Blog

September 2013

The Android Malware that exploits Simple Mail Transfer Protocol

7

Estimated reading time: 3 minutes

Taking about new and sophisticated Android malware, we may have a winner. A malware that uses Simple Mail Transfer Protocol (SMTP) servers to send stolen information to the malware author has made its entry. When it comes to sophistication, this mobile malware is known to outrun most malware families. Part...

This Week’s Latest News on IT Security and Updates

1 Comment

Estimated reading time: 2 minutes

IT Returns of SRK, Salman Khan, and Sachin Tendulkar Hacked Looks like cyber criminals have their eyes on Bollywood as well. Reportedly, a Chartered Accountancy (CA) student has been charged with hacking into the income tax returns of Bollywood stars Sharukh Khan and Salman Khan. Industrialist Anil Ambani and sport...

Watch out for Fake BBM apps for Android – they are here to dupe you!

15

Estimated reading time: 2 minutes

BlackBerry has halted its global release of BBM (BlackBerry Messenger) version for Android and iPhone platforms. What you may have downloaded or are going to download, is a fake (probably malicious) application. What’s going on? Back in May, BlackBerry managed to raise quite a lot of eyebrows, when it declared...

CryptoLocker – the New Ransomware on the Loose

27

Estimated reading time: 3 minutes

Previously we had reported about the “FBI virus”. The virus locks the computer screen and stops the user from using the infected machine until they agree to pay a certain amount of money to the cybercriminal. Today, we will discuss a new entry in the list of file encrypting ransomware;...

This Week’s Latest News on IT Security and Updates

1 Comment

Estimated reading time: 2 minutes

Microsoft warns Users of Critical Internet Explorer Vulnerability All supported versions of Internet Explorer, as reported by Microsoft, have a new security vulnerability. This security flaw can allow a hacker to use remote code execution (RME) and gain access to the victim’s computer. Incidents of malwares exploiting IE 8 and...

Critical Security Alert for Internet Explorer Users by Microsoft

31

Estimated reading time: 3 minutes

The Redmond Giant has issued a critical security advisory in the interest of Internet Explorer users. Reports are in that, a security vulnerability in all supported versions of IE has been let loose. What is the Vulnerability? In its official security advisory, Microsoft has reported the vulnerability to be a...

This Week’s Dose of Latest IT Security News and Updates

1 Comment

Estimated reading time: 2 minutes

Grand Theft Auto 5 for PC is finally here! Wait, it’s a Malware! Grand Theft Auto 5 is set to release on 17 September, 2013. The release is for the Xbox 360 and PlayStation 3, and not for PC. But a torrent claiming to be the PC version of GTA...

How to recover your money if your bank account is hacked or your card details are stolen

  • 4
    Shares
541

Estimated reading time: 4 minutes

In this blog I will be focusing on the ways to strengthen the possibility of recovering your money in situations where your bank account is hacked or your credit card or debit card details have been stolen and misused. I will not be talking about how to prevent a bank...

This Week’s Quick Bytes on IT Security News and Updates

4

Estimated reading time: 3 minutes

2,900 Online Banking Infections Hit India in the Second Quarter of 2013 Reportedly, the second quarter of 2013 witnessed a whopping 1,45,000 online banking infections globally. 2% of this figure, which comes to 2,900, appears to have occurred in India. Security analysts were able to detect a malware that redirects...

IPv6 – the Future of Internet

60

Estimated reading time: 4 minutes

If there is anything that can be placed after food, air, and water, it is Internet. The number of computers connected to the internet has become directly proportional to the services that are deployed over networks. This post talks about IPv6, which is the next generation Internet Protocol. What is...