Why Antivirus and Firewalls Aren’t Enough Protection Against Malware
Antivirus and firewalls are the backbone of any security program, used to gain visibility across the network for inward attacks....
Read MoreHow information outsourced by corporations lands with fraudsters
The recent unearthing of a pretend center that targeted Flipkart and Myntra customers has yet again dropped at fore the...
Read MoreSmartphone’s hotspots of cyber-attacks in India:
If you thought only large critical infrastructure and big corporations would always bear the strength of the increase in cyber-attacks,...
Read MoreMobile Apps – Implicit Trust, Actual Risk.
Mobile apps that exhibit malicious or undesirable behavior square measure out there looking for victims. In December 2018, Google deleted...
Read MoreUnderstanding the info Protection Bill
The Bill is probably going to impact national and International Corporation’s operative in India as a result of its data...
Read More‘Ransomware attacks to morph into 2-stage extortion campaigns’
Ransomware attacks are set to morph into two-stage extortion campaigns and criminals will exploit their extortion victims even more in...
Read MoreMultiple vulnerabilities found in the Cobham EXPLORER 710 satcom terminal
Overview CERT/CC researchers examined the satcom terminal Cobham EXPLORER 710 as an expansion of work from IOActive’s findings in 2014. They discovered...
Read MoreiTerm2 with tmux integration is vulnerable to remote command execution
Overview iTerm2, up to and including version 3.3.5, with tmux integration is vulnerable to remote command execution. Description iTerm2 is...
Read MorePulse Secure VPN contains multiple vulnerabilities
Overview Pulse Secure SSL VPN contains multiple vulnerabilities that can allow remote unauthenticated remote attacker to compromise the VPN server...
Read MoreMultiple D-Link routers vulnerable to remote command execution
Overview Multiple D-Link routers are vulnerable to unauthenticated remote command execution. Description Several D-Link routers contain CGI capability that is exposed to...
Read MoreMicrosoft Office for Mac cannot properly disable XLM macros
Overview The Microsoft Office for Mac option "Disable all macros without notification" enables XLM macros without prompting, which can allow...
Read MorePUA.SafelyOnline
Updated: August 02, 2019 6:02:00 AM Type: Potentially Unwanted App Infection Length: Varies Name: Safely Version: 1.0.1 Publisher: Unknown Risk Impact: Low Systems Affected: Windows Behavior PUA.SafelyOnline is...
Read MoreAdware.4SharedDesktop
Updated: July 29, 2019 7:40:16 AM Type: Adware Infection Length: Varies Name: 4Shared Desktop Version: 4.0.2.6 Publisher: New IT Limited Risk Impact: High Systems Affected: Windows Behavior Adware.4SharedDesktop...
Read MoreBackdoor.Wellmess
Discovered: November 04, 2019 Updated: November 04, 2019 4:41:36 PM Infection Length: Varies Systems Affected: Windows Backdoor.Wellmess is a Trojan horse that opens a...
Read MoreBackdoor.Lookback
Discovered: November 03, 2019 Updated: November 04, 2019 4:33:49 PM Type: Trojan Infection Length: Varies Systems Affected: Windows Backdoor.Lookback is a Trojan horse that opens...
Read MoreRansom.Buran
Discovered: October 23, 2019 Updated: October 30, 2019 8:41:01 AM Type: Trojan Infection Length: Varies Systems Affected: Windows Ransom.Buran is a Trojan horse that encrypts...
Read MoreSONAR.Windivert!g1
Discovered: October 22, 2019 Updated: October 24, 2019 8:39:20 AM Type: Trojan, Virus Infection Length: Varies Systems Affected: Windows SONAR.Windivert!g1 is a heuristic detection designed...
Read MoreHeur.Malcode!gen4
Discovered: October 22, 2019 Updated: October 24, 2019 10:32:55 AM Type: Trojan Systems Affected: Windows Heur.Malcode!gen4 is a heuristic detection for threats typically used...
Read More18 Healthcare cyber-security incidents in October
Numerous privacy incidents at hospitals, IT suppliers and other healthcare organizations captured public attention last month. While some security incidents...
Read More5 reasons why India desires cybersecurity education
Unprecedented growth in technology has blurred boundaries by reworking the approach we tend to work and the way governments serve...
Read More