Identity Theft and Happy Holidays!

In this article, I am focusing on two very important aspects of cyberspace, your Identity and online shopping through a great resource called CISA. CISA stands for -The Cybersecurity and Infrastructure Security Agency. (Homeland Security - https://www.dhs.gov/CISA ) Identity Theft: It is considered one of the most widely committed crimes and with advent of the internet and increasing use of num...
Read More

Calm your Nerves – Blackmail Emails

Have you or anyone in your family, friends or colleagues received an email in your inbox from an anonymous individual claiming to have hacked your email account? To prove it they also provide you with a password that you use or used. Further, they go to prove that they have also hacked into your PC, phone and have recorded you visiting illegal websites or performing acts that are considered sh...
Read More

Meltdown & Spectre – Hackers can exploit the Hardware design Flaw in Intel, ARM and AMD Chips

Meltdown and Spectre sound like the bad characters from the new animated feature film but there is nothing comical about them. These flaws, called Meltdown and Spectre, could allow hackers to lift passwords, photos, documents and other data from smartphones, PCs and the cloud computing services that many businesses rely on. -NYTimes Intel put out a notice to all its partners who make operating s...
Read More

Your Home Wifi – You are now Krack ‘ed open – WPA2 Security Privacy Risk – Update your Wi-Fi router firmware!

Almost everyone who has access to the internet uses a Wi-Fi enabled device connected to a Wi-Fi router or access point and if your Wi-Fi router firmware is not upto date or your are using the WPA2 security protocol then you may be at risk of attackers accessing your sensitive information. Most consumer devices supplied by Internet Service Providers come with pre configured security (WPA or WPA2...
Read More

Equifax Announces Massive Breach September 7th 2017. What you need to know and do, Read more.

On September 7, 2017, Equifax first reported a massive breach of customer information. We recently discovered a cybersecurity incident involving consumer information. Once discovered, we acted immediately to stop the intrusion. — Equifax Inc. (@Equifax) September 7, 2017 What do we know about this massive breach as of September 8th morning? Equifax estimates about 143 million cus...
Read More

Petya – What you need to know now.

Petya is a ransomware in the form of worm that hit computers worldwide locking down computer systems and demanding $300 in bitcoins. Ukraine government's computers were brought down during the initial spread of this ransomware through a software update mechanism built into an accounting program that companies working with the Ukrainian government need to use called m.e.doc. Read the full technical...
Read More

Wannalaugh – Definitely don’t wannacry (Wannacrypt Ransomware)

Lets get straight to the point. Are you vulnerable to this particular type of Ransomware program - WannaCry? The answer to this question depends on your answers to the following: Do you have Windows Computer which has been patched with latest updates from Microsoft? Are you able identify Phishing Emails? Do you have a valid Anti-Virus Subscription? Do you have the Windows ...
Read More

SC Security July 2016 Bulletin-1

All sorts of news are making the headlines. Brexit, US Presidential elections, Olympics and gun fire, to name a few. All of these social events have widespread effects in the digital media especially in internet security. Here are some of the highlights for the month of July. Phishing scam targets Brexit situation. 80,000 Login Credentials Leaked as Amazon Ignored Warnings From the Hacker....
Read More

5 Signs That You May Have Received A Phishing Email

Ever wondered why you get so many junk emails? Nowadays it's more than just junk, they are deliberate attacks and the word is 'Phishing'. We all are vulnerable and that is why we get them. Here are 5 Signs to look out for when these low life scums send us an email: Spoofed, Random and Arbitrary Email Addresses. Phony "From" address  Look at the 'From' address. If this is an email addres...
Read More

Can You Breach This? 3 Steps To Boost Your Security

There are lot of things on the internet we are grateful for, social community, sharing knowledge, communicating with your peers, making a living, entertainment and the list is never ending. All of these services come with a risk. We are going to look at the risk of breach of services or websites and most importantly your username and passwords. Can you breach this? Moreover, can you answer this qu...
Read More
Make sure you receive Important News & Alerts on Cyber Security and Giveaways. Click here for more Information. 
Holler Box