Why Blockchain may not be the elixir to internet security

blockchain

Every architect, builder and designer knows that the right tool can solve the most difficult problems in a jiffy but at the same time, that tool cannot be right for all the situations. There are a lot of confusions running around regarding Blockchain. Many consider it equivalent to bitcoins although both are different, bitcoin being […]

Continue reading


Top 3 cyber security concepts for 2018

2018 Cyber Security Concepts

Cyber security is taking a new turn every year. Its very crucial to stay updated with the latest cyber security concepts and solutions to thrive in the market. The 2018 RSA Conference was exceedingly productive and proactive in bringing out latest cyber security concepts instead of relying on the outdated, legacy ones. Here is a […]

Continue reading


Internet Explorer Zero-day “Double-kill”

Internet Explorer zero-day

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code, host website and lead the victim to view compromised websites. Kaspersky and Qihoo360 independently discovered this zero-day vulnerability (CVE-2018-8174)  for Internet Explorer […]

Continue reading


Cryptojacking Attack hits Aditya Birla Group

Aditya Birla Group became a victim of a huge Cryptojacking Attack

A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group – one of India’s largest business conglomerates headquartered at Mumbai. 2000 plus computers were infected by cyber criminals for cryptojacking – a cyber attack where hackers misuse the victim’s terminals and exploit their processing power […]

Continue reading


Data hacked during EPFO-Aadhar seeding

epfo aadhar

Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of 2.7 Cr Indians. The vulnerabilities in Aadhar seeding with PF accounts may have been exploited to steal the data. The statement from the EPFO came amid reports of a letter allegedly written by EPFO Central Provident […]

Continue reading


Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emails

Do not click Microsoft attachments from unknown senders Formbook

Be careful when you receive attachments to an email, it can be an entry point to Formbook Malware. Formbook malware mainly steals data from forms tracking keystrokes and form submissions, hence the name Formbook. It can also execute several commands on the victim’s machine from the attacker’s servers. It is widely being spread via malicious […]

Continue reading