Chandigarh Lawyer Tricked Out of ₹3.6 Lakhs

Chander Mohan Munjal Case

Fraudulent Email Causes Massive Loss Of Money It’s incidences like these that make us double our efforts and provide our clientele with the best possible Email Security Services. The recent trouble faced by Chander Mohan Munjal, a lawyer from Chandigarh, who lost a staggering Rs.3.6 Lakhs to cybercrime, felt like a blow to the progress […]

Continue reading


Fake Greta Thunberg Email Spreads A Dangerous Malware

Fake Greta Thunberg Emails

Fake Greta Thunberg Emails Used to Ensnare New Victims Stories of brave individuals fighting for the overall betterment of our environmental conditions warm our hearts. We all felt a collective energy as we supported Greta Thunberg, the 17-year old environmental activist. It is unfortunate that hackers are misusing this pure sentiment to their own illegal […]

Continue reading


DNS Protection

DNS Protection

Protect Your DNS – How & Why? DNS or Domain Naming System is a computer server which accommodates public IP addresses with their corresponding hostnames. A DNS server essentially contains a database which stores a mapping between hostnames and IP Addresses. The standard naming convention for IP Addresses follows the dotted decimal format, for example: […]

Continue reading


Ransomware Causes 300 People To Lose Their Jobs

Ransomware Causes Massive Layoffs

Ransomware Forces An Organization To Let Go Of 300 Employees Ransomware has been known to cause a lot of monetary loss. Typically used to exploit the chaos caused by locking a person out of their own system, never before has it affected so many people at once. According to a cybersecurity report, 2019 has been […]

Continue reading


Ukraine Targeted by a Russian APT Hacker Team

Russian APT Hacker Team Strikes Out

Russian APT Hacker Team Strikes Out The Military and the Government are under the gun once again. The country of Ukraine was very recently targeted by a Russian APT Hacker team. The intended targets of this attack weren’t just high-ranking decision makers, but also lower level officials working under the Government in fields like Journalism, […]

Continue reading


Defence Ministry Targeted For Phishing

Warning Issued To Defence Personnel

Warning Issued for Defence Personnel The defence ministry has issued an emergency warning to all defence personnel not to open a malicious email making the rounds of the defence services. It all started after the Armed Forces were targeted for a cyber-attack on Friday 6th December. The attempt alerted the cyber wing of our tri-services […]

Continue reading


Most Likely Phishing Targets

Targets of Phishing Attacks

Organizations Most at Risk of Phishing Phishing is a rapidly damaging cybercrime that has targeted a wide variety of domains and organizations. It has evolved past email into Vishing and Smishing. The question logically arises: who are the intended targets of these attacks? Why do the cybercriminals feel the need to come up with newer […]

Continue reading


Corporate Email Hijacking

Email Hijacking

Corporate Email Hijacking: Know how it’s done Businesses contribute heavily to the email traffic flowing across the internet. Corporate email accounts of top-level employees or decision-takers who handle financials are vulnerable to email hijacking. The potential payoff here for cybercriminals is greater, simply due to the volume and amounts of the sensitive monetary details of […]

Continue reading


Protection Against Online Scams

Protection AGainst Online Scams

Guidelines to protect yourself against cyber-scamming Digitisation has seeped into virtually all aspects of our interactions, from virtual copies of our identities to cashless forms of money. Every day, millions of digital transactions are made, some containing meagre amounts for small-scale purchases, others containing transfers of significant amounts between banks or individuals. Data from the […]

Continue reading


The Dangers of Identity Theft

Dangers of Identity Theft

Identity Theft – what and how to stay safe? With cloud storages and online platforms growing stronger by the day, it wouldn’t be an exaggeration to say that we have digital equivalents of our identities up on the internet these days. SD Card filling up with photos? Save to Cloud! File Access necessary from all […]

Continue reading