Tennis World No 5 Rafael Nadal and Olympic champion Mo Farah have spoken in defence after Russian cyber espionage group Fancy Bears leaked their medical data on Monday.
Cyber espionage operations dated back to at least 2005
Avoid clicking on any unknown links from strangers. Use a different, secure password for each social media account you have.
Unidentified hackers gained access to the website of Thane police in Maharashtra and uploaded a message demanding apology to Muslims "all over the world", the police said on Tuesday.
India saw a huge surge in ransomware and IoT cyber attacks in the first half of 2023, as criminals shifted to stealthier means of malicious activities, according to a report by SonicWall. While major economies like the US and the UK witnessed a decline in ransomware attacks, India (up 133 per cent) and Germany (52 per cent) are among the countries that saw a huge surge in such attacks, the 2023 SonicWall Mid-Year Cyber Threat Report for the January-June period stated. At the global level, a variety of other attacks have trended up, including cryptojacking (399 per cent), IoT malware (37 per cent) and encrypted threats (22 per cent), the report said.
Documents relating to Farah, and published on the fancybear.net website, showed that the distance runner had no active Therapeutic Use Exemptions (TUEs) at the time of the Olympics. TUEs allow athletes to take banned substances for verified medical needs and there is no suggestion any of those named have broken any rules
The recent alleged sabotage of BSNL's network in coastal Andhra Pradesh by a major Chinese telecom equipment maker has once again reminded Indian intelligence agencies that when it comes to hacking, China is India's biggest concern. Vicky Nanjappa explains why.
'There are a number of unique challenges elite tennis players have to face. The game is gladiatorial in nature with nowhere for players to hide and no team mate or manager to help deflect the pressure.'
Bug bounty hunters or independent ethical hackers are certified cybersecurity professionals or security researchers who crawl the web, scanning the systems for gaps through which hackers can sneak in and alert the companies, says Shivani Shinde.
Alaya F actually holds the film together, pulling out the right emotions required, and not letting the slightest scepticism leak out of those large, expressive eyes, observes Deepa Gahlot.
Winter Games in Beijing has glaring security problems that could expose sensitive data to interception, according to a report
More than two weeks after the AIIMS cyber attack, Minister of State for Health Bharati Pravin informed the Lok Sabha on Friday that all the data has been retrieved from an unaffected backup server with most of its services also being restored.
"Over 50 files were created on Swamy's hard drive, including incriminating documents that fabricated links between him and the Maoist insurgency," the report said.
A massive data breach that has implications for national security was unearthed by the Cyberabad Police in Hyderabad, who arrested seven people of a gang allegedly involved in the theft and sale of sensitive data of the government and important organisations, including details of defence personnel as well as the personal and confidential data of about 16.8 crore citizens.
However, the handle, which has over 40,000 followers, was restored later in the afternoon.
The Twitter account of the Uttar Pradesh Chief Minister's Office (CMO) was restored after it was hacked early on Saturday.
Experts said attempts from China have increased in the last year, which further amplified after the Indian government banned Chinese applications post the Galwan clash.
To warn users about the threat, the company recently published a blog post where they listed these banned domain links which used to inject spying tools into users' PCs/laptops by appearing as fake login pages for websites or apps.
The gang, which Symantec calls Morpho, is financially motivated.
The Bharatiya Janata Party rejected this was any sort of demonetisation and instead reminded the Congress that even during the rule of Manmohan Singh, old currency notes were taken off circulation.
A Europe-like cyber security defence alliance is the need of the hour, say banking technology experts.
Sachin Tendulkar backed Arshdeep Singh and urged the fans to keep cricket "free from personal attacks" after the young pacer faced vitriolic online abuse in the aftermath of India's five-wicket loss to Pakistan in the Asia Cup on Sunday.
Hacker group John Wick is said to be responsible for the Paytm Mall database breach.
'Maybe the State wants to be watching people all the time. But when they are watching, others too may be watching!' 'The State is becoming more and more secretive while throwing people to the wolves.'
'Hackers from China and UK were involved in the October 12 power outage,' Maharashtra power minister tells Rediff.com.
Idiocy is the source of Heropanti 2's outdated thrills, observes Sukanya Verma.
The kingpin of the racket, Joseph, an unemployed techie hailing from Virudunagar in Madurai district of Tamil Nadu, was nabbed from a cyber cafe in Mahadevapura near Whitefield by the police on November 29. Six of his associates have also been nabbed. The police tracked the accused by tracing the IP address of the PC from where the accounts were hacked.
'The hackers' objectives were centred around smearing India's reputation, causing productivity loss, creating operational damage and seeking financial gains.'
Financial institutions are 300 times more vulnerable to cyberattacks than any other industry.
'What we are actually missing in India is a platform wherein the government engages with cybersecurity experts, gets them employed and then utilises their capability to deter such attacks.'
While HackerEarth has clients and developers globally, the US consists more than a third of the revenue stream, and plans to ramp it up to 60 per cent of the total share.
Tata has 6.13 million followers on Twitter and has tweeted only 119 times since he joined the microblogging platform in April 2011
'As long as businesses do not consider cyber recovery an integral part of their enterprise IT, they remain greatly vulnerable.'
The hack may have been done by a rogue Twitter employee, or it may have been a smart hack into the Twitter system, or a social hack where someone conned Twitter's employees into giving them access,' suspects Devangshu Datta.
"It was evidently a handiwork of some miscreants expressing their apparent resentment over the change of name of Allahabad," Dr Vishvakarma said, taking pains to explain that the Commission had no role in corrupting the website.
The recent report in the New York Times that China had brought India's financial capital - Mumbai - to a halt by hacking the electricity supply grid has not come as a surprise to the CTOs (chief technology officers) and cyber security experts. Indian companies, including critical infrastructure providers such as power grids, ports and radar systems, lack the IT infrastructure to prevent hacking from hostile state actors like China and North Korea, warn security experts. Recently, the United States government warned of yet another breach of critical systems tied to Microsoft Exchange email systems that the company has blamed on China. The breach has impacted thousands of organisations in the US and its impact on India is still unknown.
The company says hackers exploited the "view as" feature on the service.
Use a "virtual credit card" for every online transaction when you can't pay cash on delivery.
The postal ballot papers were to be mailed out from Monday but are now expected to start being issued a few days later, with a delivery deadline set as next Thursday.
Security researchers have discovered a serious flaw in OnePlus 6's bootloader, which allows hackers gain full access to your phone.