Data Protection Law Ushers in a Positive Change

Data Protection Law

An update on the data protection law December brought in some good news as a hopeful end to 2019. With the whole security scenario getting more complicated by the day, the developments surrounding the Data Protection Law gave those of us involved in cybersecurity some much-needed morale boost. The Personal Data Protection Bill got the Union […]

Continue reading

DNS Protection

DNS Protection

Protect Your DNS – How & Why? DNS or Domain Naming System is a computer server which accommodates public IP addresses with their corresponding hostnames. A DNS server essentially contains a database which stores a mapping between hostnames and IP Addresses. The standard naming convention for IP Addresses follows the dotted decimal format, for example: […]

Continue reading

Ransomware Causes 300 People To Lose Their Jobs

Ransomware Causes Massive Layoffs

Ransomware Forces An Organization To Let Go Of 300 Employees Ransomware has been known to cause a lot of monetary loss. Typically used to exploit the chaos caused by locking a person out of their own system, never before has it affected so many people at once. According to a cybersecurity report, 2019 has been […]

Continue reading

Emotet botnet malware hidden within fake Christmas party invites

Malware found in fake Christmas Party Invite

Beware: Your Christmas party emails could be infected with malware Nobody likes downers when it comes to the holiday spirit. No matter where we are, we all love to bask in the Christmasy atmosphere. However, much like The Grinch, hackers are looking to kill the mood. They’ve resorted to what they know best: malware. This […]

Continue reading

Microsoft Report on Cleverest Phishing Tactics

Microsoft Report on the cleverest phishing tactics of 2019

Microsoft Reports on the Cleverest Phishing Tactics of 2019 While for individuals it is frustrating — and threatening — how quickly cyber-criminals are evolving, for cybersecurity providers it is a matter of amused contemplation. Studying cases upon cases of successful cyber-attacks helps security providers reverse engineer tactics of the hackers to provide countermeasures preemptively. In […]

Continue reading

Fake voicemail notifications targetting credentials

Phishing using fake voicemails

Fake voicemail notifications aid scammers to collect Office 365 login credentials Heard of phishing attacks? There’s been an update! They are no longer your usual garden-variety email-based attacks. As the average customer becomes increasingly suspicious of unauthorized emails in their inboxes, malicious attackers get more creative and expand their arsenal of weapons. The latest strategy […]

Continue reading

The Dangers of Identity Theft

Dangers of Identity Theft

Identity Theft – what and how to stay safe? With cloud storages and online platforms growing stronger by the day, it wouldn’t be an exaggeration to say that we have digital equivalents of our identities up on the internet these days. SD Card filling up with photos? Save to Cloud! File Access necessary from all […]

Continue reading

The ABCs of Malware – An informative Blog Series (Part 3 of 3)

safeguarding against malware

All About Malware – Safeguarding Against Malware This is Part Three of the Three Part Series of Malware Blogs.  Till now, we have learned what a malware is, and the different types of malware that can cause damage to your system. In the last instalment of this blog series, we will go over some ways […]

Continue reading

The ABCs of Malware – An informative Blog Series (Part 2 of 3)

Types of Malware

All About Malware – Types of Malware This is Part Two of the Three Part Series of Malware Blogs. A short recap of Part One   As we saw before, malware is harmful code that hijacks your system and causes damage discreetly. Monetary gain and illegal access to private data are two foremost motivations behind a malware attack. We have learned of […]

Continue reading

The ABCs of Malware – An informative Blog Series (Part 1 of 3)


All About Malware – Introduction & Working This is Part One of the Three Part Series of Malware Blogs. Malware — short for MALicious softWARE — is a running piece of code that is written with the intent to harm your machine. The bad news is that it is evolving with time. Cyber criminals are […]

Continue reading