Shishir Nagaraja, currently associated with the Information Trust Institute of the University of Illinois (US), tells rediff.com, not only about the Google episode, but also his experience with the Office of the Dalai Lama in Dharamsala and the world of hackers, in general.
Home ministry sources say there are fears that international lobbies might have been involved in spying, to create a narrative around Indian governance as well as the economy.
Besides the usual suspects -- medicine, engineerng etc -- these degrees will also get you a job and build a lucrative career.
He said that the attack came in the form of an e-mail with a PDF attachment containing a 'Trojan' virus, which allows a hacker to access a computer remotely and download or delete files. The virus was detected and officials were told not to log on until it was eliminated, he said.
The US, and may be many more countries, is facing a grave cyber risk from an army of Chinese hackers.
Hackers use their best schemes during holidays to steal people's money, credit card or net-banking information.
China on Tuesday dismissed reports that Chinese hackers have broken into top secret files of the Indian Defence Ministry and embassies around the world, saying that it was firmly opposed to hacking and regards it as an international crime.
Prime Minister Narendra Modi was among the 11 candidates shortlisted by Time for its annual honour.
'The skin of any celebrity will show its age more than a normal person because we are always exposed to lights. So, we need to take extra care.'
According to security experts at Symantec, web users generally get lured by cyber criminals to download and install fake anti-virus software on to their machines, believing they're protecting their PCs from hackers.
The hacker group, which identified itself as 'Pakistan Haxors Crew (PHC)', said, 'nothing deleted or stolen. Just here to deliver my message to Indians'.
Chinese characters were seen on the website, indicating that Chinese hackers may be involved in it.
The threat was 'escalating' as cyber experts warned that another attack was imminent in coming days.
Report recommends government open up to cooperation with private sector.
The Department of Defence confirmed that the hack took place between Monday and Tuesday, forcing it to pull the entire RAAF website offline and replace it with a page explaining that there had been 'technical difficulties'.
Govt, telecom, defence sectors most attacked by cybercriminals
In July, Yahoo was sold to US telecoms giant Verizon for $4.8 billion.
Mickey Virus gets better only in the second half, according to Paloma Sharma.
The final version of a report which has already revealed a system of state-sponsored doping in Russia is still several months away, its author Richard McLaren said on Friday.
Twitter.com, the site devoted to pithy posts, was brought down on Thursday by a concerted attack by hackers. Facebook, another popular social networking site, also appears to be down.
Pravin Bhagwat, a member of the team which developed the technology, said that after the Ahmedabad bomb blasts where terrorists hacked the wi-fi system of an American in Mumbai, security agencies did not think of securing government and business organisations where a large number of wi-fi systems were installed. A terror e-mail claiming responsibility for the Ahmedabad bomb blasts was sent to some private new channels on July 27 from US national Haywood's computer.
Now, a new study in the US has revealed just how easy the answers of such security questions are for other people to guess -- in fact these facts make life simple for hackers, the New Scientist reported. Researchers at Microsoft have based their findings on an analysis of an experiment, involving 32 e-mail users.
Three Indian-American researchers have shown that the fingerprint-based security systems used in smartphones and other gadgets are way more vulnerable to hacking than we imagined.
The persistence with Aadhaar, to the exclusion of all other identity systems, is a dangerous path and should be avoided if the risks of digital vulnerability are to be eliminated. Till such time that the ownership of the Aadhaar system is transferred to an independent body, concerns over Aadhaar's digital vulnerability will persist, says A K Bhattacharya.
The websites of the New York Times, the Huffington Post and Twitter were hacked by a group known as the Syrian Electronic Army which posted messages supporting the embattled Syrian President Bashar al-Assad.
The email claiming the responsibility for the November 26, Mumbai terror strikes was sent from Pakistan and not from Russia, said ethical hacker and cyber security expert Ankit Fadia.
Apple and Google adopted strong default encryption in late 2014.
Democratic Party bosses have apologised to Bernie Sanders for "inexcusable" emails aimed at undermining his White House bid.
India ranked second among nations that were most targeted for cyber crime through the social media in 2014, after America
According to statistics of the Computer Emergency Response Team (Cert-In), which handles computer securities incidents in the country, 612 websites were defaced in March compared to 214 websites in February. Website defacement is a form of malicious hacking. It is usually the substitution of the original home page by a system cracker that breaks into a web server and alters the hosted website creating one of his own.
Scraping, which implies lifting content from the original site and placing it on some other site without authorisation of the original developer, has consistently proved a sore point for Indian gaming companies since it robs them of potential revenue. Now, however, with clever use of technology, online flash game advertising firms like MochiAds, Inviziads and Gamejacket are putting game developers back in control of their content.
"The crime branch initiative will start soon. A team of experts will educate the users as to what kind of precautions should be taken while using the Wi-Fi internet connections," said Rakesh Maria, Joint Commissioner of Police (Crime). "We will educate about Do's and Don'ts when they use Wi-Fi connections. A list of Do's and Don'ts will be given," said Maria.
The government websites host information for public dissemination.
Welcome to the world of Vishing or voice phishing, wherein hackers are using a combination of voice over internet protocol, SMSs and the internet to fool and redirect users into dialling a phone number and collect critical information for financial gain. In Kolaskar's case, both mobile spam and vishing were used.
Here are a few tips that will help you keep your online information safe from prying eyes on the Internet.
As Barbie is set to turn 60 on March 9, we take a trip down memory lane and look at some interesting creations.
The Indian government is concerned only because Indian names are involved, the source said.
Vineet Kumar was the naughtiest kid in school -- and that was only three years ago! Today, at the age of 18, he is the CEO of the National Anti-Hacking Group, advising the Indian Army and corporates on how to safeguard their Internet interests.
The website, which had turned "non-functional" from 11.35 am, became accessible only at 7.50 pm.
Drones are of course, remotely controlled and modern ships are also chip-driven.