Through this multi-part blog, we offer a different perspective, though at the same time we intend preserving the essence of methodology utilized by Stuxnet or similar worms/viruses to propagate and infect. Read more
The holiday season is not always ‘the most wonderful time of year’ when it comes to e-threats – there’s more online activity with many new shoppers and that can bring out the worst in the cybercriminal community. The recent launch of our eScan... Read more
Till recent times, email harvesting was a time consuming process and was never real-time. This constituted, making connections to the smtp server and providing a dictionary to carry out the attack. With the advent of social networking, many site... Read more