Blog

Social engineering

Attacker uses tricky technique of Excel 4.0 in Malspam campaign

 November 2, 2019

Estimated reading time: 5 minutes

Use of Phishing emails is not new for cyber-attack and is still one of the classic strategies to compromise a victim’s machine. Cyber criminals lure victims to open email attachments (mostly Doc and XLS files) by faking them to look like important one using keywords like invoice, payment, finance, order...

4 Simple Tricks to Spot Fake LinkedIn Profiles

 December 11, 2015
LinkedIn security tips

Estimated reading time: 3 minutes

Do you use LinkedIn to connect with your professional contacts and to interact or look around for potential employment opportunities? If yes, then you must have surely received LinkedIn connection requests from some people unknown to you at some point in time. Most people assume that LinkedIn is a reliable...

Be Careful of these 5 Internet Scams Running on Facebook

  • 9
    Shares
 September 4, 2015

Estimated reading time: 4 minutes

As of last quarter, Facebook has over 1.19 billion monthly active users, with 728 million users using the service daily. On the dark side of the world, this figure amounts to the number of victims that online scammers have charted on their dartboards. Unarguably, Facebook is the most lucrative avenue...

How Security Savvy are Your Staff?

 March 6, 2014

Estimated reading time: 3 minutes

Modern business enterprises deal with large stacks of crucial data that need to be processed at high speeds. As a result, security is often a blind spot for them. Basic enterprise security tips are overlooked for the sake of convenience and this eventually leads to security breaches or data loss....

Classic lies you should not let a cyber criminal use on you

  • 1
    Share
 April 15, 2013

Estimated reading time: 2 minutes

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out certain actions or giving away confidential information is known as Social Engineering. And this is a rampant form of exploitation. Why? If you can get access to anything you want just by...

Your Apple Mac does not need computer security: Myth or not?

 January 23, 2013

Estimated reading time: 3 minutes

There is a widespread misconception in the mainstream computing market that Apple Macs are more secure than Windows machines. In fact, some staunch Apple lovers even feel that since virus threats for Macs do not exist, no system protection software is essential. But how accurate is this belief? Our expertise...

Microsoft releases a Fix it solution to prevent Internet Explorer hijacking vulnerability

 January 3, 2013

Estimated reading time: 2 minutes

Microsoft has successfully released a ‘Fix it solution’ for the recently discovered targeted attack, CVE-2012-4792. This attack was specifically targeted at users of Internet Explorer versions 6, 7 and 8. Users of Internet Explorer 9 and 10 were not affected. The attack exploited a vulnerability that allowed an attacker to...