Multi Factor Authentication: A popular security authentication mechanism widely used today.

Multifactor Authentication: A popular security authentication mechanism

Passwords though a traditional method to protect your information is highly vulnerable and insecure. For the purpose of secure management of passwords multi-factor authentication is suggested but people have not been using it, for no clear reason. Passwords are a problem and therefore PIN (Personal Identification Number) is preferred, but it is only a numerical […]

Read more

Emerging Need Of Cyber Threat Intelligence

Emerging Need Of Cyber Threat Intelligence

In the recent years, the cyberspace has become much more vulnerable than it was in the beginning. A multifold expansion in the use of internet in all kinds of businesses has led to a dilemma. On one face it has led to a great advantage in the businesses in terms of efficiency and productivity and […]

Read more

Artificial Intelligence (AI) in Cyber Security

Artificial Intelligence (AI) in Cyber Security

Cyber security is a major challenge in today’s world, as government agencies, corporations and individuals have increasingly become victims of cyber attacks that are so rapidly finding new ways to threaten the Internet that it’s hard for good people to keep up with them. AI has been a popular topic related to cyber security in […]

Read more

Biggest Misconceptions about Cyber Threats

Biggest Misconceptions about Cyber Threats

Cyber threats have become very predominant in the digital world. It’s no longer a distant threat. In recent years there has been a significant increase in the frequency of cyber-attacks and many businesses have suffered huge losses and have continued to do so. Every now and then we hear of companies losing million dollars and […]

Read more

How To Prevent Information Security Breach In The Age Of IoT?

How To Prevent Information Security Breach In The Age Of IoT?

In the last decade, all that was perceived as a future dream has come to reality. Technology has advanced at a very great pace, almost everything has become integrated with the Internet. This Digitalisation was perceived as a fantasy a decade back. Internet of Things is an interconnected network of numerous computers, digital and mechanical […]

Read more

Two-Factor Authentication Can Turn out to be good in Security

With an alarming rise in cyber attacks in the past decades, it has become necessary for implementing new methods of security. Cyber criminals have become advanced in their methods of breaching security; they are evolving everyday and becoming stronger at hacking. Nowadays single passwords are unable to hold against them any longer. Many reputed companies […]

Read more

Context Authentication- A Move Beyond Two Factor Authentication

Context-based authentication is popularly known as risk based or adaptive authentication. With adaptive authentication rules can be created within an organisation, pre-authentication or how authentication must proceed based on the context. As two factor authentication is evolving continuously, it can be said that context authentication is one of the stepping stone towards this evolution. Context […]

Read more

Does your Business Need Insurance for Cyber Security Breach?

Insurance for Cyber Security Breach

In recent years there have been many reports of cyber attacks of differing magnitudes. Many businesses have suffered huge losses due to these attacks. Several prestigious firms have suffered significant loss in consumer loyalty and got their reputation stained, and subsequently faced huge financial deprivation in the fallout. A recent incident has been the data […]

Read more

Securing the Big Data

Securing the Big Data

Big Data refers to the enormous amount of digital data generated by companies, government and our surroundings. It is said that 90% of data in world today has been created in the last two years. With new technologies coming in, security is the biggest issue. Big data results into big security threats as with the […]

Read more

No one is immune to hacking: The Latest on Cyber Attacks

No one is immune to hacking: The Latest on Cyber Attacks

Today we live under the sky of technology, we breathe and sleep in a digital environment. Almost everything that we do involves technology. Technology has become ubiquitous in human life, there is hardly any aspect left where technology is absent. Internet has been one of  the biggest invention of human history. Internet has its reach […]

Read more

End of SMS Based Authentication

End of SMS Based Authentication

What is SMS based authentication? Using SMS is the second step of two factor authentication.  Once you enter the username and password a one time code is sent by SMS which completes the login process. With each passing day hackers are developing new ways to crack the SMS texts. SMS based authentication is highly insecure […]

Read more

Email Scams

Email Scams|phishing email

Email Scams have shown a sharp rise in India. According to the Hindustan Times report, India is among the top 5 growing markets for Nigerian scams. The Nigerian scams offer you large sums of money and ask for a small fee in return or ask your bank account details so that they can transfer you […]

