Blog

Malware

Latest Security News and Updates for this Week

 June 29, 2013

Estimated reading time: 2 minutes

6 Million Facebook Account Compromised! Facebook reported that a bug was responsible for exposing email addresses and phone numbers of as much as 6 million Facebook users. The company informed that the bug was a part of the Download Your Information (DIY) tool in Facebook, that allows the user to...

Classic lies you should not let a cyber criminal use on you

  • 1
    Share
 April 15, 2013

Estimated reading time: 2 minutes

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out certain actions or giving away confidential information is known as Social Engineering. And this is a rampant form of exploitation. Why? If you can get access to anything you want just by...

Why USB drives and CDs are a security risk to your corporate network

Estimated reading time: 3 minutes

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves protecting the corporate network from external threats and internal parties (employees) as well. This is where effective Endpoint Security (EPS) comes into the picture. EPS is a network security concept that places...

Latest Mac malware on the rise, hides in networked printer directory

 February 20, 2013

Estimated reading time: 2 minutes

A new variant of Mac malware has been discovered and it is beginning to spread to Apple Macs through the networked printer file directory. The malware is a kind of ‘Backdoor Trojan’ and some sources have named this Trojan ‘Pintsized’. Apple Mac OS X is afflicted by this malware but...

Malware Alert! The risk of image searches on Google and Bing

 February 13, 2013

Estimated reading time: 3 minutes

When was the last time you carried out an image search on Google Images? Did you check the website the image was hosted on before you downloaded it on your computer or smartphone? Unknown to you, image searches are one of the biggest channels of malware over the Internet. Security...

The first computer virus was designed for an Apple computer, by a 15 year old

 February 6, 2013

Estimated reading time: 3 minutes

Contrary to popular belief, the first widespread computer virus that actively spread ‘in-the-wild’ was designed to target Apple computers. This might surprise some staunch Apple users who still feel that their Macs are completely invincible and cannot be infected with any kind of malware whatsoever. In this post we will...

A history of Mac malware: The Apple of a virus developer’s eye

 January 31, 2013

Estimated reading time: 4 minutes

Apple Macs are falsely believed to be invincible and completely safe against malware threats and security breaches. But as we recently discussed, this perpetual myth has gradually been broken over the years. Apple has subtly acknowledged this fact over the last year or so and has made major upheavals in...

Manhattan Court charges creators of Gozi, the world’s most destructive financial virus

 January 25, 2013

Estimated reading time: 2 minutes

In a landmark development for the cyber security world, three cyber criminals have been charged in a Federal Manhattan Court in New York for stealing ‘tens of millions of dollars’ from online banking customers. The hackers were guilty of running Gozi, one of the most advanced and financially destructive viruses...

Your Apple Mac does not need computer security: Myth or not?

 January 23, 2013

Estimated reading time: 3 minutes

There is a widespread misconception in the mainstream computing market that Apple Macs are more secure than Windows machines. In fact, some staunch Apple lovers even feel that since virus threats for Macs do not exist, no system protection software is essential. But how accurate is this belief? Our expertise...

Latest security news updates from the week gone by

 January 18, 2013

Estimated reading time: 2 minutes

India and hardware makers at loggerheads over cyber security guidelines The Indian Government wants all hardware manufacturers to include a mandatory brochure on cyber security. This stretches to all forms of hardware right from computers and mobile phones to modems and USB drives. However, the hardware companies are not too...