Posted by cyber-geek | Posted in Cyber Awareness, Opinions | Posted on 10-05-2011
A person may be using a genuine operating system, applications and of course a world class antivirus software – all of them purchased for few thousands of rupees or hundreds of dollars and nothing for free. But still he is not 100% safe in the wild west of Internet today. Because it is not just virus, trojan or any such malware – it is social engineering.… Continue reading
Posted by cyber-geek | Posted in Cyber Awareness | Posted on 06-05-2011
The mutation of malware is happening very rapidly where new types of techniques are evolving to raise money for hackers. Ransomware is a mutation of scareware, where the hacker hijacks a PC by encrypting all its files and demands ransom to unlock or decrypt the files. The infected PC may not send spam mails or track sensitive information for its creator. It is worse than that.… Continue reading
Posted by cyber-geek | Posted in Cyber Awareness | Posted on 22-03-2011
Ever since the mobile phones have included web browsing technologies, they were a major hit among users. The latest smartphones have even put mobile users a step ahead with exclusive features like online shopping, downloading, video streaming, social networking, mobile applications, email, and even document editing and sharing.
Recently, a report (by Conductor) said that smartphone ownership increased roughly 58% during the year 2010… Continue reading
Immediately after the massive earthquake and tsunami in Japan, experts noticed many Internet fraudsters exploiting the situation through black hat SEO techniques.
The experts said that the criminals immediately started customizing their malicious websites, including keywords related to tsunami and earthquake, to get on top of the search results using black hat seo methods. It has been found out that they were trying to deploy malware… Continue reading
Ever thought Linux is invulnerable and robust against malware attacks? then its time to rethink. Security researchers at TrendMicro found malware that can exploit routers based on Linux and Unix platforms. The malware, though was said to be predominantly found in Latin America, has possibilities of spreading to other regions.
Potential of the threat
As per the source: the malware code, found to be ELF_TSUNAMI.R, has… Continue reading
Posted by cyber-geek | Posted in Cyber Awareness, Cyber tips | Posted on 04-02-2011
No amount of precautions and security measures for a network will equal the vulnerability created by a small USB device. You can see all the pain you have taken to make your network secure, crumble in a matter of seconds, due to an issue caused by a USB drive. USB drives are small, handy and convenient but one can’t imagine how notorious they are.
Few instances here will tell… Continue reading
Posted by cyber-geek | Posted in Cyber Awareness | Posted on 05-01-2011
Vulnerabilities in commonly used and popular software applications were being exploited by the hackers to contaminate the PCs. Adobe PDF Reader was one of the most commonly exploited software.
Adobe Reader 9 was known for its vulnerabilities in the year 2010, which kept evolving despite the number of security patches released by Adobe. In order to check it, Adobe Reader X was released with security enhancements… Continue reading
Posted by cyber-geek | Posted in Cyber Awareness | Posted on 12-11-2010
Despite high levels of investment on security tools like firewall, anti-malware, etc and precaution measures like safe browsing, etc many Internet users still fail to keep their PCs from getting infected. This can be attributed to the lower awareness levels on the increasing types of malware which evolve with new tactics and also negligence in updating the application software of PC regularly. Drive-by malware is one such… Continue reading
Internet transactions today are highly vulnerable to exploitation by cyber criminals. Online transactions in the current situation must be dealt very sensitively and sensibly in order to avoid any kind of data theft. The Secure Sockets Layer (SSL) enables encryption of sensitive data during online transactions through advanced encryption methods and validation processes. Encryption of data makes it very difficult for unauthorized people to view the information during… Continue reading
Website spoofing is one of the deceptive snare used by cyber criminals for phishing. Internet is still a highly vulnerable place for transactions. Cyber-criminals keep finding different ways to exploit a user online. The only way to survive them is through conventional awareness and credible preventive measures.
What are Spoofed Websites?
A spoofed website is usually a replica of a legitimate website. Almost all the features… Continue reading