Blog

Phishing

Online Ad Campaigns Mimicking as the CryptoLocker

 March 10, 2014

Estimated reading time: 3 minutes

CryptoLocker is a recently discovered Windows malware that encrypts user data and makes it unusable. It demands the user for a certain amount of money (ransom) to decrypt the data. As of December, 2013, the creators of CryptoLocker were able to pull in $30 million in just 100 days. So,...

How Security Savvy are Your Staff?

 March 6, 2014

Estimated reading time: 3 minutes

Modern business enterprises deal with large stacks of crucial data that need to be processed at high speeds. As a result, security is often a blind spot for them. Basic enterprise security tips are overlooked for the sake of convenience and this eventually leads to security breaches or data loss....

What is the Biggest Threat to Your Computer and Online Safety?

 February 24, 2014

Estimated reading time: 1 minute

Where there is smoke, there is fire; and where there is Internet, there is the risk of malware attacks. Although, perhaps a bad analogy, it sends the meaning right across. To put it differently, the Internet is like a layer of thin ice. As long as you know about the...

Most Popular IT Security Blog Posts of the Month

 February 14, 2014

Estimated reading time: 3 minutes

While the entire world is doused in love and mushy feelings on Valentine’s Day, cybercriminals are busy wrapping their evil plans. And in our ongoing effort to jeopardize all such plans, we are giving you a recap of some blog posts with the most insightful tips on online safety.  ...

India – the 4th Most Targeted Nation by Phishers!

 December 5, 2013

Estimated reading time: 3 minutes

In an earlier post, we had discussed how cyber attacks against India is increasing rampantly. In this post, we give you a brief about how phishing attacks are affecting Indian enterprises and what can be done to contain the problem. In Q3 of 2013 (July – September), about 1,25,212 phishing...

Spot Fake Online Shops – Stay Safe from Scams

 November 19, 2013

Estimated reading time: 4 minutes

Online shopping is no more an alien concept. Nearly everyone who spends their time on the Internet, prefer shopping online. But as convenient as online stores are, they can be a scary place too. You never know if the Web site where you are giving away your credit card information...

Types of Facebook Posts you Must Never Click

  • 1
    Share
 September 3, 2013

Estimated reading time: 3 minutes

Facebook – the most popular online space where people share their love, humor, agony, and all sorts of emotions. And in the hustle of all such emotions, cyber criminals slither in their misdoings in the form of unwanted or potentially malicious posts. This post will help you identify the type...

How Prepared is your Business against Data Breach?

 August 8, 2013

Estimated reading time: 3 minutes

Data breach remains one of the most critical threats for any business; large, small, and medium. This post takes you through a quick questionnaire which will help you understand how vulnerable your company is to data breach. What is Data Breach? When confidential data of an organization or an individual...

How to Recognize and Dodge Email Scams?

 July 22, 2013

Estimated reading time: 3 minutes

Internet scams are spreading rampantly across the world. And guess what the most popular carrier of such scams is? No prize for guessing – our beloved internet darling, email. This post gives you a quick read on some of the most common online scams that are spread via emails. 1....

Got an Email Attachment? Pause, Think and Inquire

 July 5, 2013

Estimated reading time: 3 minutes

An email attachment is but the Pandora’s Box of the online world. You never know what might pop out of it! In this post, we have discussed the dangers email attachments entail, and some safety tips on how to tackle the same. The Biggest Risk of Email Attachments Inarguably, one...