LinkedIn Phishing Email Scam Alert!

This is security advisory for our readers who have LinkedIn accounts. We have been made aware of a phishing email scam that is targeting LinkedIn users. Scroll down to read more about this. Users of the popular business-oriented social networking service LinkedIn are apparently receiving emails that seem to be from LinkedIn support. In these […]

Data Privacy Day – Tips to Protect Your Data and Privacy

Last year, if our readers can recall, we had an interesting discussion on Data Privacy Day (DPD) and also shared some useful tips on how to keep our data safe. Well, we are here again. To refresh our memory, DPD is observed across the world with a centered approach towards respecting privacy, safeguarding data, and […]

WhatsApp Plus Users Face Temporary Ban by WhatsApp

If our readers can recollect, last year we had a blog post about the arrival of WhatsApp Plus, a third party/modified version of WhatsApp. Just yesterday, we were made aware of an interesting incident about this app. Read all about it below. A couple of days ago, users of WhatsApp plus were greeted by the […]

Malware Case Study: Kraken RAT Running Behind Bitcoins

Bitcoins have been in the news recently for various reasons and their popularity has also led to several scams, thefts and hacks aimed at them. It is found that exploit kits for targeting Bitcoins are readily available in the underground community and these are proving to be highly lucrative as well. The Quick Heal Threat […]

Cybercrimes in India Likely to Cross 300,000 Mark in 2015 – ASSOCHAM Study

An in-depth study has been released by ASSOCHAM-Mahindra SSG and according to this report, cyber-crime incidents in India are set to double to almost 300,000 in 2015. The primary targets of these crimes are going to be entities in the financial space, security establishments for national defense and the integrated social fabric. The Secretary General […]

Hacker fakes German minister’s fingerprints from HD photos

Security analysts have always believed that fingerprints are a foolproof replacement for passwords and authentication protocols. However, a new development in this matter has literally toppled this theory and altered the game. When fingerprints are used as an authentication protocol, the single biggest concern is what to do if the fingerprint in question gets copied. […]