Browsing Category
Business
Mumbai Firm loses Rs 10 lakh in an email spoofing attack
In today's ever-connected world, businesses are increasingly at risk of cyber attacks. Unfortunately, even the most well-protected companies can fall victim to sophisticated email spoofing scams, as one Mumbai firm recently learned the hard…
Magniber Ransomware – What is it and how to protect yourself
Heads up!! Google Chrome or Microsoft Edge users, be cautious when installing updates to avoid putting the Magniber malware on their computer.
You may have never heard of Magniber, but it's a new ransomware that's been making headlines…
Top email security software providers to use
We use emails on a daily basis to communicate with one another, whether it’s for business or for personal use. The information we exchange through emails is often sensitive, confidential and one which we would not want others to know about.…
New phishing email exploits twitter’s plan to charge for blue checkmark
A new phishing scam is making the rounds following Twitter's plan to start charging for verified accounts. This new phishing scam exploits Twitter's move by sending out mass emails that appear to be coming from Twitter. The emails instruct…
6 Reasons Not to Use Free Web-Based Emails For Your Business
Today is very easy to come by websites and domain names and there's no excuse for professional businesses not to have their own custom email address. Free email services like Gmail, Yahoo!, and Hotmail may be tempting because they're free,…
The Reality behind Gmail’s Confidential Mode
Gmail Confidential Mode is a new feature that Google rolled out in an attempt to address rising privacy concerns. Confidential mode allows you to send emails that expire after a certain time and set additional authentication via SMS in…
The largest threat to the UK financial system now is cyberattacks
According to a recent study from the Bank of England, cyberattacks pose the greatest danger to the UK financial system. Financial institutions, on the other hand, are still confident in their ability to repel attacks and think they are more…
Beware Millennials: you’re more likely to be scammed online.
As a Millennial, you might consider yourself to be rather tech-savvy, and think you know enough to be able to spot an online scam a mile away. However, recent research by Business Bureau suggests that those of us who use technology and are…
How to Remove Your Personal Information Online
You've probably heard of people's private information getting leaked online. Maybe you're even one of those people who had their personal information compromised. No matter what, you should take the necessary precautions to protect yourself…
Personal Data Companies Track – How to limit what companies know about you
Did you know that when you're online, companies are tracking what you do? It's true! They're constantly collecting data about your browsing habits, interests, and even your location. While this may seem a little creepy at first, it's…
Juice Jacking – What is it and how to avoid it?
At some point in our life, I’m sure we’ve all experienced the stress when we notice our smartphones are about to die and quickly run to the nearest charging point to recharge them. However, what we might not know is that charging phones…
Russia threatens to slow down Google over ‘banned content’
Russia’s media watchdog has threatened to slow down the speed of Google if it fails to delete what it calls "unlawful content."
Roskomnadzor has given Google 24 hours to remove videos it says relate to drugs, violence and…
Ransomware attack forces North Carolina college to cancel classes
A community college in North Carolina already limited by the pandemic’s remote-learning conditions is being further challenged after a ransomware attack last week disabled systems needed for online learning and forced its employees off…
BeyondProd: Google’s Cloud Native Security
Google has written several whitepapers explaining projects developed internally that help improve security. BeyondProd purposefully calls back to the concepts of BeyondCorp一just as a perimeter security model no longer works for end users,…
Hacking GitHub’s Auth with Unicode’s Turkish Dotless ‘I’
From combining emoji marks and astral planes, Unicode is under appreciated and poorly understood. The importance of understanding Unicode extends beyond localization and diversity. Failing to understand Unicode may lead to vulnerabilities…
How Is NordVPN Unblocking Disney+?
NordVPN, a company reeling from careless security practices revealed as part of a security breach (one that they covered up for 6 months until they were finally outed for it), had promised to do better.
From the…