Read more

A New Angle to VPN Security

A New Angle to VPN Security

What is VPN? The benefits of VPN range at a wide array the major ones including providing a secure network and remote access. VPN forms a secure connection between you and your resources. It is preferred that VPN is used over a public network such as WiFi. No network must be considered completely secure as […]

Read more

Two-Factor Authentication is the Only Solution to Vulnerable Public Wi-Fi Hotspots

Two-factor authentication|wi-fi|

In the last decade Internet has become an indispensable part of human life. There is barely any area/corner of human life left untouched by internet. Internet access is what we all seek, be it our work space or our home. A stupendous amount of money is spent on Internet packs. In the wake of all […]

Read more

Why SMS based OTP Becoming Thing of The Past?

Why SMS based OTP becoming thing of the past?

Two factor authentication has become very popular and for it to work effectively a temporary code needs to be generated on the mobile device in addition to the password. It has been observed since past few months that SMS based OTPs prove to be the weakest link. For example, earlier this month an activist DeRay […]

Read more

Increasing Cyber Threats on Mobile Phones

Increasing Cyber Threats on Mobile Phones

Mobile Phones have become the essential part of our daily life. Usually people check their mobiles many a times in a single day. To say the least, not a single hour passes without checking your mobile phone. From calls to shopping all are done on mobile phones. People use mobile phones for the smallest of […]

Read more

Cyber Security Expectations in 2016

Cyber Security expectations in 2016

As Cyber Security is evolving rapidly you can expect an array of things to happen in 2016. It is said that investment in security and privacy is expected to increase in 2016. Let us have a look at some of the factors that you might expect in 2016. Awareness The cyber security education and awareness […]

Read more

SMARTPHONE SECURITY 2020

auth (14)

Smartphone technology is changing rapidly; by 2020 smartphones are set to hit the market with a boom. According to a research carried out by Ericsson, the number of smartphone users in the world is expected to reach 6.1 billion by 2020. There is an enormous difference in number from 2.6 billion smartphone users in 2014 […]

Read more

A New Dimension to Cyber Security in 2016

A New Dimension to Cyber Security in 2016

2015 has been a year where we have seen so many of big breaches, that everyone is well aware the damage caused by cyber-attacks. So you might be wondering what’s in store for 2016? Well, with the continuation of growth in mobile malware, the breaches have been increasing and specifically in domains such as financial […]

Read more

Passwords Are Soon to Be Passe, Two-factor Authentication is Going to Be In

Passwords are soon to be Passe, Two-factor authentication is going to be in.

Passwords have been the most common form of authentication since the inception of computers. And they have continued to be so till today. People usually tend to forget their passwords easily, they have difficulty remembering them. Consequently, people set easy passwords and often re-use them for a number of accounts. The use of special characters […]

Read more

Need of Multi-factor Authentication in Education Industry

Need of Multi-factor Authentication in Education Industry

One of the largest portion of Internet users is comprised of students, teachers and various educational institutions. Students require to access internet at regular intervals, they are one of the most frequent users. Universities are one of the significant users of internet and computer based system. All this calls for a secure system where the […]

Read more

Multi Factor Authentication: The Emerging Trend in Cyber Security Domain

Multi Factor Authentication

The last decade has seen some serious rise in the amount of cyber crime. With all the technological advancement and digitization of personal data a need for better security system is called for. Cyber criminals too have become technologically advanced. They find cracks in the security systems easily and take advantage of it. A single […]

Read more

Cyber Crime- the Biggest Challenge to Business

Cyber Crime- the biggest challenge to Business

Over the last decade there has been a revolution in the use of internet. And every business, no matter how big or small, which deals with internet, runs through a potential danger of falling prey to cyber crime. India is as prone to these threats as any other country. From 2005 to 2014 cyber crimes […]

Read more

Biometrics in Healthcare Industry

Biometrics in Healthcare Industry

The number of mistakes or errors is increasing a lot these days in healthcare industry. Records get mixed up, medical reports are confused with patients or even wrong medicines are given to wrong patients. Thus, there is a severe need of biometrics to be included in doctor’s offices, to monitor patients or in hospitals. The […]

