Young Techie Creates An Android App That Can Spoof Emails

Email Spoofer app

Dangers of the Email Spoofer App App-savvy people beware. A new app is on the market that can launch a spoofing attack on you. 22-year-old Rupesh Bhandari was recently arrested for developing and deploying a Google Play Store App called Email Spoofer that can forge sender signatures on fake emails and steal money. The news […]

Continue reading


Popular Scams Perpetrated Through Security Breach

Popular Scams Perpetrated Through Security Breach

The Biggest ‘Cyber Heists’ of the Century Although we wish for the internet to be a safe place for our transactions and data handling, the bitter truth is that it’s not. While from one end, security providers are doing heavy RnD and advancements towards making the WWW bulletproof, there are hackers intensifying their counterefforts to […]

Continue reading


Data Protection Law Ushers in a Positive Change

Data Protection Law

An update on the data protection law December brought in some good news as a hopeful end to 2019. With the whole security scenario getting more complicated by the day, the developments surrounding the Data Protection Law gave those of us involved in cybersecurity some much-needed morale boost. The Personal Data Protection Bill got the Union […]

Continue reading


Latest DNS Spoofing attacks use fragmented datagrams. Can you avoid it?

dns spoofing using fragmented datagrams

With a little attention, as it turns out, one can spoof fake DNS responses using fragmented datagrams. How is it done? To match authentic DNS responses to their corresponding queries, resolvers and operating system check: Name of the query Type of the query Source/destination address Destination port (16 bits) DNS transaction ID (16 bits) The […]

Continue reading


Microsoft Office 365 provides new Advanced Security Features

Microsoft Office 365 with added Security features

Microsoft Office 365 is widely popular work office suite, among the SMBs. Hence, no doubt that it has become one of the favourite targets of cyber criminals for viruses, ransomware scams and phishing attacks.  Last year we encountered some vicious ransomwares, like Wannacry and NotPetya, which had wreaked havoc across the globe affecting millions of […]

Continue reading


With the increasing third party leaks, Aadhar Card systems need security reviews

Hacking the aadhar. UIDAI data breach

Aadhar Card database is by far one of the largest government databases on this planet consisting of more than 111 crore entries of Indian citizens. It contains both demographic and biometric data of all the citizens across India. While the Unique Identification Authority of India (UIDAI) has claimed its database to be secure with no […]

Continue reading


Cloud based security and analytics is the key to network protection

cloud analytics

Cloud based security and analytics is a service model in which a key element of security or data analytics is provided through public or private cloud. Cloud analytics typically works on subscription pricing model or utility model (pay-per-use) pricing model. Key elements which make a service cloud analytics as per Gartner are- Data sources Data […]

Continue reading