Blog

Phishing

India – the 4th Most Targeted Nation by Phishers!

 December 5, 2013

Estimated reading time: 3 minutes

In an earlier post, we had discussed how cyber attacks against India is increasing rampantly. In this post, we give you a brief about how phishing attacks are affecting Indian enterprises and what can be done to contain the problem. In Q3 of 2013 (July – September), about 1,25,212 phishing...

Spot Fake Online Shops – Stay Safe from Scams

 November 19, 2013

Estimated reading time: 4 minutes

Online shopping is no more an alien concept. Nearly everyone who spends their time on the Internet, prefer shopping online. But as convenient as online stores are, they can be a scary place too. You never know if the Web site where you are giving away your credit card information...

Types of Facebook Posts you Must Never Click

  • 1
    Share
 September 3, 2013

Estimated reading time: 3 minutes

Facebook – the most popular online space where people share their love, humor, agony, and all sorts of emotions. And in the hustle of all such emotions, cyber criminals slither in their misdoings in the form of unwanted or potentially malicious posts. This post will help you identify the type...

How Prepared is your Business against Data Breach?

 August 8, 2013

Estimated reading time: 3 minutes

Data breach remains one of the most critical threats for any business; large, small, and medium. This post takes you through a quick questionnaire which will help you understand how vulnerable your company is to data breach. What is Data Breach? When confidential data of an organization or an individual...

How to Recognize and Dodge Email Scams?

 July 22, 2013

Estimated reading time: 3 minutes

Internet scams are spreading rampantly across the world. And guess what the most popular carrier of such scams is? No prize for guessing – our beloved internet darling, email. This post gives you a quick read on some of the most common online scams that are spread via emails. 1....

Got an Email Attachment? Pause, Think and Inquire

 July 5, 2013

Estimated reading time: 3 minutes

An email attachment is but the Pandora’s Box of the online world. You never know what might pop out of it! In this post, we have discussed the dangers email attachments entail, and some safety tips on how to tackle the same. The Biggest Risk of Email Attachments Inarguably, one...

GBP 800,000 from Google! Nope, it’s a Scam

 June 28, 2013

Estimated reading time: 2 minutes

Google helps you find answers to your questions; Google gives away apps for free; Google has an awesome hangout for you and your pals, but Google never pays you 800,000 British pounds! That’s right! One more online scam that has been making rounds on the Internet is the Google Award...

Watering Hole Attack – An Overview

 June 10, 2013

Estimated reading time: 3 minutes

Guess what would be a better way for a predator to stalk its prey, rather than chasing it? Well, waiting patiently at a watering hole, where its prey would eventually turn up. Strangely, in the online world, hackers are also using the same strategy to trap their victims. This blog...

Know the Risks of Using ATM and Online Banking

 May 22, 2013

Estimated reading time: 3 minutes

As convenient and user-friendly as the ATM (automated teller machine) and online banking services are, they have their own share of security risks. This blog entails the security risks of using ATMs and online banking, and discusses some valuable safety measures users can take. Risks Involved with ATMs The greatest...

Work from Home Scam

 May 20, 2013

Estimated reading time: 2 minutes

Yet another kind of social media scam that has come under the radar of security officials is the “work from home scam”. This blog explains how such scams work, and how can you steer clear from them. Work from home scams are mostly linked to people who are unemployed and...