10
Jan, 2017
Safe Browsing – How to Secure Your Web Browser

An average internet user has 2-3 web browsers installed on his or her PC which can be a Mozilla Firefox, Apple Safari or a Google Chrome. As web browsers are the main mediums to surf the internet, these are always on the hit list of cyber crooks, who utilizes these mediums to intrude into your system or resorts to tactics like browser hijacking. Hence, it is vital to know how to secure your web browser.

READ MORE

07
Jan, 2017

Mobile Banking Security Tips

Mobile Banking Security Tips

Banking industry has undergone a transformation in last two decade starting from traditional banking to internet banking and especially mobile banking. Globally, millions of customers are already using mobile banking apps and coming few years will see many more users. However, with this surge, there is an increasing risk from mobile malware and cyber criminals, which makes it necessary for customers to follow certain mobile banking security tips.

READ MORE

05
Jan, 2017
browser hijacking

A browser hijacker is basically a software program that alters the settings of your browser. Most often, it injects unwanted advertising into the user’s browser by altering default home pages and search pages to a target website in order to increase its advertising revenue.

READ MORE

30
Dec, 2016
phishing attacks

Phishing is a malicious attempt to obtain sensitive information from online users such as their email addresses, usernames, passwords, etc. Victims are lured by email spoofing or instant messaging that takes them to a rogue website that looks like a legitimate one.

READ MORE

28
Dec, 2016
ransomware-attack

While initially known in Russia, nowadays the term ransomware has grown widely all over the world. From millions to billions, hackers have taken huge amounts of ransom money from users who try to retrieve their data after being attacked by this malware.

READ MORE

22
Dec, 2016
Zero Day Attacks

When it comes to hacking, attackers leave no chance to make their malicious attempts successful, no matter how much they have to try. Vulnerabilities in software programs is a popular tactic amongst hackers to malicious attempts. Zero-day attack, which is also an undisclosed computer software vulnerability is used by attackers to harm computer programs, data, networks, etc.

READ MORE

19
Dec, 2016
ow to Protect Yourself From Microsoft Word Malware

Data breach and malware attacks are common issues these days and you may find several such news floating on the internet. Cyber-criminals nowadays employ latest techniques to hack the personal & financial data of internet users. The latest addition to this technique is malware attack through an MS Word document.

READ MORE

15
Dec, 2016
How to Remain Safe While Playing Online Games

The present gaming technology facilitates a user to remain connected with other gamers via medium of setting up accounts on game platforms. Although, it’s a very exciting experience, it involves lots of risks such as identity theft, malware attacks and phishing scams. Below mentioned are some risks and tips about how to remain safe while playing online games.

READ MORE

10
Dec, 2016
databreach

Enterprise data breach attacks are a common scenario these days. However, many of us are unaware of the fact that it’s not just one infection, but a chain of events leads to such attacks. In this post, let’s understand how a data breach happens and measures to prevent it.

READ MORE

06
Dec, 2016
onlineshopping

Christmas and New Year bells are ringing around the corner. While everyone’s thrilled to the bits for shopping and fun, it’s also the time when cyber criminals make use of their best tactics to steal the money from online shoppers.

READ MORE