Classic lies you should not let a cyber criminal use on you

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out certain actions or giving away confidential information is known as Social Engineering. And this is a rampant form of exploitation. Why? If you can get access to anything you want just by deceiving someone, why waste time […]

Why USB drives and CDs are a security risk to your corporate network

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves protecting the corporate network from external threats and internal parties (employees) as well. This is where effective Endpoint Security (EPS) comes into the picture. EPS is a network security concept that places the responsibility of each device’s […]

Latest Mac malware on the rise, hides in networked printer directory

A new variant of Mac malware has been discovered and it is beginning to spread to Apple Macs through the networked printer file directory. The malware is a kind of ‘Backdoor Trojan’ and some sources have named this Trojan ‘Pintsized’. Apple Mac OS X is afflicted by this malware but as of now, the extent […]

Malware Alert! The risk of image searches on Google and Bing

When was the last time you carried out an image search on Google Images? Did you check the website the image was hosted on before you downloaded it on your computer or smartphone? Unknown to you, image searches are one of the biggest channels of malware over the Internet. Security conscious Internet users regularly take […]

The first computer virus was designed for an Apple computer, by a 15 year old

Contrary to popular belief, the first widespread computer virus that actively spread ‘in-the-wild’ was designed to target Apple computers. This might surprise some staunch Apple users who still feel that their Macs are completely invincible and cannot be infected with any kind of malware whatsoever. In this post we will discuss the Elk Cloner virus, […]

A history of Mac malware: The Apple of a virus developer’s eye

Apple Macs are falsely believed to be invincible and completely safe against malware threats and security breaches. But as we recently discussed, this perpetual myth has gradually been broken over the years. Apple has subtly acknowledged this fact over the last year or so and has made major upheavals in their marketing strategies as a […]

Manhattan Court charges creators of Gozi, the world’s most destructive financial virus

In a landmark development for the cyber security world, three cyber criminals have been charged in a Federal Manhattan Court in New York for stealing ‘tens of millions of dollars’ from online banking customers. The hackers were guilty of running Gozi, one of the most advanced and financially destructive viruses ever seen in the world. […]

Your Apple Mac does not need computer security: Myth or not?

There is a widespread misconception in the mainstream computing market that Apple Macs are more secure than Windows machines. In fact, some staunch Apple lovers even feel that since virus threats for Macs do not exist, no system protection software is essential. But how accurate is this belief? Our expertise in the computer security industry […]

Latest security news updates from the week gone by

India and hardware makers at loggerheads over cyber security guidelines The Indian Government wants all hardware manufacturers to include a mandatory brochure on cyber security. This stretches to all forms of hardware right from computers and mobile phones to modems and USB drives. However, the hardware companies are not too happy about this as this […]

As another Java flaw is discovered, is it time to disable Java completely?

After a massive Java 0-day vulnerability surfaced in August 2012, Oracle released an out-of-cycle update to combat the exploit. However, we advised our readers to simply disable Java on their web browsers to avoid the threat. Java has now become a highly vulnerable program that causes more trouble than it is worth and this is […]