Blog

August 2013

How Prepared is your Business against Data Breach?

0

Estimated reading time: 3 minutes

Data breach remains one of the most critical threats for any business; large, small, and medium. This post takes you through a quick questionnaire which will help you understand how vulnerable your company is to data breach. What is Data Breach? When confidential data of an organization or an individual...

Worm.Gamarue – What it is and How does it Evolve?

0

Estimated reading time: 5 minutes

Another popular malware whose mode of transport is removable drives, is known as worm.gamarue. This malware is also designed to communicate with a remote server to report its infection and download arbitrary files. These downloaded files are detected as Worm.Gamarue.B by Quick Heal. Primary Analysis: When USB drive shortcut is...

This Week’s Latest Security News and Updates

4

Estimated reading time: 2 minutes

Good News for Facebookers! Facebook has this feature called “Secure Browsing”. Turning it ON directs the browser to communicate with Facebook using a secure connection. This feature makes it difficult for hackers and malware authors to steal information using unsecured Wi-Fi networks. The good news is, Facebook kept this feature...