Beware of the increasing bank phishing frauds

bank phishing frauds

Share this:    All the banks are regularly advising their customers daily for being aware of the increasing phishing frauds by cyber criminals. The fraudsters send emails to the customers which look very similar to that from a bank. The mail would ask you to re-submit account details or credit card information. Hence, to remain safe from this […]

Continue reading

Spear phishing is on the rise in 2019

Spear phishing

Share this:    One of the most dangerous and highly successful type of cyber attacks is spear phishing attacks. This is a highly sophisticated well engineered attack to penetrate into the defense of a targeted victim and has high likelihood of success. The attackers knows enough about the victim to communicate with the victim as an alias […]

Continue reading

Latest cryptomining malwares uninstalls cloud security software

cryptomining malwares

Share this:    This is a new bread of malware! A very new malware is seen accomplishing never before seen function – uninstalling cloud security products! This new malware is capable of taking admin rights on targeted system by uninstalling the cloud-security products. Multiple occasions of the malicious activity are tied to coin-mining malware targeting Linux servers. […]

Continue reading

Web applications: new back-doors to access private data

web browser main

Share this:    Multiple rogue web applications can be used to attack vulnerable browser extension and exploiting private data becomes easier for adversaries post the access is granted. This is alarming mainly because a normal person browsing the internet is caught unaware of something like this even exists. Various browsers – Chrome, Firefox, Opera extension have been […]

Continue reading

Important cybersecurity statistics for 2019

cybersecurity statistics 2019

Share this:    Digital economy is growing everywhere in the world. Technology is changing our livelihoods in unprecedented ways. We cannot imagine life without internet or without using technology in our day-to-day chores. It has certainly altered the nature’s way of evolution, but it also means that there is a very different kind of warfare happening all […]

Continue reading

4 things you must know about Cyber Security in the era of IoT

Security in the era of IoT

Share this:    Cyber Security in the era of Internet-of-things is a changing paradigm. According to recent study by Gartner, more than half of major new business processes and systems will include an IoT component by 2020. Cisco speculates that more than 50 billion connected devices will exist by 2020 which will definitely make our lives easier […]

Continue reading

Chinese hackers swindles Rs. 130 crore from an Indian arm of an Italian company

Chinese group steals 18.3 million dollar in a cyber heist

Share this:    A Chinese hackers team stole 18.3 million dollars (Rs. 130 Crore) from the Indian arm of Italian company Tecnimont SpA by taking local managers into confidence that the money was required for an acquisition, one of the biggest cyber heists in the country,  the Economic Times reported. The hackers sent emails to the head of Tecnimont Pvt […]

Continue reading

Aadhar Card Data Leak calls for better cyber security!

Aadhar Card

Share this:    Aadhar Card data of 130 million as well as bank account details have been leaked. A study published by Centre for Internet and Society (CIS), a Bengaluru based organization says that Aadhar data of about 130 million card holders has been leaked from just 4 government websites. To add to the worry, it’s not just […]

Continue reading

5 cybersecurity question every CIO must ask in 2019

cyber security questions

Share this:    There has been a far greater responsibility on the Chief Information Officers(CIOs) to understand the challenges, solutions and trade-offs in terms of the organizations they are a part of. It is equally crucial that CIO’s understand the plans and programs companies undertake to address the issues so that a better representation of the entire […]

Continue reading

Widespread Apple ID Phishing Attack Pretends to be App Store Receipts


Share this:    This is big, the Apple-ID which managed to stay away from compromises is under attack. A notorious phishing campaign is underway that pretends to be a purchase confirmation from the Apple App store. This has come to light recently and seems to be a classic phishing campaign and interestingly it has gone widespread quickly […]

Continue reading