The Disturbing Cybercrime Statistics in India

cybercrime statistics

Cybercrime Statistic Reports Paint A Worrisome Picture Cybercrime statistics for 2019 have been publicised, and the statistics are definitely not pleasing. While on the one hand they motivate security providers like us to work harder, they also paint a picture that does not at all correlate to the collective efforts poured towards raising citizen awareness […]

Continue reading

Subject Lines Used For Phishing Bait

Subject Lines For Phishing

Subject Lines That Are Most Frequently Used as Bait We have been advocating email security very eagerly since we work with a frightening amount of test cases. Looking out for possible threats will act as a first line of defence and might possibly save you the trouble of weeding out an infection that’s bothering your […]

Continue reading

Preventive Techniques Against Spear Phishing

5 tips against Spear Phishing

5 Tips to Avoid Spear Phishing An energy company in Ukraine called Burisma recently became the unfortunate victim of a cyberattack. The intruders gained illegal access to company data through phishing, or to be more accurate, spear phishing. As more and more cases of phishing scams become public, it has been observed that the general […]

Continue reading

Fake Greta Thunberg Email Spreads A Dangerous Malware

Fake Greta Thunberg Emails

Fake Greta Thunberg Emails Used to Ensnare New Victims Stories of brave individuals fighting for the overall betterment of our environmental conditions warm our hearts. We all felt a collective energy as we supported Greta Thunberg, the 17-year old environmental activist. It is unfortunate that hackers are misusing this pure sentiment to their own illegal […]

Continue reading

DNS Protection

DNS Protection

Protect Your DNS – How & Why? DNS or Domain Naming System is a computer server which accommodates public IP addresses with their corresponding hostnames. A DNS server essentially contains a database which stores a mapping between hostnames and IP Addresses. The standard naming convention for IP Addresses follows the dotted decimal format, for example: […]

Continue reading

Ransomware Causes 300 People To Lose Their Jobs

Ransomware Causes Massive Layoffs

Ransomware Forces An Organization To Let Go Of 300 Employees Ransomware has been known to cause a lot of monetary loss. Typically used to exploit the chaos caused by locking a person out of their own system, never before has it affected so many people at once. According to a cybersecurity report, 2019 has been […]

Continue reading

Emotet botnet malware hidden within fake Christmas party invites

Malware found in fake Christmas Party Invite

Beware: Your Christmas party emails could be infected with malware Nobody likes downers when it comes to the holiday spirit. No matter where we are, we all love to bask in the Christmasy atmosphere. However, much like The Grinch, hackers are looking to kill the mood. They’ve resorted to what they know best: malware. This […]

Continue reading

Fake voicemail notifications targetting credentials

Phishing using fake voicemails

Fake voicemail notifications aid scammers to collect Office 365 login credentials Heard of phishing attacks? There’s been an update! They are no longer your usual garden-variety email-based attacks. As the average customer becomes increasingly suspicious of unauthorized emails in their inboxes, malicious attackers get more creative and expand their arsenal of weapons. The latest strategy […]

Continue reading

Phishing goes beyond email

Phishing beyond email

While phishing expands its horizons, should your security? Expanding its customer base is one of the key strategies that a leading company uses to retain its position in the ever-competitive market. This is true for every industry and applicable to every business that wants to maximize its profits. It should not astonish you  to let […]

Continue reading

The Dangers of Identity Theft

Dangers of Identity Theft

Identity Theft – what and how to stay safe? With cloud storages and online platforms growing stronger by the day, it wouldn’t be an exaggeration to say that we have digital equivalents of our identities up on the internet these days. SD Card filling up with photos? Save to Cloud! File Access necessary from all […]

Continue reading