Blog

Hacking

Vulnerable Wi-Fi routers lead to attacks and fake websites

 October 19, 2012

Estimated reading time: 2 minutes

It was recently discovered that millions of ADSL routers were hacked in Brazil to create a large botnet chain. This is an unprecedented move that goes to show that not even our routers are safe from attackers. Many homes and offices use Wi-Fi routers for web access today so it...

How to get your kids interested in cyber security?

 October 10, 2012

Estimated reading time: 2 minutes

Getting less tech-savvy family members, especially teenagers and younger children, interested in computer security is a thankless task. It is necessary to teach them the implications of security breaches along with the importance of preventive measures. Children and young adults are more vulnerable to security risks like viruses, phishing websites...

Security news updates from the last week

 October 6, 2012

Estimated reading time: 1 minute

Japan enforces severe punishments for people who download illegal content Japan has modified its copyright laws and made it stricter for individuals who simply view pirated videos or download copyrighted content. Earlier, uploaders of such content faced severe consequences while downloaders were let go lightly. But this scenario has now...

Security news updates from the last week

 September 8, 2012

Estimated reading time: 1 minute

AntiSec collects 12 million Apple UDIDs from hacked FBI laptop, FBI denies it! AntiSec, a hacker group associated with Anonymous, claimed to have gotten their hands on 12 million Apple UDIDs from a hacked FBI laptop. They published 1 million of these IDs to validate their claim. However, the FBI...

How to activate two-factor authentication for Gmail

 August 21, 2012

Estimated reading time: 3 minutes

Mat Honan, a tech journalist for Wired, recently witnessed an epic hacking of his Apple account, Amazon account, Macbook, iPhone, iPad, Twitter and Gmail. He admitted that all this was possible because he did not have two-factor (2-step) authentication for his Gmail account. In this post we will show you...

Round-up of the security news updates

 August 17, 2012

Estimated reading time: 2 minutes

Website collects addresses of users who tweet the word ‘home’ This interesting website scans user tweets for the word ‘home’. If the person who tweeted the word has location tracking switched on, the website uses the location data and saves it as the address of that user. This information is...

Latest security news from the last week

 August 10, 2012

Estimated reading time: 2 minutes

Tech journalist blames Amazon and Apple for hack Mat Honan, formerly of Gizmodo, saw all his accounts hacked and devices wiped clean this week thanks to some elementary flaws in Amazon’s and Apple’s support systems. Anyone interested in security should read details about this ‘epic hacking‘. Apparently, all the hacker...

Security news updates from the last week

 August 4, 2012

Estimated reading time: 2 minutes

Indian power grids are vulnerable to cyber-attackers The recent power outage in North India caused mayhem and now officials have said that it is possible for cyber-attackers to hack into the Indian power grid. There is a surprising lack of defense protocols in this sector and this is the cause...

Security news updates from the last week

 July 27, 2012

Estimated reading time: 2 minutes

Android malware learns a new trick Mobile security software and a cautious nature can help you avoid risky apps over the Android Market (Google Play). But researchers have now discovered a way to convert good apps into malicious ones via an update, after they have been installed on a device....

Black Hat conference demonstrates Android and Meego NFC vulnerability

 July 27, 2012

Estimated reading time: 2 minutes

Yesterday I discussed the potential risks of NFC technology and how an attacker could ‘eavesdrop’ on NFC signals. If an attacker steals data by intercepting signals it could be crushing, but what if he could actively send signals and command the NFC enabled phone to do as he pleases? This...