Digital India Myths: Long Password = Secure Account

Nitish ChandanCyber Security3 Comments

Where the rest of the world is switching to two and three factor authentications, for a fact most of the Internet users in India are beginning to use passwords sanely. For security both online and offline, only password authentication is turning out to be a failure. After speaking to the masses living in the upcoming digital spaces of India and … Read More

Save Your Sensitive Information From Malicious INSIDERS!

Arpan SinhaCyber SecurityLeave a Comment

A sensitive information is always at a threat from outside hackers, and we’ve employed a number of methods and tools to prevent it. But there are people sitting inside the organization too, who pose a threat to this information. These people are called ‘insiders.’ An insider threat, according to WhatIs, is a malicious hacker who is an employee or officer of a … Read More

Website Compromised? Here Are Some Steps You Must Follow.

Arpan SinhaCyber SecurityLeave a Comment

Crores of websites in India were hacked and put down last year. Lakhs of websites are blacklisted by search engines every week. Thousands of them get permanently banned. You must have come across the warning – “This site may harm your computer.” This is what happens when a site gets blacklisted, and this affects the number of visits on the site. Thus, you … Read More

Digital India Myths: Virus

Nitish ChandanCyber Security1 Comment

This post is the first in a series about the myths that people in India have about Computers, Mobiles, Internet and the Cyber Space. While the Digital India is supposedly growing in the metropolitan cities, the real (needs to be) Digital India is living in a disconnect and most blacked out zones of awareness. We need to progress, yes all … Read More

Smart Watches and Heaps of Threats

Arpan SinhaCyber SecurityLeave a Comment

Ever fancied owning a smart-watch? Or do you own one? Well, you might get stunned after knowing that these wearable devices pose a lot of security risks. Smart watches, smart bands, and even wireless panels can set a threat to your online identity. These are the devices that gain remote access to stuff on your smartphones or computers, referred to as IoT (Internet of … Read More

reCAPTCHA: Easy on Humans, Tough on Bots

Arpan SinhaCyber SecurityLeave a Comment

Did you ever come across such a thing before: You must be wondering how will this thing decide you’re a robot or not? You just have to click, and a bot can easily click, right? Well, here’s the answer. CAPTCHAs have long relied on the inability of bots to solve distorted text. But according to Google, The primitive CAPTCHA can … Read More

Using Virtual Machines? Beware of VENOM

Arpan SinhaCyber SecurityLeave a Comment

VENOM is a security vulnerability in floppy drive codes in various virtual computer platforms. It is a backronym for Virtualized Environment Neglected Operations Manipulation, which basically means that in a virtual machine, there are some neglected operations, i.e. the virtual floppy drive codes, which have been manipulated and hence are causing the guest platform to literally break out and affect … Read More

Break a number Lock

Raj PagariyaCyber SecurityLeave a Comment

Manual locks are considered no good today. The presence of a locksmith at every corner of the street has made the task of getting a duplicate key child’s play. In times like these all of us have shown high level of faith in the fancy number locks. Not like we believe in what fancy locks have got to offer but … Read More