Why Blockchain may not be the elixir to internet security

blockchain

Share this:    Every architect, builder and designer knows that the right tool can solve the most difficult problems in a jiffy but at the same time, that tool cannot be right for all the situations. There are a lot of confusions running around regarding Blockchain. Many consider it equivalent to bitcoins although both are different, bitcoin […]

Continue reading


Top 3 cyber security concepts for 2018

2018 Cyber Security Concepts

Share this:    Cyber security is taking a new turn every year. Its very crucial to stay updated with the latest cyber security concepts and solutions to thrive in the market. The 2018 RSA Conference was exceedingly productive and proactive in bringing out latest cyber security concepts instead of relying on the outdated, legacy ones. Here is […]

Continue reading


Internet Explorer Zero-day “Double-kill”

Internet Explorer zero-day

Share this:    A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code, host website and lead the victim to view compromised websites. Kaspersky and Qihoo360 independently discovered this zero-day vulnerability (CVE-2018-8174)  for Internet […]

Continue reading


Cryptojacking Attack hits Aditya Birla Group

Aditya Birla Group became a victim of a huge Cryptojacking Attack

Share this:    A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group – one of India’s largest business conglomerates headquartered at Mumbai. 2000 plus computers were infected by cyber criminals for cryptojacking – a cyber attack where hackers misuse the victim’s terminals and exploit their processing […]

Continue reading


Data hacked during EPFO-Aadhar seeding

epfo aadhar

Share this:    Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of 2.7 Cr Indians. The vulnerabilities in Aadhar seeding with PF accounts may have been exploited to steal the data. The statement from the EPFO came amid reports of a letter allegedly written by EPFO Central […]

Continue reading


Smartly defining RPO and RTO for Disaster Recovery Plans

Smartly define RPO and RTO

Share this:    Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most important parameters for a disaster recovery and business continuity plan. RPO is referred to the point in past which you will recover to in case of any disaster. In another words, it is the threshold of how much data you can afford […]

Continue reading


Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emails

Do not click Microsoft attachments from unknown senders Formbook

Share this:    Be careful when you receive attachments to an email, it can be an entry point to Formbook Malware. Formbook malware mainly steals data from forms tracking keystrokes and form submissions, hence the name Formbook. It can also execute several commands on the victim’s machine from the attacker’s servers. It is widely being spread via […]

Continue reading