“See who’s tracking your email” What if we tell you that all our emails are being tracked and our information is being collected. Yes, it is high time we take security seriously and understand the gravity of the scenario. SPY PIXELS: To start with, let us first understand what spy pixels are. Spy pixels which are also known as tracking pixels or web beacons. They are invisible and tiny image files( .PNGs and .GIFs) which are inserted in the content body of an email. They may appear as clear, white…
Author: Shivashankar Saravanan
Risk Management
“Be Prepared for Anything!” What is Risk Management? Risk Management can be defined as the process of identifying, evaluation and prioritization of risks and further plan to monitor and reduce the impact of unfortunate incidents. ISO 31000 classifies risk management process into the following steps; communication and consultation; establishing the context; risk assessment, risk identification; risk analysis; risk evaluation; risk treatment; monitoring and review. Risk Management is an iterative process. Why is it important? Risk can come from different sources in and out of an organization. It is important to…
Cybersecurity Checklist
A detailed look into cybersecurity checklist that an organisation can follow to avoid any security incidents and financial loss in the future due to poor security posture.
What is Cybersecurity? Part II
In this article, we will discuss further on the threat actors, their motivation and the different types of cybercrimes happening nowadays globally.
What is Cybersecurity?
Ever since the introduction of the internet the term cyber security has become very prominent and one of the most searched terms on the internet. And more importantly, the accelerated growth of the internet has also paved the way for cyber criminals using different techniques to launch an attack against a targeted victim connected to the internet.
Bangladesh Bank Cyber Attack
“ One of the biggest Cyber Heists” The Bangladesh Bank robbery commonly known as the Bangladesh Bank cyber heist took place in February 2016. This particular heist is considered to be one of the biggest cyber attacks targeted against any government body in the world. What Actually Happened ? On the 4th of February 2016, Hackers stole Millions of dollars from the central bank of bangladesh through the Federal reserve bank of New York. Hackers sent thirty five forged requests with an aim of stealing $1 billion from the Federal…
Common Networking Attacks
“Take good care of your network Infrastructure” An organisation’s network infrastructure is usually large and complex.They are helpful for the business operations but they also pose a huge security threat when not properly maintained. When an attack is targeted against an organisation, the network would be the first to be compromised. What is a Network Attack? Network attacks happen when an attacker tries to gain unauthorised access to the network with an aim to steal data, infect the system with malware and to perform other malicious actions. The attackers can…
BOTS
“Watch out !!!” These days Botnets are currently one of the worst threats on the Internet. The hackers make use of computers by infecting them and using them for malicious activities. Save yourselves!!! What are Bots? Bots are internet connected devices such as Computers, Mobile phones etc, which are used by hackers to launch an attack. A group of bots connected together in a network is called a Botnet. Botnets are used for malicious activities such as performing a DDOS attack, stealing information, ad fraud, clickbaits and many other malicious…
WhatsApp Vs Telegram
“Which one of them is Secure and Better?” The evolution of the chatting service has been huge over the past years. There are tons of apps available for us to chat, share media, including voice and video calls. These apps make our lives a lot easier and everyone around us uses these apps on a regular basis . Most of these apps are free to download from the Appstore/ Playstore whereas a few of them are paid apps. These apps differ in many ways such as the UI, features, Updates,…
Distributed Denial Of Service (DDOS)
“Protect you Network” DDOS attacks are increasing steadily over the past few years and are a threat to organisations and their network. And it is also predicted that the total number of attacks of this type will reach 17 million by 2020 worldwide. What is a DDOS attack? A Denial of service attack(DOS) is a cyber attack in which the attackers (hackers) aim is to render a system or network resource unavailable for the user by disrupting the services by constantly flooding it with requests. A distributed denial-of-service (DDoS) attack…