Young Techie Creates An Android App That Can Spoof Emails

Email Spoofer app

Dangers of the Email Spoofer App App-savvy people beware. A new app is on the market that can launch a spoofing attack on you. 22-year-old Rupesh Bhandari was recently arrested for developing and deploying a Google Play Store App called Email Spoofer that can forge sender signatures on fake emails and steal money. The news […]

Continue reading


Popular Scams Perpetrated Through Security Breach

Popular Scams Perpetrated Through Security Breach

The Biggest ‘Cyber Heists’ of the Century Although we wish for the internet to be a safe place for our transactions and data handling, the bitter truth is that it’s not. While from one end, security providers are doing heavy RnD and advancements towards making the WWW bulletproof, there are hackers intensifying their counterefforts to […]

Continue reading


Data Protection Law Ushers in a Positive Change

Data Protection Law

An update on the data protection law December brought in some good news as a hopeful end to 2019. With the whole security scenario getting more complicated by the day, the developments surrounding the Data Protection Law gave those of us involved in cybersecurity some much-needed morale boost. The Personal Data Protection Bill got the Union […]

Continue reading


Dark Web Exposes Computer-Server Data Transfer to Hackers

Dark Web Exposes Computer-Server Data Transfer to Hackers

As startling as it may sound but cybercriminals now have access to the most-secured data files used to facilitate confidential communication between organisations’ servers and clients’ computers on the Dark Web. Although Ransomware have been available in the dark web as a service for quite some time now but security certificates is a new phenomena. […]

Continue reading


Latest DNS Spoofing attacks use fragmented datagrams. Can you avoid it?

dns spoofing using fragmented datagrams

With a little attention, as it turns out, one can spoof fake DNS responses using fragmented datagrams. How is it done? To match authentic DNS responses to their corresponding queries, resolvers and operating system check: Name of the query Type of the query Source/destination address Destination port (16 bits) DNS transaction ID (16 bits) The […]

Continue reading


Facebook’s massive Data breach: what you need to know

facebook data breach

The worries for facebook do not seem to stop with cambridge analytica and this time around it’s a massive data breach of almost 50 million user accounts and another 40 million which are at risk, the vulnerability allowed hackers to take direct access to all these accounts information. As per Facebook, the bugs that enabled […]

Continue reading


Indian BFSI Sector needs to be prepared for upcoming data protection laws

Data ProtectionLaws for Indians

The increase in financial crimes is not only a threat to BFSI (Banking, Financial Services and Insurance) companies but it also touches the daily life of millions of people across the globe. According to a recent study, only 1% of the $2.4 trillion laundered through international financial systems is believed to be confiscated. According to […]

Continue reading


Internet Explorer Zero-day “Double-kill”

Internet Explorer zero-day

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code, host website and lead the victim to view compromised websites. Kaspersky and Qihoo360 independently discovered this zero-day vulnerability (CVE-2018-8174)  for Internet Explorer […]

Continue reading


Data hacked during EPFO-Aadhar seeding

epfo aadhar

Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of 2.7 Cr Indians. The vulnerabilities in Aadhar seeding with PF accounts may have been exploited to steal the data. The statement from the EPFO came amid reports of a letter allegedly written by EPFO Central Provident […]

Continue reading