Blog

September 2018

Immediate steps to follow if you are a victim of banking fraud

  • 2
    Shares
0

Estimated reading time: 2 minutes

In the recent past, innumerable cases have surfaced where there have been incidences of fraudulent charges on credit cards or unauthorized access to personal information. In wake of such rising cases of identity theft and data breaches, it can be extremely useful to know about actions to take once you...

The Need For Anti-Virus As Mobile Wallet Transactions Hit Record 14,170 Crore

  • 2
    Shares
0

Estimated reading time: 2 minutes

After mobile wallet transactions experienced a setback owing to the mandatory know-your-customer (KYC) requirements in March, mobile wallet companies have bounced back with a record transaction of 14,170 crore in May, the highest recorded transaction after January. Thus, M-Wallets are back in vogue with companies once again succeeding in convincing...

Know your ATM card and the various frauds related to it

1 Comment
atm-card-frauds

Estimated reading time: 3 minutes

It’s a plastic world we live in. The proliferation of plastic money everywhere, in the form of debit and credit cards, means that the concept of paper money is soon becoming obsolete. Swiping a card seems to have become almost a natural instinct. The total number of cash withdrawals at...

E-commerce transactions: Tips to stay safe when shopping online

0
e-commerce-tips

Estimated reading time: 2 minutes

Today’s new-generation customer has all the luxuries. At the click of a button (or a touch, on a mobile phone), they can buy literally anything they want. The arrival of online marketplaces like Flipkart, Amazon and thousands of other similar websites means that the basic premise of going out of...

Have You Received A Call To Replace Your Stripe-Only Card With EMV Chip Card Yet?

  • 46
    Shares
15

Estimated reading time: 2 minutes

In case you have received a reminder from your bank asking you to replace your stripe-only card with an EMV chip card and you have no idea why this change is being implemented, then you are at the right place. As per recent instructions received from the Reserve Bank of...

Home network security: Do you really need it?

  • 23
    Shares
0
smart-home-ecommerce

Estimated reading time: 3 minutes

We may not realize it but it’s not just our phones that are smart. In an age of Internet of Things (IoT), there is a lot of hype and hoopla about the connected homes – a concept of houses which will be completely smart and connected. But what we often...

Beware of cyber attacks this holiday season!

  • 22
    Shares
0
holiday-scam

Estimated reading time: 3 minutes

With a range of festivals throughout the festive months, this is truly a time of celebration and joy as people come together. Whether it is Ganesh Chaturthi, Durga Puja, Diwali or Christmas, people everywhere are in a merry mood, spending time with their families and friends. These festive times also...

CVE-2018-8440 – Task Scheduler ALPC Zero-Day Exploit in the Wild

  • 13
    Shares
0

Estimated reading time: 1 minute

The recent zero-day vulnerability CVE-2018-8440 in Windows Task Scheduler enables attackers to perform a privilege elevation on targeted machines. Microsoft has released a security advisory CVE-2018-8440 on September 11, 2018 to address this issue. According to Microsoft, successful exploitation of this vulnerability could run arbitrary code in the security context...

How secure is the Wi-Fi router at your home?

  • 134
    Shares
0

Estimated reading time: 3 minutes

Your router, the box sitting in the corner of your house powers all your smart devices- mobile phones, laptops, tablets etc. with internet. It is the device which is directly exposed to the outside world and thus can be vulnerable to getting hacked. It may not store your personal information,...

“Troldesh’s” One More Variant in the Encryption Offender

  • 22
    Shares
0

Estimated reading time: 4 minutes

Over the past few days, we have been observing criminals/hackers using a new carrier to deliver the ransomware malware. Recently, Quick Heal Security Labs observed a new variant of Troldesh ransomware which encrypts the data and adds the extension as “.no_more_ransom”. This ransomware comes under Crypto-Ransomware variant, the origin of this...