In the Tax Filing Season, beware of phishing attacks

income tax returns

Beware of email phishing attacks from hackers while filing your Income Tax Returns. In email phishing attacks, hackers smartly replace some characters of email address with other look-alike characters. Observe the below given E-mail addresses: DONOTREPLY@incometaxindiaefiling.gov.in DONOTREPLY@incometaxindiafilling.gov.in First one is correct E-mail ID from the IT Dept. but if you observe properly the second one […]

Continue reading


Ryuk ransomware Attack on Jackson county fetches hackers a whopping $400,000

Ryuk Ransomware

The entire computer system of Jackson County, Georgia was hit by a massive Ryuk ransomware attack on March 01. Authorities confirmed that the attack has affected all the departments. This ransomware leads to a complete shut down unless the files are recovered using the decryption key. Emails as well as emergency services were affected by […]

Continue reading


Beware of Income Tax Returns Email Phishing Hack

income tax returns

Beware of email phishing attacks from hackers while filing your Income Tax Returns. In email phishing attacks, hackers smartly replace some characters of email address with other look-alike characters. Observe the below given E-mail addresses: DONOTREPLY@incometaxindiaefiling.gov.in DONOTREPLY@incometaxindiafilling.gov.in First one is correct E-mail ID from the IT Dept. but if you observe properly the second one […]

Continue reading


Spear phishing is on the rise in 2019

Spear phishing

One of the most dangerous and highly successful type of cyber attacks is spear phishing attacks. This is a highly sophisticated well engineered attack to penetrate into the defense of a targeted victim and has high likelihood of success. The attackers knows enough about the victim to communicate with the victim as an alias and […]

Continue reading


Web applications: new back-doors to access private data

web browser main

Multiple rogue web applications can be used to attack vulnerable browser extension and exploiting private data becomes easier for adversaries post the access is granted. This is alarming mainly because a normal person browsing the internet is caught unaware of something like this even exists. Various browsers – Chrome, Firefox, Opera extension have been tested […]

Continue reading


Chinese hackers swindles Rs. 130 crore from an Indian arm of an Italian company

Chinese group steals 18.3 million dollar in a cyber heist

A Chinese hackers team stole 18.3 million dollars (Rs. 130 Crore) from the Indian arm of Italian company Tecnimont SpA by taking local managers into confidence that the money was required for an acquisition, one of the biggest cyber heists in the country,  the Economic Times reported. The hackers sent emails to the head of Tecnimont Pvt Ltd, […]

Continue reading


5 cybersecurity question every CIO must ask in 2019

cyber security questions

There has been a far greater responsibility on the Chief Information Officers(CIOs) to understand the challenges, solutions and trade-offs in terms of the organizations they are a part of. It is equally crucial that CIO’s understand the plans and programs companies undertake to address the issues so that a better representation of the entire breadth […]

Continue reading