January 2015

LinkedIn Phishing Email Scam Alert!


Estimated reading time: 2 minutes

This is security advisory for our readers who have LinkedIn accounts. We have been made aware of a phishing email scam that is targeting LinkedIn users. Scroll down to read more about this. Users of the popular business-oriented social networking service LinkedIn are apparently receiving emails that seem to be...

Data Privacy Day – Tips to Protect Your Data and Privacy


Estimated reading time: 3 minutes

Last year, if our readers can recall, we had an interesting discussion on Data Privacy Day (DPD) and also shared some useful tips on how to keep our data safe. Well, we are here again. To refresh our memory, DPD is observed across the world with a centered approach towards...

WhatsApp Plus Users Face Temporary Ban by WhatsApp


Estimated reading time: 3 minutes

If our readers can recollect, last year we had a blog post about the arrival of WhatsApp Plus, a third party/modified version of WhatsApp. Just yesterday, we were made aware of an interesting incident about this app. Read all about it below. A couple of days ago, users of WhatsApp...

Malware Case Study: Kraken RAT Running Behind Bitcoins


Estimated reading time: 3 minutes

Bitcoins have been in the news recently for various reasons and their popularity has also led to several scams, thefts and hacks aimed at them. It is found that exploit kits for targeting Bitcoins are readily available in the underground community and these are proving to be highly lucrative as...

6 Easy Steps to Tighten your GMail Security!


Estimated reading time: 3 minutes

We check our Gmail account for personal emails, offers, social media updates, promotions, etc., almost every day. But, reviewing our account’s security setting to ensure that it stays safe against malware and hackers is not something that most of us do. In this post, we will take you through a...

Be Careful While Searching for these Dangerous Keywords Online!


Estimated reading time: 3 minutes

Going by the saying “Prevention is better than cure”, we have compiled a list of the most dangerous keywords or terms to search on the Internet. Let’s have a look at them… People search anything and everything online; from a plain search term like “Origin of cricket” to bizarre search...

Cybercrimes in India Likely to Cross 300,000 Mark in 2015 – ASSOCHAM Study


Estimated reading time: 3 minutes

An in-depth study has been released by ASSOCHAM-Mahindra SSG and according to this report, cyber-crime incidents in India are set to double to almost 300,000 in 2015. The primary targets of these crimes are going to be entities in the financial space, security establishments for national defense and the integrated...

Alleged Lizard Squad member arrested in the UK

1 Comment

Estimated reading time: 2 minutes

The Christmas holidays were not the best times for several console gamers as Sony PlayStation Network and Microsoft Xbox Live suffered several hours of downtime and outage. It later came to light that the cause behind this was a deliberate DDoS attack on the networks by a group that call...

Hacker fakes German minister’s fingerprints from HD photos

1 Comment

Estimated reading time: 3 minutes

Security analysts have always believed that fingerprints are a foolproof replacement for passwords and authentication protocols. However, a new development in this matter has literally toppled this theory and altered the game. When fingerprints are used as an authentication protocol, the single biggest concern is what to do if the...