Mobile Security

Introduction As the rate of mobile device adoption continues to spike and the sophistication of these devices advance, users are becoming more efficient at workplace but it also makes them more attractive to hackers, data thieves, malware distributors and other criminals. Unfortunately, many smartphone users do not recognize these security shortcomings. Consequences of an attack can be severe, to ensure that your digital life is well protected , it is very critical to secure your handheld devices. You might not realize but it holds data that are more important to you than your PC holds, including passwords, credit card...

WannaCry Ransomware

Description: Ransomware is a type of malware that blocks access to computer system either by locking the systems screen or by encrypting files and folders. Usually certain amount(ransom) of money (in bitcoin) is demanded for unlocking the files. For most of the new variants of ransomware, prevention has become the only guard since data recovery after attack is almost impossible. WannaCry is a kind of ransomware, also referred online under various names – WCry, WanaCryptor, WannaCrypt or Wana Decryptor. The attack was based upon a security flaw in Microsoft Windows operating systems(Windows XP through 8.1). Although the patch was released...

Some Tips to Secure Websites

  Most of the government Agencies, Corporations and Private firms have now embraced website as means of connecting to their constituencies, disseminating public information and making their services accessible. Due to the always on nature of these public facing sites, they are more exposed to cyber attack. Most of the websites are hacked because operating system, database, plugins CMS or related applications are not updated leaving them exposed to known vulnerabilities: Some of the common channels used by hackers to take control of your system: Password compromised, PC or server infected with malware  to capture credentials, Exploiting known or...

Security Risk associated with Free Wifi and countermeasures

Why would anyone pay for each megabyte when one can use it for nothing? The problem is that many of these “ FREE/Public” Wi-Fi networks do not use encryption mechanisms, and therefore are easier for attackers to break into. Since there is no security validation, anyone connected to the network can connect to router and potentially to other connected devices and get hold of data( passwords, credit/debit card information, names , addresses, frequently visited sites and other sensitive information ) stored on the devices. With data in hand, the attacker is equipped for identity theft or for developing spear...

Email Safety and Recovery

Here are some best practices to safeguard your email accounts and recover them when needed. Login to your account: if password has not been changed, it’s easy. If you cannot login, try “Forgot Password” and or any other  recovery options If all of them have been changed, contact the mail provider and report compromise or there is nothing much you can do. Since you cannot proceed further. All you can do is to inform via other means to all your contacts(as many as you know) that your email has been hacked and not to respond to any emails from...