Read more

Cyber Security Mandate in India- Prime Need of Today

Need for Security Mandate

Need for Security Mandate With the rise in cyber-crime and terrorism it has also been seen that India ranks 6th with the highest number of cyber crime cases as per the recent statistics. In a recent case, at Bangladesh, a Central Bank was exposed by hackers as the network was highly vulnerable. Second hand cheap […]

Read more

Multifactor Authentication- New Age Authentication Mechanism

Multi Factor Authentication

Why do we need Multi factor authentication? As password breaches continue to happen with an alarming rate, the need to improve authentication practices has reached criticality. The release of PCI DSS 3.2 on April 28, includes Multi factor authentication as a compulsory requirement for administrative and personnel access into environments handling card data. The need […]

Read more

Increasing Cyber Threats Pose Challenge For BFSI Sector

Cyber Threats for BFSI Sector

The world has greatly changed over the past few years, particularly with BFSI sector. Its processes – from retail transaction to market operation – all have been changed by technologies and they continue to evolve. However, there is a real possibility that the sector’s digital dependence can have material impact for individual institution and even […]

Read more

EMAIL HACKING

auth (11)

Email hacking is an illegal process to access or manipulate and email account or any email correspondence. There are many ways in which hackers can attack an email such as spam, virus or phishing. In a recent case, login details of over 272 million Gmail, Hotmail and Yahoo accounts were being traded by Russian Hackers. […]

Read more

Small Businesses- A target for Cyber Crime

auth (14)

Why criminals pick on small businesses? Small businesses are targeted by cybercriminals because the automation makes it easier to attack. Many times a question arises that does the size of the business matter?  Well, according to Jody Westby, CEO of Global Cyber Risk says that data is what matters and not the size. Also, small […]

Read more

India lucrative Hub For Cyber-Attacks

auth (13)

India is a hub for large scale technology projects such as Digital India, Aadhaar, etc. However, this technology has given rise to cyber law, cyber security and techno legal issues in India. For example, according to reports in 2015, data breaches have continued to affect government organizations with the largest being 195 million records being […]

Read more

Insider Threats and Ways to Prevent Them

Insider Threats and Ways to Prevent Them

A very serious threat to any organization, the Insider threat is caused by the people from within the organization. These are the people who have information about the company’s resources from the inside and choose to use it against the very organization that they work for. The threats that fall under this category include fraudulent […]

Read more

IOT- THE NEXT BIG THING

IOT

What is IOT? IOT is a topic which has been increasingly gaining importance today. Basically it means that various physical devices connected to the internet and identify themselves to other devices. It has a huge impact on the way we live our lives today for example, the coffee pot starts brewing your coffee the moment […]

Read more

India- Top Vulnerable Country in Cyber Crime

Where does India stand in Cybercrime? India has been rated as the top most vulnerable country after China and Russia by the Hindustan Times. Cybercrime is a biggest issue these days with the rise in technology across the globe. India is more vulnerable to cyber-attacks as proper cyber security skills are not in place.An expert […]

Read more

Cloud Hosting- A Boon for the IT Industry

cloud hosting

Do you know what is cloud hosting and how it works? Cloud hosting provides a new functionality for businesses to host their applications which they use on a daily basis. Reports say that 82% of the companies saved money by moving to cloud. It provides ease of use and convenience as businesses can coordinate and […]

Read more

5 Ways to Protect Business from Data Breach

data breach

Businesses contain personal information about customers, employees and others. This information attracts hackers and has caused massive data breaches across the globe. Not only the big businesses but also the small and medium scaled ones are targeted by hackers. Various measures can be taken to protect against these cyber intrusions. The most notable breach is […]

Read more

Multi-Factor Authentication (MFA)

Multi-Factor Authentication

Let us consider a scenario where user X performs a login on a website to perform a transaction at a publicly accessible computer and leaves the place, few days later he receives a notification on his smartphone for approval of a transaction, which he has not made at all. This means that someone else was […]

Read more

Identity Theft- Issues and how to curb it!

