Attacker uses tricky technique of Excel 4.0 in Malspam campaign

Use of Phishing emails is not new for cyber-attack and is still one of the classic strategies to…

4 Simple Tricks to Spot Fake LinkedIn Profiles

Do you use LinkedIn to connect with your professional contacts and to interact or look around for potential…

LinkedIn security tips

Be Careful of these 5 Internet Scams Running on Facebook

As of last quarter, Facebook has over 1.19 billion monthly active users, with 728 million users using the…

How Security Savvy are Your Staff?

Modern business enterprises deal with large stacks of crucial data that need to be processed at high speeds….

How do Cyber Criminals get away with Social Engineering Tricks – Infographic

In an earlier post, we had discussed various tricks that cyber criminals use to get what they want….

Classic lies you should not let a cyber criminal use on you

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out…

More than Rs. 30 crore skimmed off Indian credit card users over 2 months

Over the last few days it has come to light that a global syndicate has been skimming Indian…

Facebook Graph Search: Useful search engine or phishers dream come true?

Facebook recently launched a notable new feature known as Graph Search. Mark Zuckerberg highlighted this feature as one…

Your Apple Mac does not need computer security: Myth or not?

There is a widespread misconception in the mainstream computing market that Apple Macs are more secure than Windows…

Microsoft releases a Fix it solution to prevent Internet Explorer hijacking vulnerability

Microsoft has successfully released a ‘Fix it solution’ for the recently discovered targeted attack, CVE-2012-4792. This attack was…