Xafecopy Trojan widespread in Android mobile devices

Android Users Be cautions from Xafecopy Trojan

A new mobile malware Xafecopy Trojan has been detected in India, Kaspersky said in a report. It steals money from victim’s mobile phones via Wireless Application Protocol (WAP) billing payment method. Victim’s mobile currency is used without his knowledge. Around 40 % audience of this malware has been detected in India. Xafecopy Trojan is disguised […]

Continue reading


CIO strategies for preventing new security breaches

CIO strategies

Digital transformation has ensured that cybersecurity is the biggest concern facing CIOs. As we proceed further in the 4th industrial revolution the technology is going be evolve much faster than companies could keep pace with. Cybersecurity isturning into a major priority for business leaders, but to succeed CIOs must prepare themselves for the developing threats […]

Continue reading


Strategic risks of a cyber-attack in 2017!

Strategic risks of a cyber attack

Open and digitally inter-connected technology platforms are shaping future of businesses. As the migration to digital platforms happen, hackers get more ground to target for financial gains via multiple mediums such as ransom, sensitive information exposures, corporate espionage, identity theft etc. One of the latest example of extortion from a corporate is HBO corporations. After […]

Continue reading


Diablo6 – a variant of Locky Ransomware

Diablo6 Ransomware

Many ransomwares continue to spread because email is ubiquitous and users are not cautious to maintaining cyber security. Such is an example of the latest ransomware – Diablo6, a variant of an older Locky ransomware. A spam mail with subject as E [random date]( random number). docx and an attachment of a Zip with the […]

Continue reading


How to invest smartly using cyber security metrices!

cyber security metrices

In the hoax, usually companies end up spending blindly on the most crucial cyber security metrices, they need for their companies to run smoothly. Statistics reveal a grave picture as to how companies have no measurement criteria to choose a security service as well as measure the effectiveness and efficiency of existing safeguards. Most of […]

Continue reading


Which is the most apt vaccine for 2017 epidemic: Cyber-Attacks?

cyber-attacks

With Internet, digitization, automation transformation taking center stage, cybersecurity turns up as one of the biggest concern. Email remains the biggest threat vector for cyber-attacks – claims a recent survey by Barracuda. Already multiple threats or comprises have been the part of cloud computing, IoT, mobile activities. Organizations need to look at the landscape to […]

Continue reading


Current Cyber-heist- Not just personal or corporate!

cyber heist

Yes, you read that right. Cyber criminals are not just after your personal or corporate data of the companies but something much bigger. No doubt, personal or corporate data including health, financial data has many takers on the market of if not, the companies can be kept hostage for ransom. For some companies, however there […]

Continue reading


Cyber Security Lessons to learn from the latest RNC Data Leak

data leaks

Important lessons are learned the hard way. Republican National Committee (RNC) hired Deep Root Analytics, a data analytics firm to profile voters and they left sensitive- 9.2 billion data point amounting to information of nearly 200 million American citizens on an unsecured web server. A poorly configured amazon S3 bucket that could have led to […]

Continue reading