Locky Ransomware- Why this malware just won’t perish? Ykcol and Asasin- 2 more variants

locky ransomware

Within less than a month, 2 new version of Locky ransomware have been released. YKCOL, locky spelled backwards and ASASIN extension. It came to light in a spam blast to 3 million mail-boxes on 19th September within 3 hours. ASASIN another variant has appeared on 10th October. The ykcol ransomware follows the same convention as […]

Continue reading


CIO Strategies for selecting the best-in-class Collaboration Tool

Selecting Best-in-class Collaboration Tool

Imagine working on a new software launch where the designers, engineers and marketing teams are spread across different countries and hence different time zones. In this scenario to get everybody on the same page and ensuring each one has the access to the latest files is a real challenge. A smart collaboration tool is The […]

Continue reading


Xafecopy Trojan widespread in Android mobile devices

Android Users Be cautions from Xafecopy Trojan

A new mobile malware Xafecopy Trojan has been detected in India, Kaspersky said in a report. It steals money from victim’s mobile phones via Wireless Application Protocol (WAP) billing payment method. Victim’s mobile currency is used without his knowledge. Around 40 % audience of this malware has been detected in India. Xafecopy Trojan is disguised […]

Continue reading


CIO strategies for preventing new security breaches

CIO strategies

Digital transformation has ensured that cybersecurity is the biggest concern facing CIOs. As we proceed further in the 4th industrial revolution the technology is going be evolve much faster than companies could keep pace with. Cybersecurity isturning into a major priority for business leaders, but to succeed CIOs must prepare themselves for the developing threats […]

Continue reading


Strategic risks of a cyber-attack in 2017!

Strategic risks of a cyber attack

Open and digitally inter-connected technology platforms are shaping future of businesses. As the migration to digital platforms happen, hackers get more ground to target for financial gains via multiple mediums such as ransom, sensitive information exposures, corporate espionage, identity theft etc. One of the latest example of extortion from a corporate is HBO corporations. After […]

Continue reading


Diablo6 – a variant of Locky Ransomware

Diablo6 Ransomware

Many ransomwares continue to spread because email is ubiquitous and users are not cautious to maintaining cyber security. Such is an example of the latest ransomware – Diablo6, a variant of an older Locky ransomware. A spam mail with subject as E [random date]( random number). docx and an attachment of a Zip with the […]

Continue reading


How to invest smartly using cyber security metrices!

cyber security metrices

In the hoax, usually companies end up spending blindly on the most crucial cyber security metrices, they need for their companies to run smoothly. Statistics reveal a grave picture as to how companies have no measurement criteria to choose a security service as well as measure the effectiveness and efficiency of existing safeguards. Most of […]

Continue reading


Which is the most apt vaccine for 2017 epidemic: Cyber-Attacks?

cyber-attacks

With Internet, digitization, automation transformation taking center stage, cybersecurity turns up as one of the biggest concern. Email remains the biggest threat vector for cyber-attacks – claims a recent survey by Barracuda. Already multiple threats or comprises have been the part of cloud computing, IoT, mobile activities. Organizations need to look at the landscape to […]

Continue reading