Security Updates from Apple

Apple has released security updates to address  vulnerabilities in its various products (macOS Sierra,  iOS, watchOS, tvOS, iCloud for Windows, Safari, iTunes for Windows). Users and administrators are recommended to visit above links or  : https://support.apple.com/en-us/HT201222 for more details and patch the systems before it gets in the hands of attackers. Patch and be safe....

WannaCry Ransomware

Description: Ransomware is a type of malware that blocks access to computer system either by locking the systems screen or by encrypting files and folders. Usually certain amount(ransom) of money (in bitcoin) is demanded for unlocking the files. For most of the new variants of ransomware, prevention has become the only guard since data recovery after attack is almost impossible. WannaCry is a kind of ransomware, also referred online under various names – WCry, WanaCryptor, WannaCrypt or Wana Decryptor. The attack was based upon a security flaw in Microsoft Windows operating systems(Windows XP through 8.1). Although the patch was released...

Some Tips to Secure Websites

  Most of the government Agencies, Corporations and Private firms have now embraced website as means of connecting to their constituencies, disseminating public information and making their services accessible. Due to the always on nature of these public facing sites, they are more exposed to cyber attack. Most of the websites are hacked because operating system, database, plugins CMS or related applications are not updated leaving them exposed to known vulnerabilities: Some of the common channels used by hackers to take control of your system: Password compromised, PC or server infected with malware  to capture credentials, Exploiting known or...

Security Risk associated with Free Wifi and countermeasures

Why would anyone pay for each megabyte when one can use it for nothing? The problem is that many of these “ FREE/Public” Wi-Fi networks do not use encryption mechanisms, and therefore are easier for attackers to break into. Since there is no security validation, anyone connected to the network can connect to router and potentially to other connected devices and get hold of data( passwords, credit/debit card information, names , addresses, frequently visited sites and other sensitive information ) stored on the devices. With data in hand, the attacker is equipped for identity theft or for developing spear...