Popular Scams Perpetrated Through Security Breach

Popular Scams Perpetrated Through Security Breach

( 4 min read ) The Biggest ‘Cyber Heists’ of the Century Although we wish for the internet to be a safe place for our transactions and data handling, the bitter truth is that it’s not. While from one end, security providers are doing heavy RnD and advancements towards making the WWW bulletproof, there are hackers intensifying their counterefforts to […]

Continue reading


Data Protection Law Ushers in a Positive Change

Data Protection Law

( 3 min read ) An update on the data protection law December brought in some good news as a hopeful end to 2019. With the whole security scenario getting more complicated by the day, the developments surrounding the Data Protection Law gave those of us involved in cybersecurity some much-needed morale boost. The Personal Data Protection Bill got the Union […]

Continue reading


Dark Web Exposes Computer-Server Data Transfer to Hackers

Dark Web Exposes Computer-Server Data Transfer to Hackers

( 2 min read ) As startling as it may sound but cybercriminals now have access to the most-secured data files used to facilitate confidential communication between organisations’ servers and clients’ computers on the Dark Web. Although Ransomware have been available in the dark web as a service for quite some time now but security certificates is a new phenomena. […]

Continue reading


Latest DNS Spoofing attacks use fragmented datagrams. Can you avoid it?

dns spoofing using fragmented datagrams

( 4 min read ) With a little attention, as it turns out, one can spoof fake DNS responses using fragmented datagrams. How is it done? To match authentic DNS responses to their corresponding queries, resolvers and operating system check: Name of the query Type of the query Source/destination address Destination port (16 bits) DNS transaction ID (16 bits) The […]

Continue reading


Facebook’s massive Data breach: what you need to know

facebook data breach

( 2 min read ) The worries for facebook do not seem to stop with cambridge analytica and this time around it’s a massive data breach of almost 50 million user accounts and another 40 million which are at risk, the vulnerability allowed hackers to take direct access to all these accounts information. As per Facebook, the bugs that enabled […]

Continue reading


Indian BFSI Sector needs to be prepared for upcoming data protection laws

Data ProtectionLaws for Indians

( 2 min read ) The increase in financial crimes is not only a threat to BFSI (Banking, Financial Services and Insurance) companies but it also touches the daily life of millions of people across the globe. According to a recent study, only 1% of the $2.4 trillion laundered through international financial systems is believed to be confiscated. According to […]

Continue reading


Internet Explorer Zero-day “Double-kill”

Internet Explorer zero-day

( 2 min read ) A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code, host website and lead the victim to view compromised websites. Kaspersky and Qihoo360 independently discovered this zero-day vulnerability (CVE-2018-8174)  for Internet Explorer […]

Continue reading


Data hacked during EPFO-Aadhar seeding

epfo aadhar

( 2 min read ) Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of 2.7 Cr Indians. The vulnerabilities in Aadhar seeding with PF accounts may have been exploited to steal the data. The statement from the EPFO came amid reports of a letter allegedly written by EPFO Central Provident […]

Continue reading


Smartly defining RPO and RTO for Disaster Recovery Plans

Smartly define RPO and RTO

( 2 min read ) Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most important parameters for a disaster recovery and business continuity plan. RPO is referred to the point in past which you will recover to in case of any disaster. In another words, it is the threshold of how much data you can afford to […]

Continue reading