Identity Theft

Identity Theft is an activity in which one uses somebody else’s identity for an ulterior motive. This usually includes financial gains or to get credit in the name of someone else and cause huge loss. These activities are caused by using someone else’s personal information, like financial details and such to commit fraud. Such activities […]

Read more

Information Security in 2016

Information Security

Do you know how information security trend is derived? Information security trends are usually derived by studying the patterns of known security incidents as reported by companies and others. It mainly includes data breaches and identity thefts. Unless these data breaches are reported it would be difficult to find out the vulnerabilities and attacks which […]

Read more

Data Breaches- Net Global Losses 2015

Data Breaches

Cyber-crime industry is growing at a fast pace and so are the losses associated to it. The estimate of the losses would be $375 billion and the maximum as $575 billion. These figures are substantially more than the national income of many countries and governments and companies. These organizations have underestimated the risk associated with […]

Read more

Social Engineering: Your Biggest Security Threat

Social Engineering

Social Engineering is a buzz word these days. Do you know how it works? Social engineering is a technique to get hold of a system not by exploiting the vulnerabilities of the system but by exploiting the vulnerabilities of humans around that system. Reports say that phishers target Financial Services the most which accounts for […]

Read more

Tyupkin: Next Gen ATM Attacks

Atm Attack

Do you know what ATM threat is? ATM threats are basically ATM malware attacks caused by a malware called as ‘Tyupkin’. According to reports Russia, US and India are the top 3 countries where the Tyupkin is affecting ATM machines. In general, these types of attacks are carried out by cyber criminals to empty cash […]

Read more

Phishing Attacks: Maximum Contribution to Cyber-Crime Today

Phising Attackers

DO YOU KNOW WHAT PHISHING IS?? Phishing can be in many forms. Have you thought why there is an increase in the number of spam or fake emails every day? These emails pretend to be appearing from legitimate organizations but the fact is, they are not! Such emails request you to give confirmation of your […]

Read more

Cloud Security

Cloud Infrastructure

The running trend these days is that company’s resources are accessed through various devices such as smartphones, tablets and on the move devices. As highly sensitive information can be stored on cloud, high security measures are required for the same. Cloud provides high rate of data availability and the convenience of using it anytime and […]

Read more

Secure In-House Developed Application Using Two-Factor Authentication

2FA

Have you implemented Two-Factor Authentication in your organization? Do you know the benefits of two factor authentication for applications used within your organization? Large multinational organizations generally develop applications for their own use, for the tasks they need to perform regularly such as for ERP, file or document management, content management system or ticket management. […]

Read more

Hard Token Authentication Solution

Hard Token Auth-shield

Today the corporate world is working in an environment which requires combination of mobile devices and rising threats along with new considerations of access control. To support this need Auth Shield has come up with its useful device tagged as Hard Token Authentication Solution. This device in fact is one of the most trusted ways […]

Read more

ECOMMERCE SECURITY: A QUESTION OF TRUST

auth-shield-ecommerce(1)

Do you know what exactly ecommerce is? Do you know what security issues are faced by ecommerce today? Read below to know.. E-commerce industry is rapidly growing in India due to the penetration of internet and smart gadgets. Ecommerce is not only limited to shopping of goods but also includes electronic funds transfer, internet marketing, […]

Read more

Do you think there is need of Two Factor Authentication (2FA) in Healthcare?

2FA

Well, the answer is Yes. The patient’s information is a critical component and cannot be secured 100% as the information is circulated to various departments during the process of improving patient’s health. The threats to the security of health information of patients are increasing rapidly and right measures must be taken to protect Protected Health […]

Read more

Tips for Using Multi factor Authentication technology

Multi Factor Authentication

Let us consider a scenario where user Xperforms a login on a website to perform a transaction at a publicly accessible computer and leaves the place, few days later he receives a notification on his smartphone for approval of a transaction, which he has not made at all. This means that someone else was trying […]

Read more

Corporate Email Security with Two Factor Authentication

Corporate Email Security with Two Factor Authentication

E-mail is a critical business application for your company. Businesses depend on e-mail to exchange sensitive information like private employee or customer account numbers, confidential negotiations, and proprietary materials. You heavily rely on Corporate e-mail, but how secure do you think, it really is? The fact is, despite securing the servers on which e-mails are […]

