Enterprise Security: Mobile ad libraries pose new security threats

A new threat to enterprise security that many organizations neglect and fail to address effectively is that of mobile advertising networks. These ad libraries are freely used by mobile developers to track user behavior patterns and to generate ad revenue. However, the increased usage of smartphones and tablets by employees poses a major security threat […]

The rise of WhatsApp Plus and should you install it?

The other day we received a rather interesting notification from one of our users about a service called WhatsApp Plus. While it sounds like a premium version of the original and hugely popular WhatsApp messaging service, after digging around a bit we have found that the circumstances surrounding this app are a bit suspicious. What […]

Alert for users of Instagram, Bitly and Android and other security news

There is no such thing as a slow news day, as every week is filled with stories of hacked websites, stolen passwords, new variants of Android malware and other security updates. The computer and mobile security industry never sits still, and this week we have yet more reasons for you to stay aware about the […]

5 Tips for Online Smartphone Shopping Nobody Tells You About

The new Flipkart app is pretty amazing, isn’t it? If you haven’t tried it out as yet, you definitely should. However, there are several things you need to keep in mind when you make an online purchase through your smartphone. Most people wrongly believe that smartphones are malware free and carry little to no danger […]

Beware – Fake Google Apps Spotted Over Windows Phone Store!

Windows Phone has a worldwide market share of less than 5% in 2014, and this has led to its marketplace (known as the Windows Phone Store) being ignored by several app developers. The most prominent of these developers of course, is Google. Right now the only Google app that is available over the Windows Phone […]

Instagram: What you need to know – Part 2

This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy in the app. In Instagram the key word is ‘public.’ Once an Instagram profile has been created, anyone can browse these online profiles and “follow” other Instagram users. Here comes the tricky part. How do you […]

Instagram: What you need to know

In an earlier post we talked about various apps and the risks associated with them. In these subsequent posts, we will scratch the surface a little bit and dig a little deeper to understand the privacy implications of one app in particular – Instagram. Now, that our very own Big B, Mr. Amitabh Bachhan is […]

Why USB drives and CDs are a security risk to your corporate network

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves protecting the corporate network from external threats and internal parties (employees) as well. This is where effective Endpoint Security (EPS) comes into the picture. EPS is a network security concept that places the responsibility of each device’s […]

Massive Android botnet invades China: Could India be the next target?

A massive Trojan botnet has been discovered in Android devices in China and this serves as a timely reminder of the growing vulnerability of the Android platform. Staggeringly, this botnet has infected more than 1 million Android devices that function in China. The high vulnerability of Android devices in China can be put down to […]