Blog

Social engineering

Season’s greetings: Beware of security threats and fake phishing pages

 December 24, 2012

Estimated reading time: 2 minutes

The festive season brings with it heart warming wishes and some great online deals for shoppers and discount seekers. Online retailers present some great discounts and add-ons at this time of the year and online sales see a massive surge in activity as a result. Unsurprisingly, attackers and phishers use...

Germans demand anonymous accounts over Facebook: Wise move or not?

 December 19, 2012

Estimated reading time: 2 minutes

German legislators have stoked the fires of Facebook privacy by ordering the social network to allow anonymous accounts and pseudonyms in place of real names of people. This demand originated from Schleswig-Holstein, the northernmost state of Germany. A data protection agency called Unabhaengiges Landeszentrum fuer Datenschutz (ULD) has emphasized the...

Simple security tips to avoid Twitter phishing scams

 December 13, 2012

Estimated reading time: 3 minutes

Twitter is a great platform for sharing news, opinions and links. Created in 2006, Twitter has more than 500 million active users today and generates more than 350 million tweets every single day. This has naturally led to several phishing attacks over the microblogging platform. The fact that links are...

Future Watch VI: Passwords are on their way out due to their vulnerability

 December 6, 2012

Estimated reading time: 3 minutes

Every individual who is active on the Internet has a secret to protect. This secret is usually just a few characters long and is commonly known as the password. But how effective can a password really be? Passwords are a 20th century creation that were effective back when there was...

How smartphone attacks make money at the expense of the victim?

 November 28, 2012

Estimated reading time: 4 minutes

The massive surge in smartphone usage all over the world has allowed scammers to devise several ways to monetize vulnerable devices. For the victim these attack vectors represent a loss of data, time and money. But for the attacker these methods are primarily used to gain monetary benefits. So how...

Viral Facebook copyright message is nothing but a scam

 November 27, 2012

Estimated reading time: 2 minutes

If you recently came across a viral Facebook privacy notice that mentioned copyrights of your content, photos and videos, you should be forewarned that this notice is yet another Facebook scam. Facebook recently updated their privacy guidelines and also allowed users to comment on these changes for the first time....

Have you used these easy and effective Quick Heal Parental Control tools?

 November 16, 2012

Estimated reading time: 2 minutes

Parents of school going kids have several questions when it comes to cyber security. Some of these issues involve the freedom and time that should be given to kids when they access the Internet. Other questions revolve around the mode of access in the first place. Today it is very...

5 effortless steps to block Facebook spam from reaching your news feed

 November 8, 2012

Estimated reading time: 3 minutes

We recently posted an article about Facebook ‘Like’ scams and the truth behind them. This post talked about how some parties created fake pages to invoke sympathy and got hundreds of thousands of likes and comments as a result. This in turn enhanced the Edge Rank of a page and...

How do Facebook ‘Like’ scams reach thousands of users?

 November 6, 2012

Estimated reading time: 3 minutes

If you look, you will find countless Facebook pages that have hundreds of thousands of likes and comments. But are these real? Some of the posts invite people to write a comment to see what happens. But predictably, nothing happens and this is all part of a large-scale Facebook scam....

Breaking down a fraudulent RBI email

 November 1, 2012

Estimated reading time: 3 minutes

I just received a scam email in my gmail inbox that pretends to be from the RBI. The message dangles the temptation of a windfall of money but asks me to make a payment first. Such emails are very common but there are still many people who fall for this...