19
Jul, 2017
phone security

Getting a pop-up to update your smartphone once again? Thinking that your phone is working fine and putting off the updates for some other time? Though most of us follow the same habit, however, this isn’t right. Probably, you are putting the security of your phone at risk.

READ MORE

16
Jul, 2017
brute force attacks

There are several tools and methods to break passwords with each one having their own special recipe. Brute Force Attacks are one of those methods used by hackers wherein a hacker tries a number of passwords and phrases in the hope to eventually guessing the correct one.

READ MORE

13
Jul, 2017
safe internet

The internet-connected gadgets starting from smartphones to tablets has opened us up to the considerable dangers. Hence, we need to create a better Internet together. Sharing with you some amazing Internet security tips.

READ MORE

10
Jul, 2017
Ways to Prevent Mobile Phone Phishing

Besides all other phishing methods, Phone Phishing is a popular way used by phishers to hunt for personal/financial information of their targets. Posing as employers, company representatives, banking officials, like in the above telephonic conversation, these attackers make fool of people for their own benefit.

READ MORE

07
Jul, 2017
online predation

Social Networking sites and easy availability of technology has led to the expansion of online predation. It is now easy for predators to get in touch with minors, trap them into emotional conversations and coerce them into illegal sexual activities.

READ MORE

03
Jul, 2017
cyber security mistakes

Phishing emails are designed by the hackers to look like a legitimate one and direct the user to visit such websites where they ask for sensitive credentials such as username, password, account details, etc.

READ MORE

22
Jun, 2017
Cyber Security Insurance

Cyber security insurance provides protection to individuals & businesses from Internet-based attacks and risks. It is gaining popularity among enterprises due to the financial benefits after any kind of data loss due to a malware attack.

READ MORE

14
Jun, 2017
How to Make your Employees Follow Cyber Security Guidelines

Data breaches are mostly occurred due to human errors but this fact has been overlooked by organisations while making their cyber security assessment. Although removing human errors completely is not possible but it can be reduced to a great extent by implementing an effective cyber security policy for your employees.

READ MORE

09
Jun, 2017
scams

Not just emails, the advent of social media has opened new doors for attackers to trap their target using one way or the other. For instance, attackers impersonate as someone genuine to befriend individuals with open friend lists and expand their network by sending friend requests to their friends. This way they build a genuine profile and execute their attack.

READ MORE

06
Jun, 2017
Stop cyberbullying day

Bullying in any form is dangerous. The growth of digital media has made it, even more, easier for the bullies to harm their targets. On this Stop Cyberbullying Day on 16 June 2017, we would like to bring awareness to our readers about how cyberbullying impacts the life of victims.

READ MORE