Read more

Preventing Cyber Attacks With Two Factor Authentication

Preventing Cyber Attacks With 2FA

A Deloitte survey of CFOs in Canada, USA, and Mexico found that cyber-security is a top priority for 74% of respondents. Costly cyber-attacks are frequent across industries, today; therefore cyber-security is the primary focus of the businesses and customers worldwide.How To Deal With Cyber Crime And Threats Cyber-attacks occur at 7 commonly occurring points, namely; […]

Read more

Need of 2 Factor Authentication (2 FA) in Banking and Finance

Banking and finance

Internet being the fastest mode of banking today, ebanking has high demand for obvious reasons. The ebanking industry is struggling from the past 10 years since its inception. They are striving to draw a line between making the system fast and easy at the same time robust to prevent from the phishing attacks. Ebanking also […]

Read more

How Can Your Protect Your Corporate Email

How Can Your Protect Your Corporate Email

Innovation is the key and at some point, everyone has to agree with that. One of the places where innovation is at the peak is technology. And there is no doubt about it. But with every innovation that happens in the right direction, there is another one that kicks off all the wrong activities that […]

Read more

How To Deal With Cyber Crime And Threats

How To Deal With Cyber Crime And Threats

One of the most rampant areas which has gained popularity over the recent decade is the Internet. But, with the Web came the added cybercrime which has become an inevitable part of this technology. This has not stopped officials in charge of security of a company from taking the requisite steps and ensuring that their […]

Read more

CHANGING DYNAMICS IN SAP SECURITY

CHANGING DYNAMICS IN SAP SECURITY

Industry is noticing a rising shift among corporations from the older system such as SAP Netweaver ABAP and SAP Netweaver Java to application based on SAP Hana and SAP Hana Mobile platform. According to a recent survey released by Business Insider closer to 6400 companies worldwide mainly in Manufacturing, finance, IT, Utilities and retail have […]

Read more

EMAIL BECOMING MORE VULNERABLE?

EMAIL BECOMING MORE VULNERABLE

RIGHT TIME TO TAKESTEPS TOWARDS USER SECURITY-the right strategy for better email security The measurement of robustness of email infrastructure in a business environment lies in its ability to not only handle data smartly and but also lies in its capability in securing the data stored and transferred across networks Globally the volume of data […]

Read more

CHANGING DYNAMICS OF EMAIL SECURITY

email

Surprisingly the email security solutions have re-emerged in its new AVATAR from the ashes of phoenix of late 1990s again. Till early 1980 to 1990s the space was over occupied by email firewalls which were the central to the control and management of email services that operated in corporate network. In today’s world the challenges […]

Read more

Time To Secure Gmail Account With Two-Step Authentication

Gmail users mainly have long password, and it is quite difficult to guess it. However, the computers are even protected from the hazardous attacks of key loggers and malware, who are waiting to hack your Gmail account. Even though, this protection is mandatory, but how about looking for some more protected platform? Well, two codes […]

Read more

RBI’s Call On Credit Card Online Payment Is A Life Changing Procedure

In order to solve the cumbersome procedure of TFA for the e-commerce platform,RBI’s call on credit card online payment can always offers a promising result. It offers a simpler option, to it. According to the latest news feed from Reserve Bank spokesperson, there is indeed a much important need for creating collaboration between the e-commerce […]

Read more

Twist in the Hacking, Email IDs compromised

Mobile Authentication

A major target of most of the hacking attacks today is to steal the credentials of the user thereby breaking the single factor authentication in vogue. The target could be to steal the login credentials of multiple users to log into mail IDs, Web Applications, VPN accounts, Database passwords etc. Strong authentication is the first […]

Read more

CORPORATE EMAIL ACCOUNTS — The next challenge of Information Security

Tarun Wig
CEO-Authshield Labs ,India, An Information Security Evangelist writing new rules in the space of two factor authentication technology.

