Home Blog

‘Flubot’ as a threat to Android phones

Flubot malware threatens Android phones again. The first warning about this came from cybersecurity firm Trent Micro. Following this, CERT New Zealand, the government cyber security agency in New Zealand, has come out with a warning. They have tweeted through their official account to be careful not...
Read More

Cyber Security in the age of COVID19

Since the COVID -19, The situation has been worse all over the world. The global pandemic has led to an increase in cybercrimes in the last one year. The Ministry of Home Affairs’ National Cybercrime Reporting Portal www.cybercrime.gov.in has claimed that over four lakh cyber threat complaints are...
Read More

Startups: Why are they targeted?

A decade ago, a company’s technical strategy was not given any importance. Business strategies were considered important. By the end of this decade, the rise of cyber-attacks will be a challenge to be dealt with. India has been focusing on the dream of becoming a leading startup destination in...
Read More

Digital payment scams on the rise in India

According to a new study performed by YouGov and ACI Worldwide, there is a concern among consumers in India about digital payment scams. The pandemic has been a major catalyst for the adoption and growth of digital payments in India,” said Kaushik Roy, ACI Worldwide’s Vice President. Sin...
Read More

Beware of Phishing

A security firm recently detected a 974 percent increase in social-engineering frauds including enticing materials, which are typically focused towards male-sounding names within an agency. For added shock value, the suggestive emails are now being sent to folks at work as follows: Typically, attack...
Read More

FluBot- New Android Malware

A new android malware called Flubot is a major package delivery scam, targeting Android phones and devices across the UK. It spreads through texts which asks the users to click on the link provided to track their packages. As per NCSC, “The spyware is installed when a victim receives a text messag...
Read More

Apple attacked by massive Ransomware Attack

Taiwanese company Quanta, which is one of Apple’s parts suppliers was breached by the group REvil, also known as Sodinokibi. They managed to gain access to new product plans and demanded a ransom of $50 million. The group also released schematics of some of the products to prove that they are not ...
Read More

Android malware app spying on WhatsApp users

As per Check Point research team, an android malware app called Flixonline, which was downloadable through the Play store, allowed users to watch global Netflix content free of cost. But in reality, spying on the WhatsApp users. The message that it sent to the users read, “2 Months of Netflix Prem...
Read More

Be Cyber secure

Encrypt your data with a password that is difficult to Decrypt. Don’t let anyone violate yours or your clients privacy. Privacy is meant for everyone. Neither Break it nor allow anyone to break it. Invest in cybersecurity service and stay secure against unauthorised access. Find out how secure...
Read More

Security is not a Product, but a Process

Coined by Bruce Schneier, he said “Security is a process, not a product. Products provide some protection, but the only way to effectively do business in an insecure world is to put processes in place that recognize the inherent insecurity in the products. The trick is to reduce your risk of expos...
Read More

Facebook Hacked

More than 500 million accounts hacked. User data including IDs, full names, locations, birthdates, and email addresses available on hacker’s website. As per Facebook spokesperson, “This is old data that was previously reported in 2019. We found and fixed this issue in August 2019”. Dat...
Read More

IndiaMART data breached

IndiaMART, India’s largest online B2B marketplace for business products and services with 10 million downloads suffered a breach. Sensitive data of more than 40,000 suppliers is believed to be leaked and sold on online forums. Information leaked include suppliers’ user IDs, full names,...
Read More

Foodora Data Breach

Foodora, a brand of online food delivery service Delivery Hero has suffered a data breach. Exposing the user account details of 727,000 customers in the following 14 countries: United Arab Emirates, Singapore, Germany, Spain, France, Liechtenstein, Italy, Austria, Hong Kong,...
Read More

Massive campaign against WordPress websites

In a massive attack on WordPress sites hackers tried to download configuration files by attacking old vulnerabilities in unpatched plugins to steal database credentials. To take over databases, old exploits were used to download or export wp-config.php files from unpatched websites, extract database...
Read More

