# Tags

Watering Hole Attack – An Overview

Guess what would be a better way for a predator to stalk its prey, rather than chasing it? Well, waiting patiently at a watering hole, where its prey would eventually turn up. Strangely, in the online world, hackers are also using the same strategy to trap their victims. This blog gives you an overview of […]

This Week’s Dose of Latest Security News and Updates

Already planning for the weekend, good! But first, let’s see what security news and updates various anti-virus experts have for us! Zeus – the Global Malware is Back! A popular fan book page – “Bring the N.F.L. To Los Angeles”, as New York Times has reported, is housing the notorious malware program of 2007 called […]

Exponential Rise in Mobile Internet Beckons Better Mobile Security

If we are to believe what tech pundits have to say, mobile devices are going to rule the roost when it comes to Internet usage, in the coming years. Reportedly, mobile data traffic in 2012 has been recorded to be 12 times higher than global Internet traffic in 2000. Globally, mobile Internet is forecast to […]

Security News and Updates for this Week

Let’s catch up on some important news and updates related to IT security. Guess What’s New on the Platter of Chinese Hackers? – U.S. Weapon Designs Looks like Chinese hackers are leaving no stone unturned; reportedly, they hacked their way into the designs of more than 2 dozen weapons of the United States. No identification […]

101 Uses of Gadgets Without Quick Heal Contest

What if making your laptop into a dustpan or a bird house fetches you a cool prize? How awesome is that! Cutting the long story short, we have a contest for you, where “you” think of 101 crazy uses of your gadgets and “we” give you cool prizes. That’s right! This contest is not about […]

Week’s Latest Security News and Updates from Around the World

Here’s this week’s edition on some important and interesting news and updates on online security. Yahoo Japan Hacked – Officials Warned Users to Change Passwords After discovering a hacking attempt into its ID serves, Yahoo Japan has warned its users to change their passwords. According to the company, 22 million user ids might have gotten […]

Trojan.Cidox targets IPL( i mean Initial Program Loader )

IPL is now in news for different reasons. On the other side we see Initial Program Loader (IPL) – which is responsible for loading of Operating system is targeted by Trojan.Cidox. Although bootkit technology isn’t new, it plays an important role nowadays in attack scenarios against the Microsoft Windows platform. More number of threats are […]

Know the Risks of Using ATM and Online Banking

As convenient and user-friendly as the ATM (automated teller machine) and online banking services are, they have their own share of security risks. This blog entails the security risks of using ATMs and online banking, and discusses some valuable safety measures users can take. Risks Involved with ATMs The greatest security risk of using an […]

Work from Home Scam

Yet another kind of social media scam that has come under the radar of security officials is the “work from home scam”. This blog explains how such scams work, and how can you steer clear from them. Work from home scams are mostly linked to people who are unemployed and look for jobs that can […]