Blog

Tips

Indian Cyberspace hit by Kim Jong-II Malware Mails!

 January 3, 2012

Estimated reading time: 1 minute

It has been observed that cybercriminals are using the name of the North Korean leader Kim Jong-II after his death to target Internet users. Attackers are achieving this by spamming malicious emails containing specially crafted PDF files named “BriefintroductionofKim-Jong-il.pdf” This PDF file has been found to exploit CVE-2010-2883 and CVE-2010-3333...

Security Advisory for Adobe Reader and Acrobat!

 December 18, 2011

Estimated reading time: 1 minute

A critical vulnerability has been identified in Adobe Reader X (10.1.1) and earlier versions for Windows and Macintosh, Adobe Reader 9.4.6 and earlier 9.x versions for UNIX and Adobe Acrobat X (10.1.1) and earlier versions for Windows and Macintosh. This vulnerability (CVE-2011-2462) could cause a crash and potentially allow an...

How You Can Protect Your Website!

 December 8, 2011

Estimated reading time: 2 minutes

It is seen that more and more people are creating websites to market their products. This is a wise move since running your own website will certainly help in getting more customers to purchase your products. But unfortunately, in addition to the customers, hackers too are attracted towards such websites....

Some good tips on credit card safety

 July 21, 2011

Estimated reading time: 3 minutes

When it comes to credit card security I have seen both types of people. There are people who are paranoid about security and do not use credit cards at all or do not perform any online banking transactions at all. Then there are people who do not care about security...