CALL US

+91 8219776763

Month: November 2016

Locky campaign uses fake ISP complaints to deliver malware

By Prempal Singh 0 Comment November 23, 2016

Inside a new twist that plays on the long-time battle between ISPs and spam operators, a security researcher found a new malware campaign sending email messages that masquerade as INTERNET SERVICE PROVIDER complaints claiming recipients’ computer systems have been detected mailing spam. The campaign affects to victims with the Locky ransomware via weaponized email attachments […]

Security body plans malware research centre in city

By Prempal Singh 0 Comment November 23, 2016

Internet security is now a national concern and the next world war would be fought on the internet without shedding a drop of blood, said IT minister KT Ramo Rao, speaking at the second edition of the cyber security conclave that started out on Tuesday. The conclave is meant to accept the think tank of […]

Be Aware !!!! Locky Ransomware is on Facebook

By Prempal Singh 0 Comment November 23, 2016

Nowadays we know very well, the power of social media and hackers using Facebook’s instant messaging (IM) feature to spread malicious malware. Therefore, Don’t click any .svg (Scalable Vector Graphics) image file delivered to your Facebook messenger because it might lock your complete system completely. Cyber-Criminals have targeted Facebook messenger to spread Locky Ransomware. Locky […]

How To Access Websites Without Internet Connection On Smart Phone

By Prempal Singh 0 Comment November 23, 2016

We know very well that if we want to access some website then we have an internet connection. If you are a student and want to access some website and in your home, there is no internet connection, then I wanna go to a simple trick then you can access the website without the internet […]

How To Encrypt Keyboard To Avoid Keyloggers

By Prempal Singh 0 Comment November 22, 2016

What is Keylogger Keylogger is a software program or hardware device that can be used to monitor and log each of the keys, user types into a computer keyboard. The attacker who has installed this program or hardware device is able to view all secrets key. Because these programs and hardware devices capture the keys […]

error: Content is protected by Cyberops !!