Browsing Category
Business
LinkedIn Clean-Up: 10 Quick Fixes for a Pristine Professional Presence
LinkedIn, with its vast network of over 610 million members and 303 million active users, has become the go-to platform for professionals to network, build their personal brand, and explore career opportunities. A clean and professional…
Don’t Let AI Put Your Privacy in Jeopardy: Tips for Protecting Your Information
Artificial intelligence (AI) has revolutionized our lives, from voice assistants to personalized recommendations, becoming an essential part of our digital existence. However, amidst its remarkable capabilities, there exists a hidden…
Beware: QBot Trojan Spreading through malicious e-mails
Businesses around the world are currently being targeted by a mass e-mailing campaign that is distributing the QBot malware through malicious PDF attachments. The campaign has already infected a significant number of organisations, and…
Build a Strong Cybersecurity Culture: The ABCs
With the proliferation of technology and the increasing reliance on digital systems, cybersecurity has become a critical concern for organisations and individuals alike. The staggering statistics reveal that there are 2,200 cyber attacks…
Three Emerging Phishing Techniques You Should Watch Out For
Phishing attacks are becoming more sophisticated as cybercriminals introduce new tactics to trick victims and bypass security. In January 2023, Barracuda researchers found three novel phishing techniques: Google Translate links, image…
Tips to Avoid Falling Victim to Hijacked SharePoint Servers
SharePoint is a popular collaboration platform used by many organisations to manage documents, workflows, and other business-related content. However, cybercriminals are increasingly using hijacked SharePoint servers as a phishing tool to…
ChatGPT: The next step in online security
As technology advances, so does the need for significantly improved cybersecurity measures. Cybercriminals are continuously seeking ways to take advantage of weaknesses in computer systems and digital platforms. To counter this evolving…
Anonymity Vs Privacy – Know the difference
Online protection and security are becoming increasingly important as our day-to-day lives shift to being more heavily dependent on the digital realm. Privacy and anonymity are two distinct concepts that have a huge impact on both our…
What Are The Data Security Features Offered By Tally ERP 9? Do Users Need To Take Additional…
ERP systems are complex and often outdated, making them difficult to secure. Hackers around the world have started targeting ERP systems to gain access to sensitive enterprise data. Case studies suggest that hacking groups have even managed…
Privacy concerns mount over Qatari World Cup Fan App
What's the big deal with digital privacy? Why should we be worried about it? With the Qatar World Cup just around the corner, these are questions that need to be answered.
Mumbai Firm loses Rs 10 lakh in an email spoofing attack
In today's ever-connected world, businesses are increasingly at risk of cyber attacks. Unfortunately, even the most well-protected companies can fall victim to sophisticated email spoofing scams, as one Mumbai firm recently learned the hard…
Magniber Ransomware – What is it and how to protect yourself
Heads up!! Google Chrome or Microsoft Edge users, be cautious when installing updates to avoid putting the Magniber malware on their computer.
You may have never heard of Magniber, but it's a new ransomware that's been making headlines…
Top email security software providers to use
We use emails on a daily basis to communicate with one another, whether it’s for business or for personal use. The information we exchange through emails is often sensitive, confidential and one which we would not want others to know about.…
New phishing email exploits twitter’s plan to charge for blue checkmark
A new phishing scam is making the rounds following Twitter's plan to start charging for verified accounts. This new phishing scam exploits Twitter's move by sending out mass emails that appear to be coming from Twitter. The emails instruct…
6 Reasons Not to Use Free Web-Based Emails For Your Business
Today is very easy to come by websites and domain names and there's no excuse for professional businesses not to have their own custom email address. Free email services like Gmail, Yahoo!, and Hotmail may be tempting because they're free,…
The Reality behind Gmail’s Confidential Mode
Gmail Confidential Mode is a new feature that Google rolled out in an attempt to address rising privacy concerns. Confidential mode allows you to send emails that expire after a certain time and set additional authentication via SMS in…
The largest threat to the UK financial system now is cyberattacks
According to a recent study from the Bank of England, cyberattacks pose the greatest danger to the UK financial system. Financial institutions, on the other hand, are still confident in their ability to repel attacks and think they are more…
Beware Millennials: you’re more likely to be scammed online.
As a Millennial, you might consider yourself to be rather tech-savvy, and think you know enough to be able to spot an online scam a mile away. However, recent research by Business Bureau suggests that those of us who use technology and are…
How to Remove Your Personal Information Online
You've probably heard of people's private information getting leaked online. Maybe you're even one of those people who had their personal information compromised. No matter what, you should take the necessary precautions to protect yourself…
Personal Data Companies Track – How to limit what companies know about you
Did you know that when you're online, companies are tracking what you do? It's true! They're constantly collecting data about your browsing habits, interests, and even your location. While this may seem a little creepy at first, it's…
Juice Jacking – What is it and how to avoid it?
At some point in our life, I’m sure we’ve all experienced the stress when we notice our smartphones are about to die and quickly run to the nearest charging point to recharge them. However, what we might not know is that charging phones…
Russia threatens to slow down Google over ‘banned content’
Russia’s media watchdog has threatened to slow down the speed of Google if it fails to delete what it calls "unlawful content."
Roskomnadzor has given Google 24 hours to remove videos it says relate to drugs, violence and…
Ransomware attack forces North Carolina college to cancel classes
A community college in North Carolina already limited by the pandemic’s remote-learning conditions is being further challenged after a ransomware attack last week disabled systems needed for online learning and forced its employees off…
BeyondProd: Google’s Cloud Native Security
Google has written several whitepapers explaining projects developed internally that help improve security. BeyondProd purposefully calls back to the concepts of BeyondCorp一just as a perimeter security model no longer works for end users,…
Hacking GitHub’s Auth with Unicode’s Turkish Dotless ‘I’
From combining emoji marks and astral planes, Unicode is under appreciated and poorly understood. The importance of understanding Unicode extends beyond localization and diversity. Failing to understand Unicode may lead to vulnerabilities…
How Is NordVPN Unblocking Disney+?
NordVPN, a company reeling from careless security practices revealed as part of a security breach (one that they covered up for 6 months until they were finally outed for it), had promised to do better.
From the…