The Dangers of Identity Theft

Dangers of Identity Theft

Identity Theft – what and how to stay safe? With cloud storages and online platforms growing stronger by the day, it wouldn’t be an exaggeration to say that we have digital equivalents of our identities up on the internet these days. SD Card filling up with photos? Save to Cloud! File Access necessary from all […]

Continue reading


Third Party VPN services under threat of attack by the infamous APT5 Team

VPN services found vulnerable

VPN Compromised — Are you Safe? State sponsored hacking has been around for ages. It occurs when a nation’s government backs a cyber attack against another country or one of its departments. One such hacker team very active these days is the Chinese state-sponsored team called APT5. Their latest target? Virtual Private Networks. To be […]

Continue reading


FakeNarrator Malware launches an all-out attack in the South-East Asian region

FakeNarrator Scam rattles South-East Asia.

Beware of FakeNarrator Malware Accessibility and Productivity play a key role in ensuring smooth functioning of any organization. Any service or product that enhances efficiency and reduces extra effort is always welcome. The tedious task of reading long documents can be made easier by using a narrator. But be careful, malicious hackers have not left […]

Continue reading


NCSAM – Where Industries and the Government team up to raise Cybersecurity Awareness

NCSAM

It’s National Cybersecurity Awareness Month NCSAM is an internationally acclaimed awareness drive celebrated to promote the growing importance of cybersecurity in today’s digital world. Held each year in the month of October, NCSAM is a mega-event observed across nations. It started with the primary intention of making the citizens of Canada and the USA more […]

Continue reading


Rise in Phishing Attacks

phishing-attacks

Cyber Criminals Are Circling the Phishing Pond Cyber security surveys suggest that phishing is the most common type of online attack, claiming more and more victims as technology advances. Because it occurs in many forms, it might be time to familiarize yourself with phishing. There are various tricks cyber criminals use to attract unsuspecting people. […]

Continue reading


Imperva Hacked

Cyber Threats

Imperva Hacked: API Keys, SSL Certificates Stolen Based in California, USA, Imperva offers Cybersecurity software and services designed to protect enterprise data, detect and block malicious attacks and other web-based security measures. However, Imperva itself suffered a cyber attack last week when a data breach affected users of Imperva’s Cloud Web Application Firewall (WAF). This […]

Continue reading


Coping up with evolving priorities and challenges of CISOs

Coping up with evolving Priorities and Challenges of CISOs

With the increasing cybersecurity attacks the role of CISOs have evolved drastically from their roles 20 years ago. CISOs have climbed up the executive management ladder due to their increase role in scale, scope and importance. Cybersecurity has become increasingly critical to the bottom line for many organizations, and the associated risks and costs have increased […]

Continue reading


Logix SupportDesk Android App- Providing 24 x 7 support to all our customers

support desk3

We believe in serving our customers without any delay. In order to provide complete and unhindered support to our 2200+ customers, we are glad to launch our SupportDesk mobile ticketing app on Google Play for an unmatched 24 x 7 Support at your fingertips! Logix SupportDesk Highlights: First-of-its-kind by any IT service provider. For ease […]

Continue reading


Web applications: new back-doors to access private data

web browser main

Multiple rogue web applications can be used to attack vulnerable browser extension and exploiting private data becomes easier for adversaries post the access is granted. This is alarming mainly because a normal person browsing the internet is caught unaware of something like this even exists. Various browsers – Chrome, Firefox, Opera extension have been tested […]

Continue reading