Emotet Malware spreading extensively via Microsoft Documents in emails

Emotet

Share this:    Hackers are trying to deliver Emotet malware by attaching it to Microsoft Office document via email. Many US citizens were affected by this around their recent Independence Day, by receiving an email with a document named ‘Greeting Card’ containing malicious malware. EMOTET is a banking Trojan first seen in 2014 targeting customers of German […]

Continue reading


Indian BFSI Sector needs to be prepared for upcoming data protection laws

Data ProtectionLaws for Indians

Share this:    The increase in financial crimes is not only a threat to BFSI (Banking, Financial Services and Insurance) companies but it also touches the daily life of millions of people across the globe. According to a recent study, only 1% of the $2.4 trillion laundered through international financial systems is believed to be confiscated. According […]

Continue reading


What is DMARC? Why is it important for your business?

DMARC policies

Share this:    What is DMARC? DMARC (Domain-based Message Authentication, Reporting and Conformance) is a technology advancement in preventing email and domain spoofing. It ensures that emails go through a domain based check and then sent to the recipient. It uses DKIM and SPF standards along with additional standards of its own. It is really challenging to […]

Continue reading


Bypass glitch makes Mac OS vulnerable due to improper code-signing implementation

Is your MacOS secure

Share this:    A bypass found in third party developers’ interpretation of code signing API allowed for unsigned malicious code to appear to be signed by Apple. All the third-party vendors have issued patch once they realized that their software was not interacting correctly with the Apple’s code-signing API. Without the patch, attackers can craft malicious code […]

Continue reading


Beware of this Top 10 most misused Domains

Share this:    In the latest research it is revealed that, some of the latest TLDs (Top-Level Domains) such as .men, .work and .click are the riskiest and most misused domains over the internet. Ofcourse, there are many rogue .com and .net TLDs as well but research reveals these are lesser misused than the one mentioned before. […]

Continue reading


Stay protected from Domain Spoofing – Know all about it!

domain spoofing

Share this:    What is spoofing? Cyber criminal can easily impersonate or forges domains, IP or Email ids to steal confidential information . Such domains, IPs or Emails are just a lookalike of the original Authorized identity that carries no scope of doubt for the Recipient, making it impossible to identify the actual Fraud for which he […]

Continue reading


How to differentiate rogue URLs from the authentic ones

How to differentiate between a rogue URL and an authentic URL

Share this:    How can you identify if the domain is authentic or impostor? The answer may depend on your knowledge of Domain Spoofing and your familiarity with the IDNs International Domain Names. But there is one more point where you can take care to authenticity of DNS, your web browser. Using punycode, registration of domains in […]

Continue reading


Why Blockchain may not be the elixir to internet security

blockchain

Share this:    Every architect, builder and designer knows that the right tool can solve the most difficult problems in a jiffy but at the same time, that tool cannot be right for all the situations. There are a lot of confusions running around regarding Blockchain. Many consider it equivalent to bitcoins although both are different, bitcoin […]

Continue reading


Top 3 cyber security concepts for 2018

2018 Cyber Security Concepts

Share this:    Cyber security is taking a new turn every year. Its very crucial to stay updated with the latest cyber security concepts and solutions to thrive in the market. The 2018 RSA Conference was exceedingly productive and proactive in bringing out latest cyber security concepts instead of relying on the outdated, legacy ones. Here is […]

Continue reading