Author: Reetwika Banerjee

Time to be Conscious About 4G Downgrade Attack

Reading Time: 6 minutesHave you ever pondered what does 4G really mean? Why is it beneficial to you? What are the security flaws in it? How can it be misused by cyber terrorists to create panic attacks? How can you, as an end user, be affected by its inherent vulnerabilities? Well, let us discuss some of the critical […]

Share

Did You Know Microwave Oven can Prevent Carjacking!

Reading Time: 5 minutesA microwave oven or a refrigerator can really save your car from being stolen. Whosoever thinks only a computer or smartphone user can be targeted by a cybercriminal, should be warned that they are the biggest fools. Any technology user can become cyber attacker’s victim. Reetwika, a cybersecurity consultant, gives invaluable tips, in the weekly […]

Share

Your Wi-Fi Hotspot Could be the Next Target of Café Latte Attacker

Reading Time: 7 minutesCafé Latte attack had created havoc during the dawn of the millennium when wireless technology was just picking up the momentum. It was named so as the first invader had launched this form of attack sitting from a café near his victim’s wireless device while enjoying a cup of latte coffee. Another school of thought […]

Share

Keylogging: Boon or Bane

Reading Time: 6 minutesKeylogger is a hardware or software plugin which can secretly capture all the keystrokes entered through the keypad of a typing device without the knowledge and consent of the user. It can affect a desktop or laptop keyboard; even a smartphone keypad is also not spared. Reetwika tells us about Keylogger and the preventive measures, […]

Share

Do Not Allow Safo Pirates to Ransack You

Reading Time: 8 minutesMillions of fraudulent websites and traders are available who deal in pirated copies against thunderbolt discounts or totally free of cost. But should money be the ultimate decision maker? Ideally, it should not be in the digital world if you are handling any form of private or personal information. Reetwika gives us invaluable tips to […]

Share

Beware of Fake Celebrities Created by SocBots

Reading Time: 5 minutesSocial Networks like Facebook, Twitter, Instagram, YouTube, LinkedIn, etc – recently Facebook has been accused of malicious electoral influence (though still in debates), it might probably have been made possible (if true) through SocBots. You must stay alert against any such dubious fame of someone’s controversial political post (ex: millions of likes, shares, reactions, comments, […]

Share

Stay Alert against BlueSnarfing at Free Public Hotspots

Reading Time: 4 minutes  BlueSnarfing is comparatively a topical cybercrime wherein attackers establish a clandestine connection with wireless gadgets via ‘Bluetooth’ technology, gain unauthorised access to victim’s device and remotely steal information without any noise. They may also take full control of the compromised device, warns cyber security expert, Reetwika. She gives invaluable tips to protect ourselves from […]

Share

Are you Helping Terrorists through Stego Videos?

Reading Time: 7 minutesCyber terrorists have started exploiting Steganography as a gear to blast malicious contents beyond borders to spy on our digital habits like internet browsing history, device locations, standby timings, national secrets, critical defence strategies, banking data, personal records, telephonic conversations, SIM cards, photos and multimedia files stored in device or memory cards, social media profiles, […]

Share