Blog

Identity theft

What is the price of your stolen identity on the online black market?

  • 53
    Shares
 July 10, 2018

Estimated reading time: 2 minutes

If you thought there is only a black market for stolen mobile phones, drugs, pirated software, etc., then you could be wrong. There is a black market that exists on the Internet and its most lucrative commodity is your personally identifiable information (PII – sensitive information that can be used...

Data Privacy Day – Tips to Protect Your Data and Privacy

 January 28, 2015

Estimated reading time: 3 minutes

Last year, if our readers can recall, we had an interesting discussion on Data Privacy Day (DPD) and also shared some useful tips on how to keep our data safe. Well, we are here again. To refresh our memory, DPD is observed across the world with a centered approach towards...

6 Easy Methods to Prevent Identity Theft

 July 16, 2014

Estimated reading time: 3 minutes

Everyone who works on the Internet today has an identity online and in many ways, this identity is what defines them in the virtual and cyber world. Many times though, malicious parties and hackers actively carry out what is known as identity theft and this can be highly debilitating for...

Instagram: What you need to know – Part 2

 April 6, 2013

Estimated reading time: 4 minutes

This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy in the app. In Instagram the key word is ‘public.’ Once an Instagram profile has been created, anyone can browse these online profiles and “follow” other Instagram users. Here comes the...

Instagram: What you need to know

 April 3, 2013

Estimated reading time: 3 minutes

In an earlier post we talked about various apps and the risks associated with them. In these subsequent posts, we will scratch the surface a little bit and dig a little deeper to understand the privacy implications of one app in particular – Instagram. Now, that our very own Big...

Security news and updates from the last week

 February 15, 2013

Estimated reading time: 1 minute

India – Where most of the world’s spam originates from A large amount of email spam originates in India. This interesting report shows that most of the world’s spam actually originates in India. Facebook has more than 50 million duplicate user accounts worldwide Facebook officials have claimed that there are...

Round-up of Security news updates from the last week

 July 20, 2012

Estimated reading time: 2 minutes

IMs reach third-party contacts thanks to Skype bug A mysterious Skype bug sent messages (IMs) exchanged between two users, to random third-parties on either users’ list. Skype claims this occurred due to old versions of their app crashing on several platforms. This resulted in a lot of bad publicity for...

Future Watch II: Rogue SSL certificates on the rise

 June 4, 2012

Estimated reading time: 2 minutes

Continuing with our series of predicting potential security threats, this post delves into rogue SSL certificates. This attack vector allows phishers and social engineers to gain complete trust of their victims, the prospects of which are quite frightening. SSL (Secure Socket Layer) certificates are present on pages where a user...