Recently, I have been interacting with Aus-CERT pertaining to a few malicious domains hosted by Aust Domains. Since Aust-Domains is an Australian entity , it makes all the more sense to communicate with Aus-CERT . However, the reply by Aus-CERT... Read more
Phishing emails are probably one of the most used methods in luring users into downloading malware or it could be used to extract important information from unsuspecting users. If you take note, you will notice that these attacks are becoming mo... Read more
We have seen the scale of destruction a Botnet can cause. However, can botnets be ever used for doing good Karma ? In this age, we find lots of corporate entities who will donate a particular sum / amount for a social cause. These campaigns are... Read more
The Story: An email, from an unknown source that most of us have received frequently on our personal email ids. It is a ‘Spam’ which is created by not a foreigner but an Indian. We, at eScan, have tracked down the source responsible... Read more
Surprise was in stored for me when I finally decided to create a fake Facebook Identity for tracking down malicious Fake Facebook Applications. It wasn’t the apps but Facebook’s “People You may Know” feature which had me... Read more