29 Jan 2017

What’s the worst that could happen when a Ransomware hits a Hotel? Recently, hundreds of guests of a luxurious hotel in Austria were locked in or out of their rooms when ransomware hit the hotel’s IT system, and the hotel had no choice left except paying the attackers. Today, we are living in a digital…

09 Jan 2017

The ransomware attacks on poorly secured MongoDB installations have doubled in just a day. A hacker going by the handle Harak1r1 is accessing, copying and deleting unpatched or badly-configured MongoDB databases and then threatening administrators to ransom in exchange of the lost data. It all started on Monday when security researcher Victor Gevers identified nearly…

20 Dec 2016
Ransomware has risen dramatically since last few years, so rapidly that it might have already hit you or someone you know. With hundred of thousands of ransomware variants emerging every day, it is quite difficult for traditional signature-based antivirus tools to keep their signature database up-to-date. So, if signature-based techniques are not enough to detect...
30 Nov 2016

For those of you who do not know what the connectors or connections on the back of your computer are called or where they are located… We have created a number of Computer Port Charts and other computer peripheral charts to help you identify the common connectors and ports on the back of your desktop…

25 Nov 2016

You operate a number of online accounts in your internet life. As time proceeds, you even forget their names. Deseat.me is a website where you can delete all the online accounts associated with your Google account. Sometimes, you feel the need of committing a digital suicide i.e. deleting yourself from the internet. For instance, before shifting…

18 Nov 2016

Kali Linux commands cheat sheet. All basic commands from A to Z in Kali Linux has been listed below. A apropos : Search Help manual pages (man -k) apt-get : Search for and install software packages (Debian/Ubuntu) aptitude : Search for and install software packages (Debian/Ubuntu) aspell : Spell Checker awk : Find and Replace…

15 Nov 2016

Very often we share login credentials of our Windows PCs with others, just to let them access it for a limited period of time or due to some other unavoidable reason–and forget to change the password. Without a doubt, it’s a very poor security practice. This also makes us wonder how can we know if…

01 Nov 2016

Linux is quite possibly the only open-source project that has managed to change the world at a very large scale. It is on your phones as Android, it is on the millions of servers that run the internet itself and also it is even on your home router. Hence a source used by millions can be…

20 Oct 2016

India is undergoing the biggest data breaches to date with as many as 3.2 Million debit card details reportedly stolen from multiple banks and financial platforms. The massive financial breach has hit India’s biggest banks including State Bank of India (SBI), HDFC Bank, Yes Bank, ICICI Bank and Axis, and customers are advised to change their…

11 Oct 2016

Not all security breaches happen because of malicious intent. Some of the most common security issues are caused by bad habits ingrained in employees’ day-to-day routines. Thankfully, these potential threats and vulnerabilities are possible to reduce, by improving organisation-wide awareness of the most common information security mistakes. 1) Insecure Devices for Work Organisations have no…