Securing virtual servers

Every organization is going for virtualization. The main reason being cost cutting and to ensure maximum utilization of hardware resources. Virtualization has revolutionized the data centre and is one of the key foundational technologies underlying cloud computing. This has made Several companies rushing frantically into deploying virtualization solutions both in their private and public clouds, without taking into account the risks involved.  But when organizations are going virtualization, the technology has got its own inherent vulnerabilities.

Continue reading Securing virtual servers


Man in the Browser

Cyber crooks use this attack method to capture confidential information (password, security codes, credit card numbers etc.) that they can use to their advantage. And the online banking sector is specifically targeted.


“While browsing around, you may come across a malicious site that may convince you to download some freeware. But what you don’t know is that along with the free stuff you can also download a virus or a malware” (2013).

It “infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host web application.”, (2013) Continue reading Man in the Browser

Malware Threats Rise for Mobile Banking

mobile malwareLast year alone on Google’s mobile Android platform, Trend Micro detected 350,000 “malicious and high-risk” Android app samples, according to a report by the digital security firm. That’s an increase from the 1,000 samples it saw the previous year. Only 20% of Android device owners use a security app, the company has found. [] Continue reading Malware Threats Rise for Mobile Banking

Can you track a ‘Turned off’ Cellphone?

cyber crime has been hitting the headlines of late. Michaels snowden, the run away NSA agent holed up in Russia has given us a glimpse of the whole new world that we never imagined.  For sure i can now conclude that;

“If you did not invent the technology, you never know the devil inside it”, by Kimson Kimathi.

Why do i say this? Well, it is true ” the National Security Agency has had the ability to track cell phones, even when they’re turned off” (,Mathew J. Schwartz | July 25, 2013 09:06 AM).

“This tracking ability was revealed on July 20 by The Washington Post, in an article chronicling the evolution of the NSA’s signals intelligence work in the wake of the Sept. 11 attacks, when intelligence agencies, the military and the FBI created an “insatiable demand for its work product.” Continue reading Can you track a ‘Turned off’ Cellphone?

The new banking trojan ‘KINS’

According to Security magazine, there is a new banking Trojan being sold in the cyber-crime underground and could be poised to infect new victims as quickly and effectively as its Zeus, SpyEye and Citadel predecessors”( the malware is called KINS, the developer is “selling it for $5,000” (, July 24, 2013).

Banking trojan KINS
Banking trojan KINS

Continue reading The new banking trojan ‘KINS’