Earlier last month, for the first time ever, an anonymous hacker was served with a restraining order as a non-fungible token (NFT), reports Shivani Shinde.
Minister of State for Electronics and IT Rajeev Chandrasekhar said the government has asked Apple two questions: whether their devices are safe, and if so the reason for the alert was sent to the Opposition members.
Tennis World No 5 Rafael Nadal and Olympic champion Mo Farah have spoken in defence after Russian cyber espionage group Fancy Bears leaked their medical data on Monday.
Cyber espionage operations dated back to at least 2005
American tech giant Apple on Friday warned of a flaw that is allowing hackers to seize control of iPhones, iPads and Mac computers. The tech giant directing users of most of its devices to update their software after the company discovered a vulnerability in its operating systems that it says "may have been actively exploited," reported CNN. It urged users to install emergency software updates but has not disclosed the extent to which the flaw has been exploited.
'Check every SMS you get. Many people ignore them.' 'Remember if there is an activity in your account, your financial institution will send you an SMS, not a WhatsApp message.'
Hunter Tootega Nahi, Todega is bizarre, unintentionally funny, discovers Deepa Gahlot.
The recent alleged sabotage of BSNL's network in coastal Andhra Pradesh by a major Chinese telecom equipment maker has once again reminded Indian intelligence agencies that when it comes to hacking, China is India's biggest concern. Vicky Nanjappa explains why.
Documents relating to Farah, and published on the fancybear.net website, showed that the distance runner had no active Therapeutic Use Exemptions (TUEs) at the time of the Olympics. TUEs allow athletes to take banned substances for verified medical needs and there is no suggestion any of those named have broken any rules
Unidentified hackers gained access to the website of Thane police in Maharashtra and uploaded a message demanding apology to Muslims "all over the world", the police said on Tuesday.
Avoid clicking on any unknown links from strangers. Use a different, secure password for each social media account you have.
India saw a huge surge in ransomware and IoT cyber attacks in the first half of 2023, as criminals shifted to stealthier means of malicious activities, according to a report by SonicWall. While major economies like the US and the UK witnessed a decline in ransomware attacks, India (up 133 per cent) and Germany (52 per cent) are among the countries that saw a huge surge in such attacks, the 2023 SonicWall Mid-Year Cyber Threat Report for the January-June period stated. At the global level, a variety of other attacks have trended up, including cryptojacking (399 per cent), IoT malware (37 per cent) and encrypted threats (22 per cent), the report said.
'There are a number of unique challenges elite tennis players have to face. The game is gladiatorial in nature with nowhere for players to hide and no team mate or manager to help deflect the pressure.'
Bug bounty hunters or independent ethical hackers are certified cybersecurity professionals or security researchers who crawl the web, scanning the systems for gaps through which hackers can sneak in and alert the companies, says Shivani Shinde.
Winter Games in Beijing has glaring security problems that could expose sensitive data to interception, according to a report
Alaya F actually holds the film together, pulling out the right emotions required, and not letting the slightest scepticism leak out of those large, expressive eyes, observes Deepa Gahlot.
More than two weeks after the AIIMS cyber attack, Minister of State for Health Bharati Pravin informed the Lok Sabha on Friday that all the data has been retrieved from an unaffected backup server with most of its services also being restored.
"Over 50 files were created on Swamy's hard drive, including incriminating documents that fabricated links between him and the Maoist insurgency," the report said.
However, the handle, which has over 40,000 followers, was restored later in the afternoon.
The Twitter account of the Uttar Pradesh Chief Minister's Office (CMO) was restored after it was hacked early on Saturday.
A massive data breach that has implications for national security was unearthed by the Cyberabad Police in Hyderabad, who arrested seven people of a gang allegedly involved in the theft and sale of sensitive data of the government and important organisations, including details of defence personnel as well as the personal and confidential data of about 16.8 crore citizens.
Experts said attempts from China have increased in the last year, which further amplified after the Indian government banned Chinese applications post the Galwan clash.
To warn users about the threat, the company recently published a blog post where they listed these banned domain links which used to inject spying tools into users' PCs/laptops by appearing as fake login pages for websites or apps.
The gang, which Symantec calls Morpho, is financially motivated.
A Europe-like cyber security defence alliance is the need of the hour, say banking technology experts.
Hacker group John Wick is said to be responsible for the Paytm Mall database breach.
'Hackers from China and UK were involved in the October 12 power outage,' Maharashtra power minister tells Rediff.com.
The kingpin of the racket, Joseph, an unemployed techie hailing from Virudunagar in Madurai district of Tamil Nadu, was nabbed from a cyber cafe in Mahadevapura near Whitefield by the police on November 29. Six of his associates have also been nabbed. The police tracked the accused by tracing the IP address of the PC from where the accounts were hacked.
Sachin Tendulkar backed Arshdeep Singh and urged the fans to keep cricket "free from personal attacks" after the young pacer faced vitriolic online abuse in the aftermath of India's five-wicket loss to Pakistan in the Asia Cup on Sunday.
The Bharatiya Janata Party rejected this was any sort of demonetisation and instead reminded the Congress that even during the rule of Manmohan Singh, old currency notes were taken off circulation.
'Maybe the State wants to be watching people all the time. But when they are watching, others too may be watching!' 'The State is becoming more and more secretive while throwing people to the wolves.'
Idiocy is the source of Heropanti 2's outdated thrills, observes Sukanya Verma.
'The hackers' objectives were centred around smearing India's reputation, causing productivity loss, creating operational damage and seeking financial gains.'
'What we are actually missing in India is a platform wherein the government engages with cybersecurity experts, gets them employed and then utilises their capability to deter such attacks.'
While HackerEarth has clients and developers globally, the US consists more than a third of the revenue stream, and plans to ramp it up to 60 per cent of the total share.
Tata has 6.13 million followers on Twitter and has tweeted only 119 times since he joined the microblogging platform in April 2011
Financial institutions are 300 times more vulnerable to cyberattacks than any other industry.
The hack may have been done by a rogue Twitter employee, or it may have been a smart hack into the Twitter system, or a social hack where someone conned Twitter's employees into giving them access,' suspects Devangshu Datta.
The company says hackers exploited the "view as" feature on the service.
Here are some ways of hacking mobile phones and ways to protect your handset.