With the growing complexity of cyber-attacks, enterprises are spending millions to avoid cyber-crime. However, due to bad security practices such as usage of elementary passwords for system access creates most vulnerable opportunity for cybercri... Read more
Be wary of data-stealing Mobile Apps: There is a suspicion that Chinese Mobile Device manufacturers might be accessing consumer data from the smart-phones / devices, without user permission and sending it to Chinese servers which is out of India... Read more
Dolphin Attack – Another new threat: Can you think of a scenario where your smartphone starts making calls, sending text messages or browsing malicious websites automatically without your knowledge? Interestingly, hackers are making this p... Read more
A new variant of Locky Ransomware has been discovered and has been spreading through a Spam Campaign with the Subject Line “Status of Invoice”. Moreover, the attachments are compressed using 7z, rather than using the .zip extension, which can ea... Read more
CAA – Certification Authority Authorization As on September 8th 2017, it is now mandatory for the Certifying Authorities to verify the CAA record before issuing the SSL Certificate as directed by Certification Authority Authorization. The... Read more