Data Breach – Understanding the severity of it

Credit to Author: Akuti Ojah| Date: Wed, 15 Jul 2020 12:45:04 +0000

A data breach is a security gap in which information or data is accessed or stolen without authorization. It is a breach of trust between the owner of the data and the party that accesses it without consent. To put it in simpler terms it a nonconsensual usage of someone’s…

Read more

How to make online classes safe for your children from digital threats

Credit to Author: Akuti Ojah| Date: Wed, 08 Jul 2020 10:36:25 +0000

Accept it or not we are now living in a “new normal” where the world has changed dramatically. A year ago it would have been hard to believe that children would have to take online classes from home instead of going to school. But it has happened and like it…

Read more

New malware via gaming portals may affect thousands of personal computers

Credit to Author: Quickheal| Date: Thu, 02 Jul 2020 12:38:34 +0000

Gamers beware. A report by Chinese cybersecurity researchers recently discovered a malicious botnet campaign that infected hundreds of thousands of systems. This botnet campaign was spread through malware via pirate gaming portals. The attack has been traced back to a China-based cybercrime group called DoubleGun which has amassed thousands of…

Read more

70% apps in common use have security flaws. Are you protected?

Credit to Author: Akuti Ojah| Date: Mon, 29 Jun 2020 12:55:40 +0000

Most of the popular applications we use today are built upon open-source libraries – free code repositories that help developers to create readymade applications. But, how safe are those libraries? According to a recent report, not very. Almost 70 percent of apps in common use were found to have flaws…

Read more

BHIM App attacked! Secure your online banking today with Quick Heal

Credit to Author: Akuti Ojah| Date: Thu, 25 Jun 2020 06:41:32 +0000

India’s BHIM (Bharat Interface for Money) app used for mobile payments was reported recently to have suffered a massive data leakage of 7.26 million records, according to a security research company. According to the report, the leak happened due to a flaw in a website linked to the BHIM app…

Read more

Poulight- An info-stealing trojan might be teaching you how to play Minecraft

Credit to Author: Akshay Gaikwad| Date: Mon, 22 Jun 2020 12:30:19 +0000

Poulight is an info-stealer trojan which most probably originated in Russia. It is written in the .NET and can collect sensitive information and deliver it to cybercriminals. Ever since its first appearance, it has been growing substantially and taking different forms. The main Infection vector remains spear-phishing emails. It was…

Read more

Maze ransomware continues to be a threat to the consumers

Credit to Author: Preksha Saxena| Date: Thu, 18 Jun 2020 09:17:55 +0000

Maze is a recently highlighted ransomware among the ever-growing list of ransomware families. The ransomware is active from the past one year, although it came into limelight due to its new approach of publishing sensitive data of infected customers publicly. The malware uses different techniques to gain entry like the…

Read more

Malicious bots targeting e-commerce and travel websites – A perceivable threat

Credit to Author: Akuti Ojah| Date: Mon, 15 Jun 2020 05:54:58 +0000

Malicious bots are becoming a major threat on the Internet. A recent survey suggested that attacks on applications, APIs, and mobile sites are on the rise. The top four industries that were attacked by malicious bots last year were e-commerce, travel, media, and online marketplaces, according to a report. Let…

Read more