Oversharing on Social media


Most of us today use social networks to share personal information, such as the name, location, contact information and photos, and professional information, such as the company name and work location. Have you ever thought about someone misusing this information?… Continue Reading


How to prevent Vishing

Vishing, also known as phone phishing, is similar to phishing and is executed through fake telephone calls. Unlike other types of phishing where an email message is used, vishers use telephone to execute their fraudulent objectives. The vishers usually appear… Continue Reading


Have I been hacked? What to do?


Are you sure that your email account is safe and no one has hacked it till date? Millions of email accounts have been compromised till date according to troyhunt, Microsoft Regional Director and Microsoft Most Valuable Professional for Developer Security.  One of the important aspects… Continue Reading


What is Hacking?


Have your digital devices, such as the computer or smartphone ever been hacked? Even if they have been hacked, you may not always be able to identify it until you are affected. So, what is hacking and who does it?… Continue Reading


What is Pharming?


Have you ever been redirected to a fake website that appeared similar to the genuine website even when you provided the correct URL in the browser? Or, have you heard stories about people who had such experience. This process of… Continue Reading