The persistent threat of PC malware: Top Windows malware families of 2012

2012 has seen various malware threats and international cyberespionage tools evolve to new heights. However, the PC still…

Microsoft releases a Fix it solution to prevent Internet Explorer hijacking vulnerability

Microsoft has successfully released a ‘Fix it solution’ for the recently discovered targeted attack, CVE-2012-4792. This attack was…

Season’s greetings: Beware of security threats and fake phishing pages

The festive season brings with it heart warming wishes and some great online deals for shoppers and discount…

Future Watch VII: Your Smart TV opens up a new frontier for hacks and spying

Just like smartphones arrived in most markets and obliterated regular feature phones, smart TV’s are expected to change…

Security news updates from the week gone by

Bangalore biggest target of cyber crimes in 2012 The cyber criminal cell at the Criminal Investigation Department (CID)…

Simple security tips to avoid Twitter phishing scams

Twitter is a great platform for sharing news, opinions and links. Created in 2006, Twitter has more than…

How does a hacker crack encrypted password databases?

We recently published a post about the inherent dangers of passwords and how they are increasingly vulnerable thanks…

Latest security news and updates

Malware exploits Windows AutoRun Strains of malware that spread via the AutoRun feature that automatically launches programs when…

Future Watch VI: Passwords are on their way out due to their vulnerability

Every individual who is active on the Internet has a secret to protect. This secret is usually just…

How smartphone attacks make money at the expense of the victim?

The massive surge in smartphone usage all over the world has allowed scammers to devise several ways to…