Cyber Security

Mother’s Day Special- How To Ensure Parents’ Online Security When You’re Not Around

Mother’s Day Special- How To Ensure Parents’ Online Security When You’re Not Around

In this era of cybercrimes, elderly people are prone to fall for online scams and identity theft. The number of cases are scary for those parents who ...

Beware!! Your Facebook Messenger Is At Risk of a Malware Attack

Beware!! Your Facebook Messenger Is At Risk of a Malware Attack

The users of Facebook, Chrome and cryptocurrency are at high alert as a new and advanced version of malware called FacexWorm is at work. FacexWorm, wi...

Is Penetration Testing Need Of The Hour For Ensuring Cybersecurity?

Is Penetration Testing Need Of The Hour For Ensuring Cybersecurity?

Today, it is more critical than ever to find and overcome system and network loopholes. However, finding out the issues is getting beyond the reach of...

Can ISPs Be Trusted With Our Personal Data?

Can ISPs Be Trusted With Our Personal Data?

Majority of us don’t want to share things to the world that are private, but is that content safe from your ISP? And several Internet users, use at ...

LinkedIn AutoFill Bug Allowed Hackers to Steal Data from User Profile

LinkedIn AutoFill Bug Allowed Hackers to Steal Data from User Profile

Every now and then we hear about company data breaches resulting in millions of user’s data left exposed. It’s just been over a month when Faceboo...

Attack Group “Orangeworm” Targets Healthcare Industry

Attack Group “Orangeworm” Targets Healthcare Industry

A new hacker group called “Orangeworm” has been targeting Healthcare sector and International corporations which are directly or indirectly relate...

Who Has More Of Your Personal Data Facebook Or Google

Who Has More Of Your Personal Data Facebook Or Google

Facebook is all over the news for its privacy breach and users are in shock, but this is just the beginning! We need to keep a check on other services...

Warning! Your Six-digit iPhone Passcode is no longer Secure

Warning! Your Six-digit iPhone Passcode is no longer Secure

Apple is known for its security and over the years it has made its iPhone more secure. But certainly it's device security is not as strong as boosted....

iOS Trustjacking- Attack That Exposes Iphone Users To Remote Hacking

iOS Trustjacking- Attack That Exposes Iphone Users To Remote Hacking

Have you ever used your friend’s laptop to charge your iPhone and received a prompt of “Trust This Computer?” Well your answer does not really m...

Bloatware & Crapware : What’s the difference?

Bloatware & Crapware : What’s the difference?

You just open your internet browser and whoa! So many toolbars and add-ons. We are certain this might probably be a pretty familiar experience for sev...

5 Global Cyber Security Threats you should be aware of !

5 Global Cyber Security Threats you should be aware of !

Each year security industry predicts what the biggest threats could be and create stronger defense and to fight with these threats. For this they use ...

How Do Hackers Monetize Stolen Data?

How Do Hackers Monetize Stolen Data?

Amidst the increasing malware and ransomware attacks, the question that comes to the mind is, how do hackers earn by stealing our data? The answer to ...