How to differentiate rogue URLs from the authentic ones

How to differentiate between a rogue URL and an authentic URL

Share this:    How can you identify if the domain is authentic or impostor? The answer may depend on your knowledge of Domain Spoofing and your familiarity with the IDNs International Domain Names. But there is one more point where you can take care to authenticity of DNS, your web browser. Using punycode, registration of domains in […]

Continue reading


Why Blockchain may not be the elixir to internet security

blockchain

Share this:    Every architect, builder and designer knows that the right tool can solve the most difficult problems in a jiffy but at the same time, that tool cannot be right for all the situations. There are a lot of confusions running around regarding Blockchain. Many consider it equivalent to bitcoins although both are different, bitcoin […]

Continue reading


Top 3 cyber security concepts for 2018

2018 Cyber Security Concepts

Share this:    Cyber security is taking a new turn every year. Its very crucial to stay updated with the latest cyber security concepts and solutions to thrive in the market. The 2018 RSA Conference was exceedingly productive and proactive in bringing out latest cyber security concepts instead of relying on the outdated, legacy ones. Here is […]

Continue reading


Internet Explorer Zero-day “Double-kill”

Internet Explorer zero-day

Share this:    A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code, host website and lead the victim to view compromised websites. Kaspersky and Qihoo360 independently discovered this zero-day vulnerability (CVE-2018-8174)  for Internet […]

Continue reading


Cryptojacking Attack hits Aditya Birla Group

Aditya Birla Group became a victim of a huge Cryptojacking Attack

Share this:    A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group – one of India’s largest business conglomerates headquartered at Mumbai. 2000 plus computers were infected by cyber criminals for cryptojacking – a cyber attack where hackers misuse the victim’s terminals and exploit their processing […]

Continue reading