26
Apr, 2017
world password day

A password denotes the key to your online identity and privacy which is why it is always recommended to ensure complete confidentiality of your passwords. Be it the social media, online banking or shopping, you need to make sure that your accounts are sealed with strong and hard-to-guess passwords. On this world password day, i.e. […]

READ MORE

20
Apr, 2017
cyberbullying

It is not that only kids become victim of Cyberbullying, even adults are not spared from becoming targets. As per a BBC news, social media sites like Facebook are often being used to abuse teachers. As per the media, a large section of the victims reported things like insulting comments, inappropriate behaviour and having photos […]

READ MORE

19
Apr, 2017
Man-in-the-middle-attack

Browsing the Internet seems to be quite simple. Type a website address, hit Enter and you’re there! However, the process that happens at the backend is quite complex and is also the junction from where hackers and attackers make their way. In this post, we will be taking a sneak peek on how a man-in-the-middle-attack […]

READ MORE

15
Apr, 2017
Importance of Virtual Private Network

Do you know, your internet service provider (ISP) can keep an eye on your online activities? This doesn’t mean that your security is compromised but it can be that you may see ads from advertisers based on your browsing behavior. So, does ISPs sell data to advertisers? That’s a big question. However, let’s not go […]

READ MORE

11
Apr, 2017
privacy leaks

Selfies, Location check-ins, and photo-tagging have taken the world by storm as people are going beyond the limits to showcase their extraordinary experiences. Mobile applications like WhatsApp and Instagram are two such platforms that let people share videos and pictures like never before. However, with such massive content flowing over the internet, the chances of […]

READ MORE

06
Apr, 2017
ransomware-attack

Google Play Store, the official marketplace for Android apps was recently gotten by the malicious Ransomware called as ‘Charger’ in one of the apps known as Energy Rescue. The ‘Charger’ malware calls and raises the risk by stealing all the contacts, messages and other sensitive credentials from the infected device and then gains administrator’s access […]

READ MORE

03
Apr, 2017
online shopping

The days of battling the throngs of high streets looking for some exciting stuff are long gone. Now, online shopping has made it easy for us to buy almost everything within just a few finger taps on our smartphones. But have you ever thought about whether these shopping apps are safe to use? What about […]

READ MORE

27
Mar, 2017
What to do to recover from a Cyberattack

Cyber-attack is not limited to individual internet users but nowadays even companies need to bear the brunt of security intrusions. Results of these attacks can be fatal ranging from data loss of their customers to financial damage. In the event of a security breach, you should know how to recover from a cyber attack. Identify […]

READ MORE

22
Mar, 2017
cyber security exploit

Ignoring security warnings and software updates on computers is a common scenario amongst most of the online users. Most of them think it is not just important to update the software or do not have the time to do so. But have you ever thought that every time you skip a software update, you invite […]

READ MORE

17
Mar, 2017
rogue apps

They are bells and whistles of every smartphone these days. You want to book taxi for your office ride or book a special gift for your loved ones, these let you do just everything within few finger taps. Mobile apps are part and parcel of our everyday life and admit it or not, it would […]

READ MORE