Malware

How Much Should You Reveal on Facebook?

Oh my God, you do not have a Facebook account? What kind of medieval world do you live…

How do Cyber Criminals get away with Social Engineering Tricks – Infographic

In an earlier post, we had discussed various tricks that cyber criminals use to get what they want….

Classic lies you should not let a cyber criminal use on you

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out…

How safe are these apps for your kids?

Does your child have access to a Smartphone? Then it’s about time you know about certain apps that…

Caution – Apple Anniversary Awards Scam

Recently I came across an email which pretends to be from Apple corporate office. The email reads, that…

Why USB drives and CDs are a security risk to your corporate network

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves…

Latest Mac malware on the rise, hides in networked printer directory

A new variant of Mac malware has been discovered and it is beginning to spread to Apple Macs…

Web security basics: Watering hole attacks VS phishing attacks

Computer users who are well versed with security threats know why and how clever phishing pages must be…

Malware Alert! The risk of image searches on Google and Bing

When was the last time you carried out an image search on Google Images? Did you check the…

The first computer virus was designed for an Apple computer, by a 15 year old

Contrary to popular belief, the first widespread computer virus that actively spread ‘in-the-wild’ was designed to target Apple…