Three experts on cyber security, digital forensics, networks and hardware were roped in by the Supreme Court on Wednesday to "enquire, investigate and determine" whether Pegasus spyware was used for snooping on citizens and their probe would be monitored by former apex court judge R V Raveendran.
McAfee Q1 threats report also reveals that in the first quarter of 2011, spam remained at its lowest levels since 2007.
The growth in smartphones and devices has fuelled surge in malicious applications, which grew globally by over 600 per cent to 2.76 lakh in the one year.
The government believes heightened awareness among its staff could be the only effective way to counter attempts of foreign agencies.
There is a secured system to tackle cyber attacks and there is a segregation of nuclear generation from the administrative segment, There is a secured system to tackle cyber attacks and there is a segregation of nuclear generation from the administrative segment, he said.
Get your lowdown on what's going on in the world of Hollywood, right here!
The findings are an early step in understanding security vulnerabilities of wearable devices
A search for "Sonakshi Sinha + Torrent" resulted in a 21 per cent chance of connecting to a malicious website
Web security company McAfee has released a list of 'most dangerous' celebrities to search for online -- we bring you the top 10.
According to the report, there are 42 million cyber crime victims every year on a pan-India basis. During the last year, 52 per cent of such victims had suffered attacks such as malware, viruses, hacking, scams, fraud and theft.
For a little over two weeks, a group called 'Guardians of Peace' released a new bit of leaked information about Sony almost every day.
How not to get trapped and hacked while accessing Internet via public Wi-Fi networks
Simple tips to secure your e-mails and important documents from internet hackers.
Future conflict will involve bypassing of frontiers to strike at critical vulnerabilities directly and in the hinterland at the appropriate time, explains Lieutenant General Anil Chait (retd), who served as chief of the Integrated Defence Staff and Central Army Commander.
By relating their mails with widely-celebrated holidays and current events of global interest, spammers and malware authors can make their messages seem interesting, thus increasing the chances of recipients falling for these, said the Symantec Intelligence Report, January 2012.
Symantec's latest Internet Security Threat Report XVI reveals that a majority of malware samples observed in India spread through removable drives.
The US-based firm said a small number of its machines were affected, but added there was 'no evidence' of data theft.
Digital extortion, in which hackers lock out all your data and seek ransom, is a real threat today, says Veenu Sandhu.
There exist numerous ways to pace up your download speed. Here are four easiest ones.
Early next week, the Federal Bureau of Investigation will shut down servers associated with the DNS Changer malware.
AP Moller-Maersk, one of the affected entities globally, operates the Gateway Terminals India at JNPT.
'The hackers' objectives were centred around smearing India's reputation, causing productivity loss, creating operational damage and seeking financial gains.'
Threat of computer viruses is increasing everyday.
Deputy US Attorney General Jeffrey Rosen on Wednesday announced that three indictments have been unsealed in the matter that collectively charge five Chinese nationals with computer hacking and charge two Malaysian nationals with helping some of those hackers target victims and sell the fruits of their crime.
Online stalking, spams, phishing attacks and illegal content including pornography are the various tools used by cybercrooks and parents need to exercise extra caution to protect children, they say.
Emma Stone features at Number 10. Check out who make it to the top spot.
Report shows Internet viruses remain a problem.
Called Stuxnet, the worm was first discovered in mid-June and was specially written to attack Siemens supervisory control and data systems commonly used to control and monitor industrial facilities -- from traffic lights and oil rigs to power and nuclear plants, the state-run Global Times daily reported quoting experts.
Here is a sneak preview of some of the biggest trends we'll witness in the tech world this year.
Promising swift action on the debit card data compromise issue, Economic Affairs Secretary Shaktikanta Das on Friday said there was no need to panic over the feared security breach that affected over 32 lakh cards.
Many servers that host government websites are plagued by various problems like obsolete software and poor secure coding, making them vulnerable to cyber attacks, a study has said.
The deadly virus has been identified as 'AndroidSmssend' and it can acquire as many as four aliases to hoodwink the user and perpetrate its destructive activities on a personal Android enabled phone.
An Indian-origin man, along with two others, has been indicted here on charges that they duped internet users in more than 60 countries into buying fake software products of more than $100 million.
IIMs issue answers to the most frequently asked questions candidates have regarding CAT 2009.
Install a security software that has an app advisor function, advises Tinesh Bhasin.
The IT ministry sources said they have received a reply from WhatsApp and are studying it, and that a view on it will be taken soon.
Shishir Nagaraja, currently associated with the Information Trust Institute of the University of Illinois (US), tells rediff.com, not only about the Google episode, but also his experience with the Office of the Dalai Lama in Dharamsala and the world of hackers, in general.
The government on Thursday said it has asked state-owned telecom firm BSNL to conduct security audit of its network amid security concerns raised over equipment supplied by Chinese vendor Huawei, Parliament was informed.
Security analysts say they have already seen all of the major online threats - Trojan horses, viruses, worms - spreading on smartphones, often through email attachments sent to the phones.
SEO poisoning is a technique used by malware authors to mix rogue search results with legitimate ones. This attack, coupled with news items that are of interest to users, is a lethal combination.