Blog

October 2013

How Cyber Criminals are Using Small Enterprises to Attack their Real Targets

1 Comment

Estimated reading time: 4 minutes

Small enterprises in America are increasingly targeted by cyber criminals based in China. It may seem that hackers are interested in their money or data, but the fact is, the waters are deeper than this. If you think that cyber crooks only have their eyes on big enterprises, then you...

Are you sure you are getting the real BlackBerry Messenger?

5

Estimated reading time: 2 minutes

The BlackBerry Messenger has been finally rolled out on the streets for Android users. So, while you may be going all gaga over the new and sleek IM, ensure that you are getting the real deal and not just another shady, phony BBM messenger.   The BlackBerry Messenger for Android...

This Week’s Latest News and Updates on Information Security

0

Estimated reading time: 2 minutes

Official PHP Website Falls Prey to Hackers Did you recently visit the official website of the open-source PHP programming language? Let’s hope you did not. News are up that the site has been compromised, and is being used to drop a Trojan horse onto systems used to visit the site....

Alert: Ransomware are on the loose. Know what precautions you should take to prevent data loss

  • 10
    Shares
118

Estimated reading time: 4 minutes

A few weeks back we had informed our readers about CryptoLocker – a new type of a ransomware that has been let loose on the Internet. This post discusses some more important facts about this malware, and steps you must take to prevent it from affecting your computer. What is...

How to Recognize the Signs of Online Predators?

  • 9
    Shares
1 Comment

Estimated reading time: 4 minutes

When we speak of online safety for kids, our first priority should be setting up a guard against online predators. These obnoxious people are everywhere on the Internet, just waiting with their net to trap an easy prey. Parental guidance and a little awareness can go a long way into...

This Week’s Read on the Latest IT Security News and Updates

0

Estimated reading time: 2 minutes

Information Security’s Worth in India will be 25 crore this year In the wake of rising cyber threats, information security in the country will be fueled by an average of 25 crore in 2013. This is according to a State of Information Security Survey 2014, conducted by Pricewaterhouse Coopers (PwC),...

The Top 20 Android Malware – How they work

0

Estimated reading time: 5 minutes

In our earlier blog post, we talked about the top 20 malware plaguing the Android platform. In this post, we will give you an insight into how each of these malware function once they gain entry into targeted devices. The Top 20 Android Malware 1. Android.FakeRun.A • Android.FakeRun.A is designed...

The Top 20 Android Malware – Quick Heal Mobile Threat Report

3

Estimated reading time: 5 minutes

Since the time Android made its entry into the Smartphone arena, it ruffled quite a few players; even the big ones. At present time, Google Android grips a tight 51.6% of the US market share (source: www.androidcentral.com, report as of August 2013). The open source nature of Android has made...

Bytes of Latest IT Security News and Updates for this Week

0

Estimated reading time: 3 minutes

WhatsApp Site taken down by Hackers WhatsApp has again made the headlines, thanks to a hacking group called KDMS Team. Netizens who visited the Web site of the most popular instant messaging service, reported defacement of the site. The company issued a statement admitting that their Web site was hijacked...

This Week’s Bytes of the Latest IT Security News and Updates

3

Estimated reading time: 2 minutes

Adobe Hacked – Data of 2.9 million Customers Compromised! Adobe has announced in its blog of a major security breach that compromised the data of 2.9 million of its customers. According to the company’s chief security officer, the hacked data mainly included customer IDs, encrypted passwords, encrypted credit and debit...