Blog

Cyber crime

Why USB drives and CDs are a security risk to your corporate network

 February 26, 2013

Estimated reading time: 3 minutes

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves protecting the corporate network from external threats and internal parties (employees) as well. This is where effective Endpoint Security (EPS) comes into the picture. EPS is a network security concept that places...

More than Rs. 30 crore skimmed off Indian credit card users over 2 months

 February 7, 2013

Estimated reading time: 2 minutes

Over the last few days it has come to light that a global syndicate has been skimming Indian credit card users for the last 2 months. Several cases have been reported where people’s credit card bills and registered mobile numbers have shown fraudulent and unauthorized transactions. It is believed that...

Security news and updates from the last week

 February 1, 2013

Estimated reading time: 1 minute

New York Times website breached by Chinese hackers The New York Times recently discovered that their computer systems were breached by Chinese hackers. The hackers stole corporate passwords of each and every employee and spied on more than 50 individuals in a time span of 4 months. Apparently these attacks...

Latest security news updates from the week gone by

 January 18, 2013

Estimated reading time: 2 minutes

India and hardware makers at loggerheads over cyber security guidelines The Indian Government wants all hardware manufacturers to include a mandatory brochure on cyber security. This stretches to all forms of hardware right from computers and mobile phones to modems and USB drives. However, the hardware companies are not too...

Security news and updates from the last week

 December 21, 2012

Estimated reading time: 2 minutes

Major security flaw found in Samsung devices, Samsung working on solution Samsung manufactures the Exynos 4 quad-core and dual-core chips for its flagship products like Samsung Galaxy S3 and the Galaxy Note II. However, a security flaw has been discovered in these SoC (system on a chip) processors that makes...

Security news updates from the week gone by

 December 15, 2012

Estimated reading time: 2 minutes

Bangalore biggest target of cyber crimes in 2012 The cyber criminal cell at the Criminal Investigation Department (CID) has reported that out of all Indian cities, Bangalore faced the most number of cyber crimes in 2012. Close to 400 reported incidents have been witnessed till the end of November in...

Security news updates from the last week

 December 1, 2012

Estimated reading time: 2 minutes

This week was a rather busy one in the security industry. Here are some of the notable highlights that you should not miss out on. Authorized email monitoring increases by 36% in September 2012 According to reports, email monitoring by national security agencies has jumped by 36% in September 2012....

Syria Internet shutdown: The Internet ‘Kill Switch’ exists

 November 30, 2012

Estimated reading time: 3 minutes

Can a country shutdown the Internet for its citizens with a simple kill switch? There have been many debates about this in the past and it seems that the answer is a resounding ‘yes’. Further proof of this surfaced yesterday with news that the Syrian Government shutdown complete Internet access...

Round-up of the latest security news updates

 November 23, 2012

Estimated reading time: 1 minute

Millions of hackers target Israel after Gaza offensive Israel undertook air-based attacks against the Gaza strip last week and as a result they were hit with more than 44 million hacking attempts. The targeted websites ranged from defense-related sites to several commercial websites. Cyberspace has fast transformed into a battlefield...

5 things you should never reveal on social networks

  • 1
    Share
 November 21, 2012

Estimated reading time: 3 minutes

Many people fail to notice how their online lives endanger their day to day lives. An overload of information shared online, especially over social networks, is perhaps the biggest risk. Constant access to our devices and phones also allows us to share information at a level never seen before. But...