Call Us: (+91)-22-41024545 - Mail: sales@logix.in
.
sl11
banner1
logixzimbra-13
hybrid-banner_7
sl21

Who are we

We are a leading SOC 2 & ISO 9001:2015 Compliant Technology Service Provider with a PAN India presence, providing solutions to over 1800 Enterprise Customers. Having been a pioneer in the cloud services for over a decade, we have our private cloud infrastructure hosted in Three Tier 3 IDC setups, one in Mumbai, Pune & Bangalore each.

What We do

We have developed our Core Competencies in Provisioning & Configuration, Migration, Handholding, Support & Post-Sales Support of all the Products & Services of our Partner & OEMs. Our Development Team has expertise in Developing Document Sharing System ( DMS ) on Sharepoint & the very in-demand latest offering of Microsoft Power BI.

Our Core Strength

We are a Support centric Organization, providing 24*7 Support to all our valuable Customers on phone, email or through our Online Ticketing site. Our top agenda at Logix has always been providing dedicated and unmatched Support to all our Customers round the clock.

Logix Blog

16Aug

Cyber criminals siphoned Rs 94 crore off a co-operative bank in Pune

Cyber criminals stole over Rs 94 crore from a Pune headquartered Cosmos Bank. The money was allegedly transferred to accounts outside India. The server hosted at Pune had been attacked on August 11 and 13 exploiting banks ATM switch vulnerability. Banks management filed an FIR for it on Tuesday, August 13 at 1 am at Chatushrungi police station.A senior cyber security office from Pune has said that the money trail lead them to an account of ALM Trading at Hang Seng from Hong Kong. According to...Read More →
20Jul

Are your website images secured?

Malware can enter your machine through corrupted images on any website. Malware is stored in Exchangeable Image File Format (EXIF) data. Recently instances have occurred where in hackers are hiding malware in the images and uploading such images to the Googles official CDN (Content Delivery Network) googleusercontent.com.How malware is embedded in an image?In the image data, EXIF headers are automatically generated by camera to store camera information in JPEG and TIFF files. Hackers exploit...Read More →
17Jul

Why you must switch to HTTPS right now?

It is high time to switch to HTTPS. The most important question lingering here is Why to move to HTTPS? To understand why, first we need to understand what is HTTPS? TheHypertext Transfer Protocol(HTTP)is anapplication protocolfor communication over distributed, collaborative, andhypermediainformation systems.HTTPS(HTTP Secure)is an adaptation of theHypertext Transfer Protocol(HTTP) forsecure communicationover acomputer network, and is widely used on theInternet.In HTTPS, thecommunication...Read More →
14Jul

Avoiding the rising DNS Binding Attacks for the smart devices

What is a DNS Rebinding Attack?DNS Rebinding Attacks are where the attacker tricks the user into binding with malicious websites and then making the user browser or device access unintended domains. Such attacks are normally used to compromise the system and exploit it as proxy for attacking the internal network.How DNS Rebinding Attacks work?The attacker registers a domain (such as attacker.com) and delegates it to aDNSserver under the attacker's control. The server is configured to respond...Read More →
12Jul

FelixRoot Backdoor Malware Resurfaced in a recent Campaign

Felixroot Backdoor was first spotted in September 2017 in Ukraine spreading through pernicious banking documents with macros downloading the back door of C&C server. Felixroot Backdoor malware campaign has resurfaced using Microsft Office vulnerabilities CVE-2017-0199andCVE-2017-11882 to compromise the victims windows computers.It is being distributed by the file name Seminal.rtf claiming to provide information on a seminar on environment protection efforts. Researchers reveal that these...Read More →


Back to Top
Enter your Infotext or Widgets here...