Are you looking for ways to avoid visiting your cellular network provider’s care center/store to get your Aadhaar…
Are you looking for ways to avoid visiting your cellular network provider’s care center/store to get your Aadhaar…
Typically, a ransomware will demand money or cryptocurrency after it has locked down your computer or phone or…
AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices….
For the past few years, we have been seeing macro-based attacks through Object Linking Embedding (OLE)/Microsoft Office files. But, presently, attackers are…
You might be aware that LIC policyholders must now link their Aadhaar and PAN to their policies according…
IcedID is a new player in the banking Trojan family. It has a modular architecture and capable of…
If you weren’t careful with your incoming emails, then it’s time you should. Attackers have released 12.5 million…
Popular image-sharing site Imgur has issued a notification through its official blog about a security breach that impacted 1.7…
Ransomware outbreaks have been on the rise for quite some time now but suddenly we are observing a…
For any business, suffering a data breach is bad. But, not informing its customers about the breach is…