minutes

The massive surge in smartphone usage all over the world has allowed scammers to devise several ways to monetize vulnerable devices. For the victim these attack vectors represent a loss of data, time and money. But for the attacker these methods are primarily used to gain monetary benefits. So how...

Round-up of the latest security news updates

 November 23, 2012

Estimated reading time: 1 minute

Millions of hackers target Israel after Gaza offensive Israel undertook air-based attacks against the Gaza strip last week and as a result they were hit with more than 44 million hacking attempts. The targeted websites ranged from defense-related sites to several commercial websites. Cyberspace has fast transformed into a battlefield...

Security news updates from the last week

 October 27, 2012

Estimated reading time: 2 minutes

Android apps are still not completely secure, say German researchers German researchers have found that heavily encrypted Android apps are also susceptible to losing crucial data about their users. They tested several free apps from Google Play and found that they could successfully carry out man-in-the-middle attacks against most of...

Latest security updates from the last week

 October 20, 2012

Estimated reading time: 2 minutes

Government plans for 5 lakh cyber warriors for e-defense Having recognized the need for defense against extensive cyber attacks, the Indian Government has started an initiative to train 5 lakh ‘cyber warriors’ over the next 5 years. The training will include a centralized institute and access to extensive resources to...

The FBI’s IC3 releases a public warning about the growing threat of mobile malware

 October 16, 2012

Estimated reading time: 2 minutes

It is a known fact that malware threats over smartphones, especially on Android, are on the rise and have reached a large number of victims all around the world. To highlight this threat, the Internet Crime Complaint Center (IC3) issued a warning about the growing hazards of mobile malware and...

Google Play Store may soon get a built-in malware scanner

 October 15, 2012

Estimated reading time: 2 minutes

Google intends to release a future update to its Google Play Store that will provide client-side protection from malware present in malicious applications. This malware scanner will analyze an application when a user attempts to install it on an Android device. If there is a known strain of malware present...

How to get your kids interested in cyber security?

 October 10, 2012

Estimated reading time: 2 minutes

Getting less tech-savvy family members, especially teenagers and younger children, interested in computer security is a thankless task. It is necessary to teach them the implications of security breaches along with the importance of preventive measures. Children and young adults are more vulnerable to security risks like viruses, phishing websites...

Why leaving your smartphone WiFi ON causes more harm than good

 October 4, 2012

Estimated reading time: 2 minutes

Many users are under the misconception that leaving their smartphone WiFi switched ON only leads to a persistent battery drain. While this is not inaccurate, the truth is that there is another threat to be aware of. This is the threat of the ‘evil twin’. Anyone who has used WiFi...