Blog

Phishing

India – the 4th Most Targeted Nation by Phishers!

 December 5, 2013

Estimated reading time: 3 minutes

In an earlier post, we had discussed how cyber attacks against India is increasing rampantly. In this post, we give you a brief about how phishing attacks are affecting Indian enterprises and what can be done to contain the problem. In Q3 of 2013 (July – September), about 1,25,212 phishing...

Types of Facebook Posts you Must Never Click

  • 1
    Share
 September 3, 2013

Estimated reading time: 3 minutes

Facebook – the most popular online space where people share their love, humor, agony, and all sorts of emotions. And in the hustle of all such emotions, cyber criminals slither in their misdoings in the form of unwanted or potentially malicious posts. This post will help you identify the type...

Latest IT Security News and Updates from this Week

 August 30, 2013

Estimated reading time: 2 minutes

The Largest Cyber-Attack hits China On 25th August China suffered the largest cyber-attack ever. The news was posted on the website of the China Internet Network Information Center (CNNIC). Reportedly, the attack begun at 2 pm local time paralyzing many websites in the country, before it got worse by 4...

GBP 800,000 from Google! Nope, it’s a Scam

 June 28, 2013

Estimated reading time: 2 minutes

Google helps you find answers to your questions; Google gives away apps for free; Google has an awesome hangout for you and your pals, but Google never pays you 800,000 British pounds! That’s right! One more online scam that has been making rounds on the Internet is the Google Award...

Classic lies you should not let a cyber criminal use on you

  • 1
    Share
 April 15, 2013

Estimated reading time: 2 minutes

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out certain actions or giving away confidential information is known as Social Engineering. And this is a rampant form of exploitation. Why? If you can get access to anything you want just by...

Web security basics: Watering hole attacks VS phishing attacks

 February 19, 2013

Estimated reading time: 3 minutes

Computer users who are well versed with security threats know why and how clever phishing pages must be avoided. Clear signs help to identify fake phishing pages but what does one do against a “watering hole attack”? What exactly is a watering hole attack? A watering hole attack is a...

More than Rs. 30 crore skimmed off Indian credit card users over 2 months

 February 7, 2013

Estimated reading time: 2 minutes

Over the last few days it has come to light that a global syndicate has been skimming Indian credit card users for the last 2 months. Several cases have been reported where people’s credit card bills and registered mobile numbers have shown fraudulent and unauthorized transactions. It is believed that...

Facebook Graph Search: Useful search engine or phishers dream come true?

 January 29, 2013

Estimated reading time: 3 minutes

Facebook recently launched a notable new feature known as Graph Search. Mark Zuckerberg highlighted this feature as one of the 3 pillars of Facebook (after Newsfeed and Timeline) that make the social network relevant and personalized. But how safe is Graph Search? We feel that there are several security and...

Manhattan Court charges creators of Gozi, the world’s most destructive financial virus

 January 25, 2013

Estimated reading time: 2 minutes

In a landmark development for the cyber security world, three cyber criminals have been charged in a Federal Manhattan Court in New York for stealing ‘tens of millions of dollars’ from online banking customers. The hackers were guilty of running Gozi, one of the most advanced and financially destructive viruses...

Your Apple Mac does not need computer security: Myth or not?

 January 23, 2013

Estimated reading time: 3 minutes

There is a widespread misconception in the mainstream computing market that Apple Macs are more secure than Windows machines. In fact, some staunch Apple lovers even feel that since virus threats for Macs do not exist, no system protection software is essential. But how accurate is this belief? Our expertise...