06
Apr, 2017
ransomware-attack

Though Google has removed the Energy Rescue app containing ransomware from the Play Store, however, the probability of such threats appearing in the near future raises the need to stay more alert than ever.

READ MORE

03
Apr, 2017
online shopping

Have you ever thought about whether these shopping apps are safe to use? What about the bad guys who are looking for your sensitive information? Here are some basic guidelines to stay safe from hackers and shop online with ease and confidence.

READ MORE

01
Apr, 2017
internet parental control

The count of children indulged on the internet is on a continuous rise these days. With mobile devices and laptops, it is nothing difficult for a 7-year-old kid to browse social media websites, play online games, etc. However, such easy accessibility also makes children prone to dangerous online threats like cyber-bullying, pornographic exposure, identity theft and malware attacks.

READ MORE

27
Mar, 2017
What to do to recover from a Cyberattack

Cyber-attack is not limited to individual internet users but nowadays even companies need to bear the brunt of security intrusions. Results of these attacks can be fatal ranging from data loss of their customers to financial damage. In the event of a security breach, you should know how to recover from a cyber attack.

READ MORE

22
Mar, 2017
cyber security exploit

Ignoring security warnings and software updates on computers is a common scenario amongst most of the online users. Most of them think it is not just important to update the software or do not have the time to do so. But have you ever thought that every time you skip a software update, you invite hackers to take advantage of the software vulnerabilities and add you to their list of cyber attack victims?

READ MORE

17
Mar, 2017
rogue apps

Mobile apps are part and parcel of our everyday life and admit it or not, it would be quite hard to do without them. But, while there are millions of good apps, there are also the ones created to make security breaches and cause harm to users.

READ MORE

14
Mar, 2017
WhatsApp Two-Step Verification

Imagine your phone is lost and the person who has stolen your phone inserts your SIM card in another device; he will be able to access all your WhatsApp personal conversation. Isn’t that scary? But with WhatsApp’s latest two-step verification security feature, there is a permanent solution to this problem.

READ MORE

10
Mar, 2017
hummer

Hummer is an Android Trojan that has infected about 1.4 million Android devices on daily basis during the first half of 2016. Its high infection rate suggests that it could emerge as one of the biggest cyber threats of all time.

READ MORE

09
Mar, 2017
worm

Basically, a computer worm is a standalone malware application that spreads itself from one user machine to the other. It exploits the vulnerabilities present in the Operating System and causes harm to the user by stealing data, modifying data or deleting files.

READ MORE

08
Mar, 2017
netiquettes

Whether we do a quick chat with a friend over Facebook or wish #happybirthday to a dear one on Instagram, it is crucial to maintain our digital manners.

READ MORE