Blog

August 2012

Android fragmentation leads to security hazards

1 Comment

Estimated reading time: 3 minutes

A new version of Android always brings with it tremendous amount of fanfare and adulation. Some versions gain more popularity than others and penetrate deeper markets. However, ‘fragmentation’ is a major hindrance that Android faces and the latest upgrades seldom reach all markets simultaneously. This creates several security loopholes that...

Latest security news from the last week

1 Comment

Estimated reading time: 2 minutes

Tech journalist blames Amazon and Apple for hack Mat Honan, formerly of Gizmodo, saw all his accounts hacked and devices wiped clean this week thanks to some elementary flaws in Amazon’s and Apple’s support systems. Anyone interested in security should read details about this ‘epic hacking‘. Apparently, all the hacker...

Fake FBI ransomware demands money to unlock machines

6

Estimated reading time: 2 minutes

A new variant of ransomware has been spotted in the United States. We would like to bring this to the notice of our US based customers and also inform users from other geographical locations. What is ransomware? Ransomware is a potent form of malware that locks down an infected machine...

FAQs on SSL certificates and their importance

2

Estimated reading time: 3 minutes

While browsing the web a user frequently comes across several pages where a secure channel of communication is required. This is especially true since many attackers have staged phishing attacks and stolen confidential information over the years. Pages that involve financial transactions, login details and other data are hence secured...

Notable Security features of Android 4.1 Jelly Bean

11

Estimated reading time: 2 minutes

Android 4.1 (Jelly Bean) was announced on June 27, 2012 at the Google I/O conference. With Jelly Bean, Google aims to revamp Android after the underwhelming Honeycomb (version 3.0) and the moderate success and reach of Android 4.0 (Ice Cream Sandwich). Jelly Bean claims to be the most secure Android...

Security news updates from the last week

1 Comment

Estimated reading time: 2 minutes

Indian power grids are vulnerable to cyber-attackers The recent power outage in North India caused mayhem and now officials have said that it is possible for cyber-attackers to hack into the Indian power grid. There is a surprising lack of defense protocols in this sector and this is the cause...

Attackers trick victims into calling them back on premium-rate numbers

  • 85
    Shares
428

Estimated reading time: 2 minutes

Have you ever received a burst of missed calls from strange numbers in a short span of time? Such missed calls usually last for just one ring and it is strongly recommended that you DO NOT call these numbers back. This is an old scam that has resurfaced and we...

Facebook scam asks for donation for child charity organizations

17

Estimated reading time: 2 minutes

A new Facebook scam has been spotted over the last few days. Unlike previously seen social engineering tricks, this scam only appears after a certain malware enters a system. The malware, known as Citadel, injects itself into a Facebook session when a victim opens a Facebook webpage. It then displays...