Blog

Cyber crime

Security news updates from the last week

 December 1, 2012

Estimated reading time: 2 minutes

This week was a rather busy one in the security industry. Here are some of the notable highlights that you should not miss out on. Authorized email monitoring increases by 36% in September 2012 According to reports, email monitoring by national security agencies has jumped by 36% in September 2012....

Syria Internet shutdown: The Internet ‘Kill Switch’ exists

 November 30, 2012

Estimated reading time: 3 minutes

Can a country shutdown the Internet for its citizens with a simple kill switch? There have been many debates about this in the past and it seems that the answer is a resounding ‘yes’. Further proof of this surfaced yesterday with news that the Syrian Government shutdown complete Internet access...

Round-up of the latest security news updates

 November 23, 2012

Estimated reading time: 1 minute

Millions of hackers target Israel after Gaza offensive Israel undertook air-based attacks against the Gaza strip last week and as a result they were hit with more than 44 million hacking attempts. The targeted websites ranged from defense-related sites to several commercial websites. Cyberspace has fast transformed into a battlefield...

5 things you should never reveal on social networks

  • 1
    Share
 November 21, 2012

Estimated reading time: 3 minutes

Many people fail to notice how their online lives endanger their day to day lives. An overload of information shared online, especially over social networks, is perhaps the biggest risk. Constant access to our devices and phones also allows us to share information at a level never seen before. But...

Have you used these easy and effective Quick Heal Parental Control tools?

 November 16, 2012

Estimated reading time: 2 minutes

Parents of school going kids have several questions when it comes to cyber security. Some of these issues involve the freedom and time that should be given to kids when they access the Internet. Other questions revolve around the mode of access in the first place. Today it is very...

Hurricane Sandy could lead to a malicious storm in cyberspace

 October 30, 2012

Estimated reading time: 2 minutes

Hurricane Sandy is one of the biggest storms to ever hit the East coast of the United States in years. Cyber criminals are duly taking advantage of the massive number of people who are keenly following the related news updates. It is a sad state of affairs that such events...

Scammers steal credit card details in ways you never thought of

 October 27, 2012

Estimated reading time: 3 minutes

Cyber criminals and malicious scammers are constantly at work to devise new ways to steal confidential user data. Unfortunately, such attacks are not just restricted to the Internet. A recently discovered spate of attacks enables scammers to steal credit/debit card details and these methods are increasingly carried out in the...

Latest security updates from the last week

 October 20, 2012

Estimated reading time: 2 minutes

Government plans for 5 lakh cyber warriors for e-defense Having recognized the need for defense against extensive cyber attacks, the Indian Government has started an initiative to train 5 lakh ‘cyber warriors’ over the next 5 years. The training will include a centralized institute and access to extensive resources to...

How to get your kids interested in cyber security?

 October 10, 2012

Estimated reading time: 2 minutes

Getting less tech-savvy family members, especially teenagers and younger children, interested in computer security is a thankless task. It is necessary to teach them the implications of security breaches along with the importance of preventive measures. Children and young adults are more vulnerable to security risks like viruses, phishing websites...

US looks to ban Huawei and ZTE for cyberespionage, India waits in anticipation

 October 9, 2012

Estimated reading time: 2 minutes

Many people in India are unaware about Huawei and its large number of products that are sold here. These range from simple wireless modems to advanced networking equipment utilized by industries and other hardware manufacturers. Most of the USB dongles that are sold in the country also come from the...