UA-72559186-1

Blog

buy bitcoins in Pakistan

Buying and selling bitcoin service is offered by many wallets and online exchanges, but not all are reliable and not all the reliable ones work in Pakistan. Many people want to invest in cryptocurrency...
atm skimming attacks

What is Skimming? Skimming is a fraudulent activity that involves the illegal transfer of payment data from the point-of-sale to another unauthorized location. Some examples of skimming include the stealing of PIN codes and credit...
common passwords of 2016

It seems as though we are never going to learn. Once again, “123456” made it to the top in the list of world’s most common passwords of 2016. Keeper, a password management company, released...
Emerging Cyber Threats 2017

2016 is about to end, and the ever emerging cyber threats are not going away anywhere anytime soon. 2017 will see a number of emerging threats as technology continues to rapidly develop and increase...

PCI DSS or Payment Card Industry Data Security Standard is a set of security controls that are used for measuring security of businesses involved directly or indirectly in the Payment Card Industry. All businesses...

Are you in the process of building up your resume? No matter what field you belong to, adding a few sentences about cybersecurity will make you a desired candidate for a potential job. As...

The PCI DSS scope relates to everything that is related to the cardholder data environment (CDE). This means that both the physical as well as electronic environment should be catered for against the PCI...

ISO 27001:2013, also written as ISO/IEC 27001, is an information security management system that provides security controls for effectively managing an organization’s information risk management. It includes policies and procedures to establish and improve...

Latest News

common passwords of 2016

It seems as though we are never going to learn. Once again, “123456” made it to the top in the list of world’s most common passwords of 2016. Keeper, a password management company, released...

An email having the subject of "Quick Question" pretends to send a resume from a random sender is currently in the rounds. The so-called attached resume is a malicious .rtf attachment, actually a word...
mousejack

Researchers at Bastille have demonstrated how computers can be hacked by exploiting flaws in wireless keyboard and mouse dongles. The attack, termed as mousejack attack, is made possible with the use of portable devices...

An malicious SMS stealing Android malware Trojan that portrays itself as a Security feature for Chinese online payment application, AliPay, has recently been discovered. The android malware was detected by Zscaler ThreatLabz, while carrying out an...

Loanbase, an international Bitcoin lending platform known previously as BitLendingClub had its systems breached this Sunday. The security message sent out the the clients by Loanbase notified that hackers had exploited vulnerability in the WordPress...

A recent rise in prevalence of cyber-crimes and subsequent awareness has resulted in generating high demand of IT professionals worldwide. According to a Salary Survey by recruitment company Robert Walters,IT and Information Security professionals...

Hacktivists group "Anonymous" launched DDoS attack on Narita International Airport of Japan and claimed its responsibility. The website went offline on the 22nd and 23rd of January for several hours due to which passengers...

Facebook users particularly businesses and consumers are now facing a new malware attack that targets them by sending fake emails. A recent phishing and social engineering campaign targeting businesses and consumers represents the information...