Blog

Cybersecurity

Hackers are riding on the global panic pertaining to the deadly Coronavirus

 February 10, 2020
Malware-riding-on-Corona-Virus

Estimated reading time: 3 minutes

Very recently, the Coronavirus that apparently originated from the Wuhan province in China has created pandemonium across the world creating an atmosphere of a health crisis for the global populace. As the news of the deadly Coronavirus creates waves of panic across the globe, cyberattackers are lurking into this phenomenon...

Unable to Shut down or Restart Windows 7 systems?

 February 8, 2020

Estimated reading time: 1 minute

In the last two days, we have received reports from Windows 7 users who have been unable to shut down or restart their PC and ran into the below error. While the exact cause of the issue is yet to be ascertained there is no official confirmation from Microsoft yet....

Cybersecurity Awareness Month: Why cybersecurity should be taken seriously?

  • 74
    Shares
 October 20, 2016
cybersecurity

Estimated reading time: 2 minutes

October is earmarked as Cybersecurity Awareness month in the US in order to make internet users vigilant of the various possible cybercrimes. Today the world is connected via the internet and people practically live online with the help of facilities such as banking, mailing, shopping etc. available right at their...

10 Dos and Don’ts of Internet Security on Cyber Security Awareness Month

  • 205
    Shares
 October 6, 2016

Estimated reading time: 3 minutes

October is observed as the Cyber Security Awareness Month. And we thought of celebrating it by sharing some essential dos and don’ts of Internet security with you. And here they are. The DOs 1. While you are banking, shopping or paying your bills online, check if the website’s URL begins...

Security Hole in Gmail Android App Makes Phishing Attacks Easier

  • 1
    Share
 November 17, 2015

Estimated reading time: 2 minutes

A recently discovered bug in the Gmail Android App allows anyone to pose as someone else, hiding their real email address. Although labelled as a “non-issue” by Google Security Team, the flaw can prove to be helpful for online scammers. Read the rest of the story from the post that follows....

Stegosploit – A Technique that can Hack your PC Using Just an Image!

  • 2
    Shares
 June 3, 2015

Estimated reading time: 2 minutes

By merely looking at an image in your browser, you can infect your PC with a malware. Know how from the following post. Thanks to a technique called Stegosploit, a hacker can infect your system by simply making you load an image on the Internet. You don’t even have to...

5 Essential Security Tips for Startups

 April 10, 2015

Estimated reading time: 1 minute

If you are planning to launch a startup business which essentially requires customers’ data for its development and sustainability, then IT security should be on your list of priorities. There is no denying to that fact that, investing in a security infrastructure during the nascent stage of the business can...

Cybercrimes in India Likely to Cross 300,000 Mark in 2015 – ASSOCHAM Study

 January 6, 2015

Estimated reading time: 3 minutes

An in-depth study has been released by ASSOCHAM-Mahindra SSG and according to this report, cyber-crime incidents in India are set to double to almost 300,000 in 2015. The primary targets of these crimes are going to be entities in the financial space, security establishments for national defense and the integrated...

HelloBridge Trojan Misuses Panic Created by Heartbleed

 May 5, 2014

Estimated reading time: 3 minutes

While the Heartbleed security bug affected thousands of web services worldwide and exposed millions of passwords online, the hype around the bug has subsided over the last couple of weeks. It is still not known how many people have actually heeded the warnings and changed their passwords. However, most major...

A New Generation of Cyberattacks that Can Fry Your Computer

 February 28, 2014

Estimated reading time: 1 minute

If we thought that cyberattacks can only affect our computers to the software level, then here’s a something to give this thought a different perspective! Uptil now, we witnessed cyberattacks going after the software components of targeted computers. But apparently, there is something scarier than this; something that can take...