Chandigarh Lawyer Tricked Out of ₹3.6 Lakhs

Chander Mohan Munjal Case

Share this:   Fraudulent Email Causes Massive Loss Of Money It’s incidences like these that make us double our efforts and provide our clientele with the best possible Email Security Services. The recent trouble faced by Chander Mohan Munjal, a lawyer from Chandigarh, who lost a staggering Rs.3.6 Lakhs to cybercrime, felt like a blow to the […]

Continue reading


Young Techie Creates An Android App That Can Spoof Emails

Email Spoofer app

Share this:   Dangers of the Email Spoofer App App-savvy people beware. A new app is on the market that can launch a spoofing attack on you. 22-year-old Rupesh Bhandari was recently arrested for developing and deploying a Google Play Store App called Email Spoofer that can forge sender signatures on fake emails and steal money. The […]

Continue reading


Popular Scams Perpetrated Through Security Breach

Popular Scams Perpetrated Through Security Breach

Share this:   The Biggest ‘Cyber Heists’ of the Century Although we wish for the internet to be a safe place for our transactions and data handling, the bitter truth is that it’s not. While from one end, security providers are doing heavy RnD and advancements towards making the WWW bulletproof, there are hackers intensifying their counterefforts […]

Continue reading


Data Protection Law Ushers in a Positive Change

Data Protection Law

Share this:   An update on the data protection law December brought in some good news as a hopeful end to 2019. With the whole security scenario getting more complicated by the day, the developments surrounding the Data Protection Law gave those of us involved in cybersecurity some much-needed morale boost. The Personal Data Protection Bill got the […]

Continue reading


Fake Greta Thunberg Email Spreads A Dangerous Malware

Fake Greta Thunberg Emails

Share this:   Fake Greta Thunberg Emails Used to Ensnare New Victims Stories of brave individuals fighting for the overall betterment of our environmental conditions warm our hearts. We all felt a collective energy as we supported Greta Thunberg, the 17-year old environmental activist. It is unfortunate that hackers are misusing this pure sentiment to their own […]

Continue reading


DNS Protection

DNS Protection

Share this:   Protect Your DNS – How & Why? DNS or Domain Naming System is a computer server which accommodates public IP addresses with their corresponding hostnames. A DNS server essentially contains a database which stores a mapping between hostnames and IP Addresses. The standard naming convention for IP Addresses follows the dotted decimal format, for […]

Continue reading


Ransomware Causes 300 People To Lose Their Jobs

Ransomware Causes Massive Layoffs

Share this:   Ransomware Forces An Organization To Let Go Of 300 Employees Ransomware has been known to cause a lot of monetary loss. Typically used to exploit the chaos caused by locking a person out of their own system, never before has it affected so many people at once. According to a cybersecurity report, 2019 has […]

Continue reading


Emotet botnet malware hidden within fake Christmas party invites

Malware found in fake Christmas Party Invite

Share this:   Beware: Your Christmas party emails could be infected with malware Nobody likes downers when it comes to the holiday spirit. No matter where we are, we all love to bask in the Christmasy atmosphere. However, much like The Grinch, hackers are looking to kill the mood. They’ve resorted to what they know best: malware. […]

Continue reading


Microsoft Report on Cleverest Phishing Tactics

Microsoft Report on the cleverest phishing tactics of 2019

Share this:   Microsoft Reports on the Cleverest Phishing Tactics of 2019 While for individuals it is frustrating — and threatening — how quickly cyber-criminals are evolving, for cybersecurity providers it is a matter of amused contemplation. Studying cases upon cases of successful cyber-attacks helps security providers reverse engineer tactics of the hackers to provide countermeasures preemptively. […]

Continue reading


Best Practices For Online Security

Best Practices For Cybersecurity

Share this:   Security Practices for Your Business — How many can you check off your list? When it comes to online security, size stops mattering. A giant name of the industry is as likely to be targeted as a company having a triple figure strength. Conversely, a small company, through the use of bulletproof security approaches […]

Continue reading