Critical update: Webex users phished

An ongoing phishing campaign is targeting remote workers who, due to ongoing covid -19 are relying on conferencing tools like Webex. Hackers are targeting victims with mails claiming to be a Cisco critical security advisory and asking them to update, to steal their Webex credentials.   The malicio...
Read More

KrØØk vulnerability affects more than one billion Wi-Fi-enabled devices and access points

The critical security flaw could intercept and allow an attacker to decrypt wireless network packets transmitted by vulnerable devices using WPA2 connections.  The Kr00k bug (CVE-2019-15126) affects common Wi-Fi chips Broadcom and Cypress which are built in access points (APs) and smartphones, ta...
Read More

Bluetooth vulnerability on Android

A newly discovered Bluetooth vulnerability on Android lets attackers execute arbitrary code and silently take remote control of Device without user interaction. Security researchers discovered that Android 8 and 9 were affected by this vulnerability. Android 10 is not vulnerable but it leads to...
Read More

Automotive Cybersecurity

Sophisticated Vehicles today are connected with Bluetooth, Wi-Fi and many more apps making our lives easier, safer and more comfortable. Technology is rapidly advancing in the automotive space to meet user’s demand for convenience, also making vehicles susceptible to hackers, opening them to ...
Read More

IoT Cyber security

IoT (Internet of Things) is any networking of a device that connects to the Internet in order to exchange data. Electrical devices to home appliances are now connected and can be controlled remotely through internet, they offer convenience in our everyday lives and can also help boost productivity. ...
Read More

Restrict Third-party data sharing: FACEBOOK

Most people in the world have at least one Facebook account, making Facebook one of the biggest advertising platforms. Facebook has faced a lot of criticism over privacy and data breach controversies, as it collects users information by tracking their activities on internet. Online apps and websit...
Read More

Juice Jacking

A type of physical access attack on a Device or Data, Juice jacking also known as USB scam can be used to install malicious software through public charging stations. At times, using public charging stations is not avoidable, putting us at risk of getting hacked. A USB port can be used as power sock...
Read More

Social Engineering

A clip from the new Netflix series Jamtara, doing rounds on social media shows how easily a retiree is getting conned out of his life savings through a simple phone call. This type of digital scam is known as social engineering. Social engineering is manipulating human psychology to maliciously gain...
Read More

Windows 10 Critical Security Flaw

The existence of a major vulnerability in Windows 10 was confirmed on Jan 14 2020 by the NSA. This is a critical bug that impacts millions of windows 10 users worldwide. Ann Newberg, director cybersecurity NSA, disclosed the vulnerability to Microsoft. Reporting of vulnerability is considered an unp...
Read More

10 Most Important Cyber Security Tips

1. You Are A Target. Realize that you are an attractive target to hackers. Don’t ever say “It won’t happen to me.” 2. Eight Characters Is Not Enough. Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your pa...
Read More

New Critical Exim Flaw Exposes Email Servers to Remote Attacks

A critical security vulnerability has been discovered and fixed in the popular open-source Exim email server software, which could allow a remote attacker to simply crash or potentially execute malicious code on targeted servers. Exim maintainers today released an urgent security update—Exim versi...
Read More

Hackers abuses Google acquisition domains appspot.com and web.app in latest phishing attacks

These attacks make use of SSL certificates issued by Appspot.com and Web.app. The attackers have designed similar-looking login pages for the domains which are widely used in business. These fake login pages can be used to trick the victims and steal their Usernames and Passwords About domains Appsp...
Read More

Cyber Security Awareness month

You have a role to play in securing your cyberspace. By adopting cyber security strategies in your daily lives, you can protect your economy, national security infrastructure, personal finances, identity, and privacy. You’ll be one of the two-thirds of the world’s population with interne...
Read More

IoT Device Vulnerability of Baby Monitors

On Friday, Bitdefender researchers revealed the vulnerabilities present in the IoT devices manufactured by a Chinese vendor, Victure. By making use of the zero-day vulnerabilities on a baby monitoring system, attackers can easily get hold of the camera feeds and execute unauthorized code like malwar...
Read More