Blog

Email

Hurricane Sandy could lead to a malicious storm in cyberspace

 October 30, 2012

Estimated reading time: 2 minutes

Hurricane Sandy is one of the biggest storms to ever hit the East coast of the United States in years. Cyber criminals are duly taking advantage of the massive number of people who are keenly following the related news updates. It is a sad state of affairs that such events...

Scammers steal credit card details in ways you never thought of

 October 27, 2012

Estimated reading time: 3 minutes

Cyber criminals and malicious scammers are constantly at work to devise new ways to steal confidential user data. Unfortunately, such attacks are not just restricted to the Internet. A recently discovered spate of attacks enables scammers to steal credit/debit card details and these methods are increasingly carried out in the...

Beware of Fake Complaint Emails from BBB

 October 18, 2012

Estimated reading time: 1 minute

Another email scam that uses the name and logo of the Better Business Bureau (BBB) has continued to spread over the Internet. A majority of such emails carry the recognisable BBB torch logo and contain the subject line “Case #91492169”. These emails carry an attachment that contains a malicious executable file...

Beware: Fake mails with the name of RBI

 October 16, 2012

Estimated reading time: 2 minutes

Fraudsters have gone one step ahead and started circulating e-mails that resemble the Reserve Bank of India’s (RBI) official letters. These emails appear to come from Mr. D. Subbarao, the Governor of RBI. Such con letters appear to come from the Funds Remittance Department of RBI and they tell the...

How to activate two-factor authentication for Gmail

 August 21, 2012

Estimated reading time: 3 minutes

Mat Honan, a tech journalist for Wired, recently witnessed an epic hacking of his Apple account, Amazon account, Macbook, iPhone, iPad, Twitter and Gmail. He admitted that all this was possible because he did not have two-factor (2-step) authentication for his Gmail account. In this post we will show you...

Latest news updates from the week gone by

 July 5, 2012

Estimated reading time: 2 minutes

Rootkit developed for Android Ice Cream Sandwich A research team in North Carolina State University has highlighted a security flaw in Android 4.0.4 which can cause a lot of trouble. A rootkit developed for the OS can make applications invisible. So a malicious app can stay hidden on the device...

Are you the Spam – Junkie?

 June 16, 2012

Estimated reading time: 3 minutes

Isn’t the Internet just the perfect thing? You log on to your email account and viola! Your friends, relatives, colleagues, close, semi-close and not even close people are just a ‘send’ away. Even the cute picture of a baby dressed in a pumpkin suit that you absolutely loved can be...