Read more

Authshield Sponsored the CSI-2014 Conference in Hyderabad

Always supporting the causes related to cyber and information security, Authshield sponsored the CSI-2014, the annual conference which took place from 12th to 14th December, in JNTU,

Read more

22 Indian Portals Breached by Pakistani Hackers

Hacking of government organization websites have once again raised questions about the absence of vigorous cyber security and emphasize the significance of 2FA.

Read more

USB Security Token – A Proven Security Solution For Safeguarding Crucial Information

According to a survey, the biggest fear for Americans is their credit card and financial information being hacked. Learn how 2FA can help fight this hacking fear.

Read more

Latest Victim of Phishing Attack – Hyderabad Girl Robbed of 45K

The latest phishing case in which a Hyderabad techie was duped of 45K highlights the need for everyone to take online security seriously.

Read more

Google Announces 2FA USB Security Key to Protect Accounts from Hackers

To ensure complete security to the users, Google has recently announced a physical USB security key that only works for the Chrome web browser to help people keep their accounts safe.

Read more

Tips to Combat the Poodle Attack

Google has revealed Poodle vulnerability in widely used SSL v 3.0 protocol which affects all implementations of SSL v 3.0 including VPN.

Read more

Gmail Account Hacked, Google Advises Two Factor Authentication

Hacking of five million user names and passwords of Google’s Gmail accounts reiterate the need to use two-factor authentication.

Read more

AuthShield Spots Latest Phishing Campaign Leveraging Google Drive, Targeting Corporates

AuthShield has spotted a latest phishing campaign leveraging Google Drive that is targeted at Indian corporate and MNC’s using Google apps to steal personal information of users.

Read more

iCloud Breach Drives Home Need For Two Factor Authentication

The iCloud breach that allowed hackers to sneak into private photos of celebrities and put them out in the public has again driven home the need for stringent and proven security measures, tools and technology to protect personal information and data.

Read more

AuthShield Teams up with MIS Software to Provide Online Security Services in Nigeria

Authshield has added another cap to its illustrious range of services. Authshield has now joined hands with the MIS Software Nigeria Limited to provide sophisticated two factor authentication solutions and forayed its way into the African Market.

Read more

Hackers used Heartbleed Bug for Hacking Community Health Systems Data

Heartbleed bug has taken its latest casualty of cyber attack on a large-scale. Hackers intruded into the system and stole confidential information of around 4.5 million patients of the hospital group – Community Health Systems Inc.

Read more

PayPal Breach Makes Hack Proof One Touch Authentication Need Of The Hour

Organisations have moved onto newer and hack-proof security measures such as One Touch Authentication, which is a completely hack-proof 2FA mechanism since it does not have seeds as a base and cannot be broken.

Read more

Online Shopping is Growing And So is the Fear of Online Fraud

Two Factor Authentication

Online shopping is increasing in all over Asia including India. A growing number of Internet users are buying from online retailers.

Read more

Authshield Two factor Authentication at International Police Expo 2014

Authshield participated in the one of a kind exhibition – the International Police Expo 2014 that showcased a wide range of modern equipments and technologies.

Read more

Cyber Threats In 21st Century – CIO Event On 11th July

Considering the growing menace of cyber crime, Innefu, in collaboration with Infosec Consortium is organizing Cyber Threats In 21st Century, a CIO event on 11th July, 2014.

Read more

10 Tips to Protect your Online Accounts & Information during FIFA Fever

During FIFA World cup, the links or e-mails with the title that says “Click here and get the ticket to the upcoming match!” or “Log in your details and get the chance to meet your favorite soccer player’ are common. Do NOT fall into this trap and cheap tactics. You are not going to get any ticket to Sao Paulo, Brazil. Rather you will be inviting phishing menace to your system.

Read more

Phishing On The Rise, Beware Of Fake Notifications During FIFA World Cup

Lethal phishing attacks on Brazil’s Foreign Ministry computer networks and open threats to breach World Cup sponsors’ websites have again brought to the fore the vulnerability of confidential and classified information databases. This article lists the things you must remember to protect your personal data when you receive potentially malicious notifications.

Read more

6 Tips to Protect Your Digital Information from Hackers

The online threats and security breaches posed by hackers is on the rise like never before. If you have been one of those who have been sleepwalking through maintaining your online identity and digital information, you need to wake up and get set to take every measure to protect your digital information from hackers.

