Thinking of rooting your precious Droid? Here’s why it may not be such a good idea

 May 19, 2012

Estimated reading time: 3 minutes

The massive popularity of Android smartphones has brought several features and options of the OS to the public domain. One of these options remains the ability to ‘root’ the device. Rooting an Android phone implies gaining (superuser) access to the kernel code of the software and using this access to...

A few tricks to avoid the ‘Phishing’ trap

 May 11, 2012

Estimated reading time: 3 minutes

Phishing is a technique that scammers use to obtain personal information by posing to be from a legitimate source. As a result, there are many people who fall for phishing emails. We regularly update this blog with details about fraudulent emails that attempt to phish for information, but now we...

When Facebook Apps cease to be ‘Cool’

 May 7, 2012

Estimated reading time: 3 minutes

Have you ever wondered why certain ads show up in the right hand corner of your Facebook page? A closer look at these ads and you will be surprised at the volumes they speak about your lifestyle choices – be it exclusive shoes from an e-retailer or a self-development course!...

Has your Facebook account been hacked? Here’s what to do

  • 1
 April 24, 2012

Estimated reading time: 4 minutes

We hear about Facebook accounts getting hacked on a daily basis. With hackers dedicated to pounce on the slightest mistake made by a user, cases of Facebook accounts being compromised have become quite unavoidable. There are also instances of a friend or family member getting unauthorized access and misusing the...

How to Avoid Facebook Scams

  • 3
 April 12, 2012

Estimated reading time: 8 minutes

With more than 800 million users all over the world, Facebook is the perfect breeding ground for scam artists. Every Facebook user has their account interlinked with hundreds or even thousands of their friends. With the exponential amount of users connected to each other Facebook scams require only a few...

Indian Cyberspace hit by Kim Jong-II Malware Mails!

 January 3, 2012

Estimated reading time: 1 minute

It has been observed that cybercriminals are using the name of the North Korean leader Kim Jong-II after his death to target Internet users. Attackers are achieving this by spamming malicious emails containing specially crafted PDF files named “BriefintroductionofKim-Jong-il.pdf” This PDF file has been found to exploit CVE-2010-2883 and CVE-2010-3333...

Security Advisory for Adobe Reader and Acrobat!

 December 18, 2011

Estimated reading time: 1 minute

A critical vulnerability has been identified in Adobe Reader X (10.1.1) and earlier versions for Windows and Macintosh, Adobe Reader 9.4.6 and earlier 9.x versions for UNIX and Adobe Acrobat X (10.1.1) and earlier versions for Windows and Macintosh. This vulnerability (CVE-2011-2462) could cause a crash and potentially allow an...

How You Can Protect Your Website!

 December 8, 2011

Estimated reading time: 2 minutes

It is seen that more and more people are creating websites to market their products. This is a wise move since running your own website will certainly help in getting more customers to purchase your products. But unfortunately, in addition to the customers, hackers too are attracted towards such websites....

Some good tips on credit card safety

 July 21, 2011

Estimated reading time: 3 minutes

When it comes to credit card security I have seen both types of people. There are people who are paranoid about security and do not use credit cards at all or do not perform any online banking transactions at all. Then there are people who do not care about security...