How to differentiate between spam and phishing emails?

Credit to Author: Sushmita Kalashikar| Date: Thu, 11 Oct 2018 10:58:52 +0000

Emails today have become an integral part of our day-to-day life and this has made it a child’s play for spammers to lure people into opening fraudulent emails and attachments. Thus, while you are using emails for your everyday personal or official use, it is important to realize that the…

Read more

You’ve Been Hit By Ransomware. Now What?

Credit to Author: Sushmita Kalashikar| Date: Tue, 09 Oct 2018 05:20:55 +0000

“ALL YOUR FILES HAVE BEEN ENCRYPTED”   You see that line flashing on your laptop or desktop and suddenly your adrenaline level shoots up with hundreds of questions already hitting your mind… How Do I Remove that Message? Why Can’t I Access My System? Will I Lose All My Work?…

Read more

How can my Facebook account be misused if hacked?

Credit to Author: Sushmita Kalashikar| Date: Thu, 04 Oct 2018 05:02:24 +0000

At a time when most of us are living in a virtual world, where we are connected to our friends and family mostly through social networking sites, imagine what it would be like to find your social media account hacked!! That’s exactly what happened with 50 million of Facebook users…

Read more

Emerging trend of spreading malware through IQY files

Credit to Author: Prashant Tilekar| Date: Wed, 03 Oct 2018 10:05:14 +0000

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as Word document, Script, JAVA files. Fig 1: Attack chain IQY file…

Read more

Immediate steps to follow if you are a victim of banking fraud

Credit to Author: Sushmita Kalashikar| Date: Fri, 28 Sep 2018 07:18:20 +0000

In the recent past, innumerable cases have surfaced where there have been incidences of fraudulent charges on credit cards or unauthorized access to personal information. In wake of such rising cases of identity theft and data breaches, it can be extremely useful to know about actions to take once you…

Read more

Have You Received A Call To Replace Your Stripe-Only Card With EMV Chip Card Yet?

Credit to Author: Sushmita Kalashikar| Date: Tue, 25 Sep 2018 09:29:17 +0000

In case you have received a reminder from your bank asking you to replace your stripe-only card with an EMV chip card and you have no idea why this change is being implemented, then you are at the right place. As per recent instructions received from the Reserve Bank of…

Read more

Easy way to bypass passcode lock screens on iPhones, iPads running iOS 12

Credit to Author: Darlene Storm, Michelle Davidson| Date: Tue, 18 Sep 2018 11:16:00 -0700

Update for iOS 12

With iOS 12 and iPhones that have Touch ID, you can still bypass the iPhone lock screen and trick Siri into getting into a person’s phone. The bypass is the same as it was in earlier versions of the operating system:

  • Press the home button using a finger not associated with your fingerprint authentication, prompting Siri to wake up.
  • Say to Siri: Cellular data.

Siri then opens the cellular data settings where you can turn off cellular data.

As was the case before, anyone can do this. It doesn’t have to be the person who “trained” Siri.

To read this article in full, please click here

Read more

“Troldesh’s” One More Variant in the Encryption Offender

Credit to Author: Gulamgaus Shaikh| Date: Mon, 03 Sep 2018 11:52:13 +0000

Over the past few days, we have been observing criminals/hackers using a new carrier to deliver the ransomware malware. Recently, Quick Heal Security Labs observed a new variant of Troldesh ransomware which encrypts the data and adds the extension as “.no_more_ransom”. This ransomware comes under Crypto-Ransomware variant, the origin of this…

Read more