Hacker

LinkedIn Phishing Email Scam Alert!

LinkedIn Phishing Email Scam Alert!

This is security advisory for our readers who have LinkedIn accounts. We have been made aware of […]

Jan 30, 2015     37 Comments
Read More
Alleged Lizard Squad member arrested in the UK

Alleged Lizard Squad member arrested in the UK

The Christmas holidays were not the best times for several console gamers as Sony PlayStation Network and […]

Jan 2, 2015     1 Comment
Read More
Hacker fakes German minister’s fingerprints from HD photos

Hacker fakes German minister’s fingerprints from HD photos

Security analysts have always believed that fingerprints are a foolproof replacement for passwords and authentication protocols. However, […]

Jan 1, 2015     1 Comment
Read More
Computer Security Threats – Glossary Part II

Computer Security Threats – Glossary Part II

Early this year, we had come up with a glossary of common computer security threats. In continuation […]

Nov 5, 2014     1 Comment
Read More
Simplocker – Android Ransomware Alert!

Simplocker – Android Ransomware Alert!

Last year, we came across a malware named Android Defender. This malware, once inside the victim’s phone, […]

Jun 11, 2014     38 Comments
Read More
Why Should you Get Quick Heal for your Android Device – Video

Why Should you Get Quick Heal for your Android Device – Video

This video will tell you in short why your Android device must have Quick Heal in it.

Jan 10, 2014     No Comments
Read More
Stay Away from Spyware with these Easy Tips and Tricks

Stay Away from Spyware with these Easy Tips and Tricks

Spyware refers to software that collect your personal information without your knowledge. Here, we  are discussing how […]

Dec 23, 2013     6 Comments
Read More
Why a Simple Antivirus Isn’t Enough for Small and Midsize Businesses

Why a Simple Antivirus Isn’t Enough for Small and Midsize Businesses

Let’s make peace with the fact that if there is anything that small and midsize businesses are […]

Dec 19, 2013     1 Comment
Read More
Some Quick Tips to Keep your Endpoint Data Safe

Some Quick Tips to Keep your Endpoint Data Safe

Corporate cyber attacks have become a common parlance in the world of IT Security. A recent study […]

Dec 11, 2013     No Comments
Read More
The Dangers of Unsecured WiFi Networks

The Dangers of Unsecured WiFi Networks

They say, good things come for free, but not all of them. Here we tell you about […]

Dec 9, 2013     35 Comments
Read More

Stay Updated!

    Also known as a trapdoor, a Backdoor is used by an attacker to gain illegal access to a victim’s computer.