Blog

Tips

Classic lies you should not let a cyber criminal use on you

  • 1
    Share
 April 15, 2013

Estimated reading time: 2 minutes

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out certain actions or giving away confidential information is known as Social Engineering. And this is a rampant form of exploitation. Why? If you can get access to anything you want just by...

Adobe addresses serious vulnerabilities with its latest patches

 April 10, 2013

Estimated reading time: 1 minute

Adobe Systems has released improved versions of Flash Player, Shockwave Player and ColdFusion to patch critical vulnerabilities in these. As stated by Adobe “these vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system” The new versions of Flash Player for Windows and...

Instagram: What you need to know – Part 2

 April 6, 2013

Estimated reading time: 4 minutes

This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy in the app. In Instagram the key word is ‘public.’ Once an Instagram profile has been created, anyone can browse these online profiles and “follow” other Instagram users. Here comes the...

Facebook Graph Search could interfere with your online privacy

 March 21, 2013

Estimated reading time: 3 minutes

Three months ago Facebook revealed Graph Search which had a lot of mixed reviews. While some reviewers considered it to be a great marketing tool for direct messages, others expressed that it could bring huge security concerns with it. What is Graph Search? Touted to be the ultimate search tool...

How safe are these apps for your kids?

 March 19, 2013

Estimated reading time: 4 minutes

Does your child have access to a Smartphone? Then it’s about time you know about certain apps that are popular with children and young adults. Most of these apps are designed to keep your children’s online conversation as private as possible. Some allow them to take a picture and share...

How to avoid accidental in-app purchases by kids on your Smartphone?

 March 5, 2013

Estimated reading time: 2 minutes

Uncontrolled in-app purchases can result in huge bills for your Smartphone. However, the feature can be easily turned off. Needless to say, ‘free’ apps in Google Play or iTunes Store are always more preferable than their ‘paid’ counterparts. However, these apps work using a ‘freemium’ model to generate revenue. Yes,...

Why USB drives and CDs are a security risk to your corporate network

 February 26, 2013

Estimated reading time: 3 minutes

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves protecting the corporate network from external threats and internal parties (employees) as well. This is where effective Endpoint Security (EPS) comes into the picture. EPS is a network security concept that places...

Malware Alert! The risk of image searches on Google and Bing

 February 13, 2013

Estimated reading time: 3 minutes

When was the last time you carried out an image search on Google Images? Did you check the website the image was hosted on before you downloaded it on your computer or smartphone? Unknown to you, image searches are one of the biggest channels of malware over the Internet. Security...

More than Rs. 30 crore skimmed off Indian credit card users over 2 months

 February 7, 2013

Estimated reading time: 2 minutes

Over the last few days it has come to light that a global syndicate has been skimming Indian credit card users for the last 2 months. Several cases have been reported where people’s credit card bills and registered mobile numbers have shown fraudulent and unauthorized transactions. It is believed that...