Security Tips

What to do when you receive an extortion email

The extortion email is not a new concept, but the frequency is increasing in the current lockdown scenario. As a result, everyone is alarmed. This means that cybercriminals send emails demanding payments. In case of a refusal, they threaten the users to make their sensitive…
Security Tips

Ransomware Gang Launches Website to Auction Stolen Data

The Sondinokini Ransomware Gang has gone an extra step ahead and launched an auction stolen data website. The gang is accused of attacking UK Powergrid Middleman Elexon and has recently launched an eBay auction site to sell data of the victim that denied paying the…
Security Tips

Tech support scams: How to spot them and protect yourself

Tech support scams are another avenue that cyber-criminals are approaching to gain profit. It majorly targets fooling users into paying for fixing technical issues in their computer system. Tech support scammers make you believe that you have serious PC issues that cannot be…
Security Tips

Beware of Wiper Malware! How to stay protected.

The destructive nature of Wiper Malware differentiates it from the other members of the family. Rather than aiming at ransom, the working methodology of this malicious malware involves deleting, wiping, or overwriting user data and information.  The motivation behind…
Security Tips

Top 5 most dangerous cyber-attacks

Over the last few decades, dangerous cyber-attacks have gained a lot of attention and have become a major area of concern for this technology-driven era. The underlying aim of a cyber attack can range between data theft to ransom attack, impersonation, cyber espionage…
Security Tips

What is an Insider Threat? Signs and Prevention

An Insider Threat takes place when someone from within the organization or close to it uses its sensitive information in a wrong manner. The person exploiting the information can either be a former employee, board member, business partner, a current employee who has access…