Blog

Cyber crime

Whatsapp Hoax (fake) Messages Doing the Rounds Again

  • 1
    Share
 June 25, 2013

Estimated reading time: 3 minutes

Today one of my colleagues received a message on WhatsApp that read: “Hello, I. Am riya director of whatsapp, this message is to inform all of our users that we have only 530 accounts available for new phones, and that our servers have recently been very congested, so we asking...

Apps that every parent should know about

  • 1
    Share
 June 11, 2013

Estimated reading time: 3 minutes

Beginning of the school year is a delicate time for children and youth. If academic expectations are not enough, children seem to believe that they are expected to live up to peer-pressure as well. This is always accompanied by insecurities and complexes. There are helplines, guides and mentors that exist...

Know the Risks of Using ATM and Online Banking

 May 22, 2013

Estimated reading time: 3 minutes

As convenient and user-friendly as the ATM (automated teller machine) and online banking services are, they have their own share of security risks. This blog entails the security risks of using ATMs and online banking, and discusses some valuable safety measures users can take. Risks Involved with ATMs The greatest...

Things You Should Keep off the Table of Facebook

 May 20, 2013

Estimated reading time: 2 minutes

As a continuation to our previous post, where we had discussed the type of information one should not reveal on social networking sites like Facebook, this post tells you about some more important things that are better off without being shared online. Click Everything and Share! Pictures do express a...

How Much Should You Reveal on Facebook?

  • 1
    Share
 May 17, 2013

Estimated reading time: 3 minutes

Oh my God, you do not have a Facebook account? What kind of medieval world do you live in? I have had it since the whole thing started, and now it knows everything about me, more than anyone. Right from munching on a burger at a new food joint in...

Classic lies you should not let a cyber criminal use on you

  • 1
    Share
 April 15, 2013

Estimated reading time: 2 minutes

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out certain actions or giving away confidential information is known as Social Engineering. And this is a rampant form of exploitation. Why? If you can get access to anything you want just by...

Instagram: What you need to know – Part 2

 April 6, 2013

Estimated reading time: 4 minutes

This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy in the app. In Instagram the key word is ‘public.’ Once an Instagram profile has been created, anyone can browse these online profiles and “follow” other Instagram users. Here comes the...

Instagram: What you need to know

 April 3, 2013

Estimated reading time: 3 minutes

In an earlier post we talked about various apps and the risks associated with them. In these subsequent posts, we will scratch the surface a little bit and dig a little deeper to understand the privacy implications of one app in particular – Instagram. Now, that our very own Big...