Borrowers should be careful if the app promises too-quick disbursal, and doesn't provide adequate information on the terms of the loan, such as interest rate, repayment schedule, etc.
Will the latest development see a marked break from the way the case has been going?
Elon Musk's decision to drop the idea of acquiring Twitter over purported under-reporting of fake accounts due to the use of bots has opened a can of worms on what is a growing and crucial problem - advertisers who put in money based on these falsified numbers (which is the mainstay revenue of these platforms) are making losses; they are paying for bots in the guise of viewers. mFilterIt - a global digital and advertising (ad) fraud detection and protection company in India - says search engines like Google have the lowest average ad fraud rate of 10-12 per cent, based on the inference arrived at while working with clients that use these platforms. This means 10-12 per cent of the ad viewership is generated by machines.
'They (the ransomware attackers) are not after any VVIP data.' 'Had that been the case, they would have quietly installed a different malware.'
Avoid clicking on any unknown links from strangers. Use a different, secure password for each social media account you have.
The Orwellian surveillance State is here. And here to stay, asserts Virendra Kapoor.
The United States State Department said it is aware of these reports.
Cyber security sleuths have alerted Indian internet users against hacking attempts of a clandestine multi-identity virus -Bladabindi -- which steals sensitive personal information of a user for nefarious purposes.
The virus possesses a unique ability to acquire a safe network domain id in order to falsely add itself to the firewall exclusion list and bypass a user's firewall mechanism.
Chinese state-sponsored hackers had targeted India's power grids in Ladakh possibly for information on India's critical infrastructure or to prepare for sabotage in the future, according to the American cybersecurity firm Recorded Future.
Let's take a look at world's top Internet domains hosting malware.
Install blockers to prevent falling prey to cryptojacking.
Four tips to enjoy a secured online banking experience.
The unidentified hackers had executed money transfers on two separate occasions - August 11 and August 13 - which raises the question of why pro-active measures were not taken on the first night itself
Annual premiums do not exceed what you readily shell out for an OTT subscription.
Researchers from North Carolina State University have devised a novel way to block rootkits, one of the most insidious types of malware, preventing them from taking over computer systems.
Security researchers with Kaspersky Lab have recorded more than 45,000 attacks in 99 countries, including the UK, Russia, Ukraine, India, China, Italy, and Egypt.
A fracture of interstate relations could be India's biggest risk coming out of the pandemic. This topped a list of critical risks for India over the next two years, according to Geneva-based World Economic Forum's Executive Opinion Survey (EOS), whose results were released on Tuesday. Other top risks include a debt crisis in large economies, widespread youth disillusionment, failure of technology governance and digital inequality.
Here are six ways your online account can be hacked into, and some simple yet effective ways to protect your Internet avatar.
Ramsomware, a kind of malicious software, is designed to block access to a computer until a certain sum of money is paid.
The 'severely' spreading virus of the Trojan family has been detected conducting its clandestine operations at the point of sale counters placed at retail terminals after the RBI made it mandatory in December last year for debit cards holders to punch in their PIN every time they make a purchase.
As per the cause list uploaded on the apex court website, a bench comprising Chief Justice N V Ramana and Justice Surya Kant will hear nine separate pleas on the issue related to reports of alleged snooping by government agencies on eminent citizens, politicians and scribes by using Israeli firm NSO's spyware Pegasus.
It compromises security by sending SMSes to unknown contacts.
The survey covered 1,210 IT executives and technology professionals from North America, the United Kingdom, Australia, New Zealand, Singapore and India. In India, 202 respondents from businesses with more than 500 employees across 18 industry verticals completed the survey. Overall, 89 per cent of the respondents said implementing a work-from-home policy had increased security challenges for their organisations. The risk posed by shadow IT was especially high, with 89 per cent of companies having no control over the software that employees purchase and install on their devices.
As organisations tighten their belts during the current financial crisis, ransomware attacks could cause fragile companies to succumb to criminals who request massive pay-offs to avoid devastating consequences.
The audacity of the virus has been categorised as 'severe' and cyber experts say such a malicious programme has been detected for the first time which asks for a ransom of an estimated Euro or $300 to unlock the genuine files of a user through 'anonymous pre-paid cash vouchers'.
Researchers conducted the first ever large-scale and systematic study of exactly how the trusty apps on Android phones are able to talk to one another and trade information
The guild's members and all journalists have the duty of holding all branches of government accountable by seeking information, explanations and constitutionally valid justifications for state action and inaction, it said.
Do not trust any incoming phone calls or mails that ask you to install any file or programme, warns Niranjan Upadhye, general manager-fraud risk management, Worldline India.
With debit cards of 5 banks compromised, time to be very cautious while transacting. If possible, avoid non-bank ATMs.
Located in a small township in the eastern part of Bengaluru is IBM's new Security Command Centre, which is surrounded by offices of multinational tech companies. This unit is the centrepiece of IBM's multi-million dollar investment to help businesses prepare for the growing threat of cyberattacks across the Asia-Pacific (APAC) region. This facility is the first of its kind in the region. It helps train in cybersecurity response techniques through highly realistic and simulated cyberattacks.
Speaking at a press briefing, Chinese foreign ministry spokesperson Wang Wenbin said, "As a staunch defender of cyber security, China firmly opposes and cracks down on all forms of cyber attacks."
Like software-as-a-service (SaaS), CaaS has emerged as a well-orchestrated ecosystem for cybercriminals.
A report details the campaign conducted by a China-linked threat activity group RedEcho targeting the Indian power sector.
NSO Group, an Israeli surveillance software company, has been under increasing attack following allegations that its Pegasus phone spyware was used for surveillance on journalists, activists and political leaders in several countries including India. NSO has denied any wrongdoing.
Mitron probably would have continued with the free run for quite some time, had it not come to light that the source code of the app was actually developed by a Pakistani developer, reports Neha Alawadhi.
'Even if your phone goes missing for 15 minutes, be warned.' With e-wallets playing a larger role in transactions, these precautions are a must.
A suspected Chinese government sponsored group is understood to have snooped on inaccessible government computer networks in India for over a decade, a cyber security group claimed.
Given the security dilemma prevailing between India and China, India should curb the operation of Chinese telecom companies in India, asserts Dr Rup Narayan Das.
At the time of its discovery, there was no strong evidence of Flame being developed by the same team that delivered Stuxnet and Duqu.