Wisdom of Life

Cyber Threats and Scam

Classic lies you should not let a cyber criminal use on you

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out certain actions or giving away confidential information is known as Social Engineering. And this is a rampant form of exploitation. Why? If you can get access to anything you want just by deceiving someone, why waste time creating a highly technical and sophisticated hack? So, how exactly do cyber criminals execute social engineering tricks

Read more
Latest security news updates from the week gone by

Personal information of app users leaked on Google Play People who still disregard Android security and do not take privacy controls over the platform seriously, will be alarmed to learn this piece of news. An Australian app developer recently discovered that he had complete access to personal information of the users who downloaded his application. Alarmingly, this information was available to the developer even after he uninstalled the app or

Read more
Why USB drives and CDs are a security risk to your corporate network..!!

college essay help online It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves protecting the corporate network from external threats and internal parties (employees) as well. This is where effective Endpoint Security (EPS) comes into the picture. EPS is a network security concept that places the responsibility of each device’s security on the device (end-point) itself. Most

Read more
Your Smart TV opens up a new frontier for hacks and spying.

Just like smartphones arrived in most markets and obliterated regular feature phones, smart TV’s are expected to change the way we interact with our television sets. A smart TV, or hybrid TV, comes integrated with several web 2.0 applications and widgets that allow users to access the Internet and obtain content from several sources. However useful this may be, this opens up a brand new attack surface for hackers to exploit. The prospects of this

Read more
Online Security tips for Gen Y ..!!

If you are part of Generation Y then your daily life is all about being connected. Tweeting, friending, and googling is routine, but protecting yourself from the various cyber-related issues that will likely pop up should be, too. According to our research, only 31% of Gen Y ranked security as the most important consideration when making decisions about their computer. In fact, Gen Y was more likely to prioritize entertainment and community than

Read more
Social Networks and Instant Messaging – A Fertile Ground for Cybercriminals

Social Networks: India now ranks as the seventh largest market worldwide for social networking and the total Indian social networking audience grew 43 percent in the past yearii. The popularity of social networks is directly proportional to the volume of malware it attracts. One of the primary attack techniques used on social networking sites involved the use of shortened URLs. Last year, attackers posted millions of these shortened links on social

Read more