Blog

Password

Latest Security News and Updates from this Week

 August 23, 2013

Estimated reading time: 2 minutes

We are all Transparent Now! If you are on Tumblr, then very soon you might be able to follow the official Tumblr blog of the US National Security Agency (NSA). President Barack Obama expressed that this platform would shake off the iron curtain between the US intelligence community and the...

A Look at this Week’s Latest Security News and Updates

 July 20, 2013

Estimated reading time: 2 minutes

Truecaller Gets a Bad Cyberattack Call Apparently, the website of popular online phonebook app, Truecaller, experienced a cyberattack, letting hackers gain unauthorized access to some data. The company has confirmed the same in its official blog. It seems, the Syrian Electronic Army is responsible for the cyberattack. News is up...

Future Watch VII: Your Smart TV opens up a new frontier for hacks and spying

 December 17, 2012

Estimated reading time: 3 minutes

Just like smartphones arrived in most markets and obliterated regular feature phones, smart TV’s are expected to change the way we interact with our television sets. A smart TV, or hybrid TV, comes integrated with several web 2.0 applications and widgets that allow users to access the Internet and obtain...

Simple security tips to avoid Twitter phishing scams

 December 13, 2012

Estimated reading time: 3 minutes

Twitter is a great platform for sharing news, opinions and links. Created in 2006, Twitter has more than 500 million active users today and generates more than 350 million tweets every single day. This has naturally led to several phishing attacks over the microblogging platform. The fact that links are...

How does a hacker crack encrypted password databases?

 December 10, 2012

Estimated reading time: 3 minutes

We recently published a post about the inherent dangers of passwords and how they are increasingly vulnerable thanks to user negligence. With so much data being safeguarded by elemental passwords, the need for a refined security layer is imperative. However, a common question we received was about how attackers actually...

Future Watch VI: Passwords are on their way out due to their vulnerability

 December 6, 2012

Estimated reading time: 3 minutes

Every individual who is active on the Internet has a secret to protect. This secret is usually just a few characters long and is commonly known as the password. But how effective can a password really be? Passwords are a 20th century creation that were effective back when there was...

Why does Anonymous love Guy Fawkes Day so much?

 November 5, 2012

Estimated reading time: 2 minutes

Anonymous recently used YouTube to declare an impending attack on Zynga (and maybe Facebook) on Guy Fawkes Day. That’s today, November 5. Notably, this is not the first time that Anonymous has caused concern on this specific day. Guy Fawkes has come to symbolize the online hacking community and the...

Latest news updates from the last week

 November 3, 2012

Estimated reading time: 2 minutes

Facebook offers new privacy setting indicators for new users In a move that suggests Facebook has begun to marginally accept that it is responsible for user privacy, the social network has revised the manner in which it informs new users about privacy settings. This includes little indicators like ‘light bulbs’...

How to activate two-factor authentication for Gmail

 August 21, 2012

Estimated reading time: 3 minutes

Mat Honan, a tech journalist for Wired, recently witnessed an epic hacking of his Apple account, Amazon account, Macbook, iPhone, iPad, Twitter and Gmail. He admitted that all this was possible because he did not have two-factor (2-step) authentication for his Gmail account. In this post we will show you...