Blog

Privacy

 November 23, 2012

Estimated reading time: 1 minute

Millions of hackers target Israel after Gaza offensive Israel undertook air-based attacks against the Gaza strip last week and as a result they were hit with more than 44 million hacking attempts. The targeted websites ranged from defense-related sites to several commercial websites. Cyberspace has fast transformed into a battlefield...
 November 3, 2012

Estimated reading time: 2 minutes

Facebook offers new privacy setting indicators for new users In a move that suggests Facebook has begun to marginally accept that it is responsible for user privacy, the social network has revised the manner in which it informs new users about privacy settings. This includes little indicators like ‘light bulbs’...
 October 20, 2012

Estimated reading time: 2 minutes

Government plans for 5 lakh cyber warriors for e-defense Having recognized the need for defense against extensive cyber attacks, the Indian Government has started an initiative to train 5 lakh ‘cyber warriors’ over the next 5 years. The training will include a centralized institute and access to extensive resources to...
 September 8, 2012

Estimated reading time: 1 minute

AntiSec collects 12 million Apple UDIDs from hacked FBI laptop, FBI denies it! AntiSec, a hacker group associated with Anonymous, claimed to have gotten their hands on 12 million Apple UDIDs from a hacked FBI laptop. They published 1 million of these IDs to validate their claim. However, the FBI...
 September 1, 2012

Estimated reading time: 1 minute

Fake BlackBerry account activation email A fake BlackBerry account creation email is doing the rounds. The content of the email is the same as a legitimate account creation message sent by RIM, but the attachment with this email is a source of concern. Downloading the attachment can lead to infection...
 July 27, 2012

Estimated reading time: 2 minutes

Android malware learns a new trick Mobile security software and a cautious nature can help you avoid risky apps over the Android Market (Google Play). But researchers have now discovered a way to convert good apps into malicious ones via an update, after they have been installed on a device....
 July 27, 2012

Estimated reading time: 2 minutes

Yesterday I discussed the potential risks of NFC technology and how an attacker could ‘eavesdrop’ on NFC signals. If an attacker steals data by intercepting signals it could be crushing, but what if he could actively send signals and command the NFC enabled phone to do as he pleases? This...
 July 25, 2012

Estimated reading time: 2 minutes

Imagine a scenario where a customer walks into a supermarket to buy groceries. She receives a greeting and a list of offers and discounts for the day on her phone. The store then prepares a customizable shopping list based on past purchases. The store then provides an in-depth mapped shopping...
 June 18, 2012

Estimated reading time: 2 minutes

Location mapping is a highly useful tool to study social behavior but it also poses a real threat to the privacy of individuals. GPS signals collected via smartphones are just the tip of the iceberg. The latest location mapping tool, known as Indoor Positioning System (IPS), makes use of Wi-Fi...