Fake voicemail notifications targetting credentials

Phishing using fake voicemails

Share this:   Fake voicemail notifications aid scammers to collect Office 365 login credentials Heard of phishing attacks? There’s been an update! They are no longer your usual garden-variety email-based attacks. As the average customer becomes increasingly suspicious of unauthorized emails in their inboxes, malicious attackers get more creative and expand their arsenal of weapons. The latest […]

Continue reading

Phishing goes beyond email

Phishing beyond email

Share this:   While phishing expands its horizons, should your security? Expanding its customer base is one of the key strategies that a leading company uses to retain its position in the ever-competitive market. This is true for every industry and applicable to every business that wants to maximize its profits. It should not astonish you  to […]

Continue reading

The Dangers of Identity Theft

Dangers of Identity Theft

Share this:   Identity Theft – what and how to stay safe? With cloud storages and online platforms growing stronger by the day, it wouldn’t be an exaggeration to say that we have digital equivalents of our identities up on the internet these days. SD Card filling up with photos? Save to Cloud! File Access necessary from […]

Continue reading

Third Party VPN services under threat of attack by the infamous APT5 Team

VPN services found vulnerable

Share this:   VPN Compromised — Are you Safe? State sponsored hacking has been around for ages. It occurs when a nation’s government backs a cyber attack against another country or one of its departments. One such hacker team very active these days is the Chinese state-sponsored team called APT5. Their latest target? Virtual Private Networks. To […]

Continue reading

Checkpoint Security reports a shocking rise in Sextortion Emails

Checkpoint reports rising threat of sextortion.

Share this:   There’re no lines cybercriminals won’t cross. Now they’ve resorted to sextortion! Malware was always a poisoned bit of coding A research project conducted by the well-established security company called Checkpoint revealed that cybercriminals have resorted to sextortion, a perverse form of blackmail aimed at harming victims on their sexuality. The report went on to […]

Continue reading

FakeNarrator Malware launches an all-out attack in the South-East Asian region

FakeNarrator Scam rattles South-East Asia.

Share this:   Beware of FakeNarrator Malware Accessibility and Productivity play a key role in ensuring smooth functioning of any organization. Any service or product that enhances efficiency and reduces extra effort is always welcome. The tedious task of reading long documents can be made easier by using a narrator. But be careful, malicious hackers have not […]

Continue reading

NCSAM – Where Industries and the Government team up to raise Cybersecurity Awareness


Share this:   It’s National Cybersecurity Awareness Month NCSAM is an internationally acclaimed awareness drive celebrated to promote the growing importance of cybersecurity in today’s digital world. Held each year in the month of October, NCSAM is a mega-event observed across nations. It started with the primary intention of making the citizens of Canada and the USA […]

Continue reading

The ABCs of Malware – An informative Blog Series (Part 3 of 3)

safeguarding against malware

Share this:   All About Malware – Safeguarding Against Malware This is Part Three of the Three Part Series of Malware Blogs.  Till now, we have learned what a malware is, and the different types of malware that can cause damage to your system. In the last instalment of this blog series, we will go over some […]

Continue reading

The ABCs of Malware – An informative Blog Series (Part 2 of 3)

Types of Malware

Share this:   All About Malware – Types of Malware This is Part Two of the Three Part Series of Malware Blogs. A short recap of Part One   As we saw before, malware is harmful code that hijacks your system and causes damage discreetly. Monetary gain and illegal access to private data are two foremost motivations behind a malware attack. We have learned […]

Continue reading