Monthly Archives: November 2015

639 Web browser vulnerabilities and 35 SCADA vulnerabilities found in Symantec Study

The Symantec Internet Security Threat report of 2014 released recently indicates that in 2014 6549 new vulnerabilities were reported as compared to 6787 in 2013. Out of these,  there were 891  Web Browser vulnerabilities which  are a serious threat to … Continue reading

Posted in Cyber Law | Leave a comment

Adobe accounts for 65% of Zero Day Vulnerabilities

The Symantec Internet Threat Study indicates that in 2014, there were 24 Zero day vulnerabilities as compared to 23 in 2013. Zero-day vulnerabilities are vulnerabilities against which the vendor has not released a patch. The absence of a patch  presents a … Continue reading

Posted in Cyber Law | Leave a comment

1 million new threats a day..is what Internet users face..says Symantec Study

The recently released Cyber Crime study released by Symantec captures the status of the Internet risks in 2014. Titled Internet Security Report (ISTR 20), the report with its annexures provides an indepth insight into the threats and vulnerabilities that most of us … Continue reading

Posted in Cyber Law | Leave a comment

Beware of this Call from 90699 35661

Today, I received a telephone call from the mobile number 90699 35661 which appears to be an attempted fraud. I am placing this for public attention so that people donot respond to the call. At the same time, the Internet … Continue reading

Posted in Cyber Law | Leave a comment

Paris Attack Fall out.. Bitcoin is in danger of going into Extinction.

One of the inevitable fall outs of the global outrage on ISIS after the Paris attack is an attempt by all countries to choke ISIS of its funding sources.  It is estimated that ISIS holds a huge stock of Bitcoins … Continue reading

Posted in bitcoin | 1 Comment

Beware of Malware carrier and Hoax emails on ISIS-Paris attack themes

As could be expected after any global catastrophic event, the ISIS attack in Paris has also given raise to fraudulent e-mails. Some of them could be hoax emails and some could be carrying malware prompting the receiver to click on … Continue reading

Posted in Cyber Law | Leave a comment