Read more

Finally Bitly Adopted 2FA After Suffering Security Breach

Two factor authentication is based on something that user knows i.e. login password and something he physically possesses such as mobile, USBs, or some other device.

Read more

eBay Database Compromised; Asked Customers to Change Passwords

Unknowingly, everyone tends to commit mistakes. There are chances you share your passwords with somebody or a cyber criminal hacks it with his technical expertise. In order to deal with this vulnerability, adopt two factor authentication (2FA). 2FA is based on something a user knows and something he possesses in physical.

Read more

AIIMS Doctor Loses Rs. 30,000 to Phishing Attack

From individuals to SMEs to big corporate companies, cyber criminals are sparing none. They carry out research and choose their targets that are vulnerable to cyber attacks. A case of this kind has recently been come to light in the capital city of India. Dr. Ajit Kumar, a doctor at AIIMS, has filed an FIR […]

Read more

Yahoo Mail Servers Hacked, Change Passwords ASAP!

The one I am highlighting today is the recent breach of Yahoo’s Yahoo Mail servers compromising the usernames and passwords of millions of Yahoo users.

Read more

Election Commission Breaks Tie-Up with Google

With One Click Authentication, users needn’t to generate and pass his One Time Password at any point. Two Factor Authentication is implemented by mapping the user’s identity to his Smartphone.

Read more

Google-EC Collaboration: A Threat to National Security

Google-EC-Collaboration

In the wake of recent disclosures by Edward Snowden, such a decision will pose a serious security risk to India as the data that Election Commission will be providing to Google may be misused by Google and American agencies for cyber espionage and other surveillance operations by United States.

Read more

Potential Cyber Threats for 2015

Cyber-Threats-2014

As the McAfee report states, “while many cybercriminal syndicates will turn their attention to mobile devices, others will continue to target PC and server platforms. The new attacks we’ll see in 2014 will, however, not simply attack the operating system, but will also exploit vulnerabilities both above and below the OS.”

Read more

RSA Creates a Back Door in Encryption for NSA, Gets $10 Million

With RSA products security and integrity under question, the entire validation for Two Factor Authentication stands compromised and there is no guarantee that the data will not be available to an agency outside the country.

Read more

11.7 Million Attacks on Gamers in 2013; 207,245 Victims in India

Gamers-Hacked

Choose strong and unique passwords across your gaming accounts as most of attacks are caused due to weak passwords. Never share your passwords, even with your friends.

Read more

AuthShield One click Authentication: Death of OTP?

AuthShield Labs recently announced India’s first One Click Authentication for its client base using smart phones. One click Authentication is the latest Two Factor Authentication framework to come out of Innefu’s R&D labs.

Read more

2FA Prevents Illegal Hacking Attacks

Trustwave-SpiderLabs

The latest revelation from Trustwave SpiderLabs has come as a shocker to web users. After identifying a large instance of Pony botnet controller (Pony 1.9) containing millions of stolen credentials and other goodies in huge numbers in June this year, the organization has come across another instance of Pony 1.9. For those who are not […]

Read more

Prevent Identity Theft with 2F Authentication

EMail-hacked

It is important to be careful accessing or replying to the emails. This phishing incident is a perfect example of web users’ ignorance towards cyber security.

Read more

SMBs Fail to Take Cyber Security Seriously, a Ponemon Research

SMS-Blog

As per the Ponemon’s survey, 58 percent of respondents think that their management does not consider cyber attacks a significant threat to their business information.

Read more

Microsoft Establishes New Cybercrime Center to Curb Cybercrime

Cybercrime-300x199

The Windows maker has created a new Cybercrime center where they have combined the expertise of security engineers, digital forensics experts and lawyers to combat hacker attacks and software pirates.

