Half a dozen stocks from the large-cap universe and over two dozen from the mid-cap universe have been replaced.
China is improving its capacity for operations in cyberspace and developing capabilities to use internet for offensive operations, the Pentagon has said.
Three burqa-clad Taliban terrorists stormed the training institute and opened indiscriminate fire, killing at least 12 people, half of them students, before being shot dead by security forces on Friday.
The Tehreek-i-Taliban Pakistan claimed responsibility for the attack.
Govt, telecom, defence sectors most attacked by cybercriminals
Rediff.com's Ashish Narsale presents a list of gadgets that will fit your budget and instantly impress your bae.
About 7.12 million Internet-capable smart phones were infected with malicious programs in 2011 and the number has been increasing rapidly.
Several people succumbed to their injuries sustained in the blasts, taking the death toll to 359.
Ambrish Sinha, CEO, MeritTrac Services, identifies 6 future-ready skills that a post-COVID-19 workplace will require.
To select the right platform, get the opinions of a few existing users or browse online for feedback. Select a platform that offers a seamless experience. Check that the platform you are going with is a regulated entity, suggests Sanjay Kumar Singh.
'Further delay will do nothing other than the loss of a year and when there is loss of a year, think of next year you are having two first year batches.' 'Have the IIT system or similar institutions got the infrastructure to handle such a situation?'
Danti is highly focused on diplomatic entities. It may already have full access to internal networks in Indian government organisations.
The notice came after reports that political parties had used the data analytics firm during elections.
The Satyam board said corporate governance, a clean record, management and organisational ability in operating a global company will be considered, apart from the financial bid and other technical criteria. The bidders will furnish an irrevocable and unconditional performance bank guarantee of Rs 100 crore to guarantee the deposit of funds required for the preferential allotment and the requisite escrow amounts for the public offer within four days of being selected.
According to security experts at Symantec, web users generally get lured by cyber criminals to download and install fake anti-virus software on to their machines, believing they're protecting their PCs from hackers.
In an interview with Peerzada Abrar and Romita Majumdar, Cisco CEO Chuck Robbins said that his company would continue to bet heavily on India's engineering talent pool.
Swarms of digital ants may soon crawl all over the Internet, scouting not for food, but computer worms and self-replicating programs designed to steal information or facilitate unauthorised use of machines. Security experts have successfully deployed a new type of network security software which mimics the habits of real-world ants.
A commission investigating Osama bin Laden's presence in Pakistan and the covert United States raid that killed him has asked the government to give it access to 1,87,000 documents, including diaries and letters, found at the slain Al Qaeda leader's compound in Abbottabad, Pakistan.
The Securities and Exchange Board of India (SEBI) will create a database of all participants in the bourses, a move that will help the regulator keep a watch on traders, investors and intermediaries operating in the market.
Some were heading back to their home and some to their relatives' place. Though there was a massive deployment of security personnel and authorities only allowed students with valid ID cards inside, these measures did not assuage the concerns of students over their safety.
What could Rasila Raju have done to protect herself?
Here are six ways your online account can be hacked into, and some simple yet effective ways to protect your Internet avatar.
'It would have been much more appropriate if a law such as this, which all of the civilised world has given up, was struck down through democratic politics rather than five individuals sitting in judgement,' says Aakar Patel.
Pointing out that other countries have used technology for security with great effect, he favoured work in the areas of surveillance systems, cryptography, real time search and identification from distributed large databases and computer simulation exercises to enhance crisis tactics and responses.
The tallying of VVPAT slips with the votes cast and stored in the EVMs will be done to demonstrate that the voting system has been working perfectly.
The Indian Air Force has asked its personnel and their families not to use Chinese 'Xiaomi Redmi 1s' phones, as it believes these phones could be transferring data to their servers in China and hence be a security risk.
The statement comes in the wake of two independent members of the NSC, P C Mohanan and J V Meenakshi, quitting the Commission over disagreements with the government on the back-series GDP data and delay in release of labour force survey. Mohanan was also the acting chairperson of the Commission.
Data shows at least 67 journalists were killed on the job in the past 25 years in the country.
The Supreme Court on Tuesday has allowed market regulator Sebi to begin interrogation of Satyam Computer founder B Ramalinga Raju and his brother Rama Raju in connection with the Rs 7,800-crore (Rs 78 billion) accounting fraud in the IT company.
A new 'malicious worm' has begun infecting computer systems and threatens to attack on the third day of every month beginning February 3, according to Micro Trend, an anti-virus and content security company.
Under the New Code on Wages Bill 2019, employers will be required to give the minimum wages, notified by either the state or the Centre, to the unorganised sector, too.
To be competitive, you need to focus on building products very rapidly, says Werner Vogels.
'Parents, grandparents, candidates, academicians -- almost all the stakeholders have a view on it, so any change is hard to bring about.'
A US Securities and Exchange Commission team is in India to probe the multi-crore rupee accounting fraud at NYSE-listed Satyam Computer and is taking the help of local agencies to this end.
Life insurance companies assert that the blockchain being created has strict protocols to leave no room for manipulation and exploitation, or unauthorised use of customer data and personal information.
'Not everybody gets the opportunity of having a working desk inside a helicopter from where you can control torpedoes and weapons.'
More than 100 countries are believed to be using the Internet for espionage, says McAfee, the information technology security company.
This is the last lot of payments that telcos will make towards deferred spectrum liabilities, as the Union Cabinet had late last year approved a two-year moratorium on such spectrum payment dues.
Did you know that India is among the top five countries in food processing?