“See who’s tracking your email” What if we tell you that all our emails are being tracked and our information is being collected. Yes, it is high time we take security seriously and understand the gravity of the scenario. SPY PIXELS: To start with, let us first understand what spy pixels are. Spy pixels which are also known as tracking pixels or web beacons. They are invisible and tiny image files( .PNGs and .GIFs) which are inserted in the content body of an email. They may appear as clear, white…
Category: Technology News
FireEye Cyber breach – PART II
No organization is 100% secure – ever! As FireEye continued to investigate and identify the root cause of their security incident, they identified a global campaign that introduced a compromise into the networks of public and private organisations through the software supply chain. FireEye identified that this compromise was delivered through a widely used IT infrastructure management and remote monitoring software – SolarWinds. Although FireEye hasn’t attributed this attack to any particular group, based on several media reports, it is believed that this attack was carried out by a nation-state…
Fireeye Cyber Breach – PART I
No organization is 100% secure – ever! FireEye is one of the world’s renowned cybersecurity firms with customers including major government agencies and enterprise customers around the world. The company is known for its world-class research on state-sponsored threat actors and its incident response capabilities. On 8th December 2020, FireEye CEO Kevin Mandia said in a public statement that they were recently attacked by a highly sophisticated threat actor. “This attack is different from the tens of thousands of incidents we have responded to throughout the years. The attackers tailored…
Manchester United Cyber Attack
“A Cyber Gun to the Head” The Red Devils were attacked and it is believed that the cyber criminals are holding them to ransom for millions of pounds after hacking into their system. Manchester United released a statement late on Friday, 20 Nov of an attack on their IT systems that took place that very evening. The attack was identified and shut down by the cyber defences set up by the club’s IT team. It’s rumoured to be a ransomware attack for which the club has neither agreed or denied…
BOTS
“Watch out !!!” These days Botnets are currently one of the worst threats on the Internet. The hackers make use of computers by infecting them and using them for malicious activities. Save yourselves!!! What are Bots? Bots are internet connected devices such as Computers, Mobile phones etc, which are used by hackers to launch an attack. A group of bots connected together in a network is called a Botnet. Botnets are used for malicious activities such as performing a DDOS attack, stealing information, ad fraud, clickbaits and many other malicious…
WhatsApp Vs Telegram
“Which one of them is Secure and Better?” The evolution of the chatting service has been huge over the past years. There are tons of apps available for us to chat, share media, including voice and video calls. These apps make our lives a lot easier and everyone around us uses these apps on a regular basis . Most of these apps are free to download from the Appstore/ Playstore whereas a few of them are paid apps. These apps differ in many ways such as the UI, features, Updates,…
Gmail Global Disruption-2020
”The King of mail having trouble in sending emails” As a long time user of Gmail and g-suite services from the alphabet corporation company the leader of search engines and known for making much other revolutionary software that has become so much integrated with our daily lives, for example, finding the best restaurant near you to knowing what is the weather going to be like google plays an integral part in our daily lives. Google on Thursday the 20th of august 2020 has given a statement stating that its popular…
Basics of Malware- An overview
“A good read on the types of malware and the ways to protect yourself from them! ” Protecting against malware has become a primary goal for organisations and also a very complicated process these days because of the different forms they come in and the fact that they are hard to detect and eradicate. What is Malware? Malware is a script, code or a software that is designed to interrupt computer operations, gather confidential information, gain unauthorised access to computer systems without permission of the owner. Its primary function is…
“An art of exploiting Human Psychology”-Social Engineering
“An art of exploiting Human Psychology” Nowadays it has become harder to fight against the social engineering attacks than the technical attacks because the social engineering attack has the capability to bypass all technologies including the firewalls. What is Social Engineering? Social engineering is a technique used by attackers to persuade people into performing actions and revealing private information that may be useful for fraudulent purposes. In today’s world humans are more susceptible to attacks by the bad guys than machines. So it is very important for an organization to…
GDPR & Related Fines to grow by the year 2025 to encourage more companies to follow the law
”Fines to grow by the year 2025 to encourage more companies to follow the law” The legislation for data protection was much in shambles causing chaos and confusion to organizations, business and individuals all alike. Post GDPR introduction the privacy law to protect all has been declared the toughest data protection law in the world. What is GDPR?General Data Protection Regulation (GDPR) is a mandatory legal framework which provides and sets guidelines for the collection and processing of personal information from individuals who live in the UK and the European…