Read more

Features and Utility of Soft Token 2FA Systems

Two-factor authentication or 2FA as we know is the authentication technique that mandates the presentation of two authentication factors for the user to get access to a system, database or information. The two factors are: 1.Something that the user knows (password, PIN, or pattern) 2. Something that the user possesses (software, mobile phone, USB, smart […]

Read more

India Losses $4 billion to Cybercrime in 2013, Reported Symantec

graph

It seems from latest Norton Report that Cyber crime is causing some real damage to Indian Economy. The 2013 Norton Report reports around 8% increase in the average cost per cybercrime victim in India during August 2012 to July 2013 over the same period last year. This year, the average cost per cybercrime increased to […]

Read more

INNEFU Gets DRDO Empanelment

INNEFU Labs Pvt. Ltd. – one of India’s leading Information Security R&D Organization – is happy and proud to announce that we are now empanelled with Defence Research & Development Organisation (DRDO) DRDO comes under the Department of Defence Research and Development of Ministry of Defence and is responsible for the development of technology, to […]

Read more

Ground Zero Summit (G0S) 2013 – Asia’s Foremost Information Security Conference

G0s

The year 2013 has in fact been dubbed ‘the year of the hack.’ Emergent technologies like mobility, big data, cloud, social media and virtualization have thrown open a veritable pandora’s box in terms of new threats. Enterprises and governments worldwide are grappling with the grim reality of data and critical systems being exploited, and privacy […]

Read more

Twitter Updated Its Two Factor Authentication for Android and iOS

Following a wave of criticism for its inefficient two factor authentication that fails to provide complete security to user accounts, Twitter has come up with an improvement to its existing 2FA security gateway. The important thing is; Twitter does believe that information security solutions including 2 factor authentication is a process rather than a result, […]

Read more

Securing SAP ERP with Two Factor Authentication

archetecture

SAP, an acronym for Systems, Applications and Products is a German software company and one of the world’s largest ERP solution providers. SAP ERP is used across thousands of different industries all over the planet. 70% of the companies on the Forbes 500 list run on an ERP that is provided by SAP. The ERP […]

Read more

Protect your Facebook Account with Two Factor Authentication

f3

Two factor authentication is making headlines almost everyday! Microsoft used this security system to secure its users’ accounts. Twitter followed suit. Facebook, LinkedIn too are some of the top companies which have employed 2 factor authentication to secure member accounts and keep hackers at bay. Hackers are everywhere, looking for an opportunity to strike at […]

Read more

Secure your email account with AuthShield Two Factor Authentication

email-security1

Employee email accounts are a necessary part of an organisation’s communication and operational processes. These accounts contain vast information ranging from personal to professional mails. Confidential communication including operational details, business transactions, financial documents and other such information is often done through e-mails. Imagine a scenario, where an employee’ e-mail account is compromised and a […]

Read more

Users Willing To Ensure Higher Security With Two Factor Authentication

id-theft1

“You have to help me out.. My life will be destroyed.. Please save me” These were the first words out of a CEO of a Gurgaon Corporate when he met us for the first time in our office. He was accompanied by an officer from a Law Enforcement Agency we had worked with in the […]

Read more

Hackers Hit Government Again: Second Time in 4 Months

cyber-war-crime-300x222

Another Information Security Breach! Hackers attacked Govt. establishment! AGAIN! And what has come as a surprise and scare at the same time, is the fact that it is the second time in past 4 months hackers have invaded the information system of the Indian government. While Indian cyber security agencies were still in the process […]

Read more

9 Easy Steps to Activate Two Factor Authentication for Google Account

2fact1

They are smart. They are technologically advanced. They possess all the necessary skill, expertise and technology to break into even the most secured databases. They may be some high school pass outs or masterminds of a terrorist organization but they are around and strong and are ready to invade your privacy…they are the hackers and […]

Read more

3 Unbeatable Benefits of Two Factor Authentication

A sophisticated two factor authentication system is not just important but extremely vital for the smooth functioning of any organization that needs to secure its data. Banks, e-commerce websites, or for that matter any website or portal that allows B2B, B2C transactions or transfer of confidential information need a proven data security mechanism since they […]

Read more

Two-Factor Authentication – Latest Buzz in Information Security

thumb_img1.php

“If you were a hacker, will you try and beat the perimeter security of an organization or target the user base that may not be security conscious.” Anyone who has some sensitive or important data saved in his web-connected computer or internet-accessible mobile is prone to hacking or predating. The hackers decode your computer security […]

Read more