Avoid clicking on any unknown links from strangers. Use a different, secure password for each social media account you have.
'Investigating agencies are not acting as independent authorities; they have stopped being neutral.'
Will the latest development see a marked break from the way the case has been going?
The Orwellian surveillance State is here. And here to stay, asserts Virendra Kapoor.
Chinese state-sponsored hackers had targeted India's power grids in Ladakh possibly for information on India's critical infrastructure or to prepare for sabotage in the future, according to the American cybersecurity firm Recorded Future.
The United States State Department said it is aware of these reports.
Cyber security sleuths have alerted Indian internet users against hacking attempts of a clandestine multi-identity virus -Bladabindi -- which steals sensitive personal information of a user for nefarious purposes.
The virus possesses a unique ability to acquire a safe network domain id in order to falsely add itself to the firewall exclusion list and bypass a user's firewall mechanism.
Install blockers to prevent falling prey to cryptojacking.
A fracture of interstate relations could be India's biggest risk coming out of the pandemic. This topped a list of critical risks for India over the next two years, according to Geneva-based World Economic Forum's Executive Opinion Survey (EOS), whose results were released on Tuesday. Other top risks include a debt crisis in large economies, widespread youth disillusionment, failure of technology governance and digital inequality.
Annual premiums do not exceed what you readily shell out for an OTT subscription.
Let's take a look at world's top Internet domains hosting malware.
The unidentified hackers had executed money transfers on two separate occasions - August 11 and August 13 - which raises the question of why pro-active measures were not taken on the first night itself
Four tips to enjoy a secured online banking experience.
Security researchers with Kaspersky Lab have recorded more than 45,000 attacks in 99 countries, including the UK, Russia, Ukraine, India, China, Italy, and Egypt.
Researchers from North Carolina State University have devised a novel way to block rootkits, one of the most insidious types of malware, preventing them from taking over computer systems.
Here are six ways your online account can be hacked into, and some simple yet effective ways to protect your Internet avatar.
As per the cause list uploaded on the apex court website, a bench comprising Chief Justice N V Ramana and Justice Surya Kant will hear nine separate pleas on the issue related to reports of alleged snooping by government agencies on eminent citizens, politicians and scribes by using Israeli firm NSO's spyware Pegasus.
Ramsomware, a kind of malicious software, is designed to block access to a computer until a certain sum of money is paid.
The survey covered 1,210 IT executives and technology professionals from North America, the United Kingdom, Australia, New Zealand, Singapore and India. In India, 202 respondents from businesses with more than 500 employees across 18 industry verticals completed the survey. Overall, 89 per cent of the respondents said implementing a work-from-home policy had increased security challenges for their organisations. The risk posed by shadow IT was especially high, with 89 per cent of companies having no control over the software that employees purchase and install on their devices.
The 'severely' spreading virus of the Trojan family has been detected conducting its clandestine operations at the point of sale counters placed at retail terminals after the RBI made it mandatory in December last year for debit cards holders to punch in their PIN every time they make a purchase.
Like software-as-a-service (SaaS), CaaS has emerged as a well-orchestrated ecosystem for cybercriminals.
Located in a small township in the eastern part of Bengaluru is IBM's new Security Command Centre, which is surrounded by offices of multinational tech companies. This unit is the centrepiece of IBM's multi-million dollar investment to help businesses prepare for the growing threat of cyberattacks across the Asia-Pacific (APAC) region. This facility is the first of its kind in the region. It helps train in cybersecurity response techniques through highly realistic and simulated cyberattacks.
The guild's members and all journalists have the duty of holding all branches of government accountable by seeking information, explanations and constitutionally valid justifications for state action and inaction, it said.
It compromises security by sending SMSes to unknown contacts.
Speaking at a press briefing, Chinese foreign ministry spokesperson Wang Wenbin said, "As a staunch defender of cyber security, China firmly opposes and cracks down on all forms of cyber attacks."
Do not trust any incoming phone calls or mails that ask you to install any file or programme, warns Niranjan Upadhye, general manager-fraud risk management, Worldline India.
NSO Group, an Israeli surveillance software company, has been under increasing attack following allegations that its Pegasus phone spyware was used for surveillance on journalists, activists and political leaders in several countries including India. NSO has denied any wrongdoing.
A report details the campaign conducted by a China-linked threat activity group RedEcho targeting the Indian power sector.
As organisations tighten their belts during the current financial crisis, ransomware attacks could cause fragile companies to succumb to criminals who request massive pay-offs to avoid devastating consequences.
Researchers conducted the first ever large-scale and systematic study of exactly how the trusty apps on Android phones are able to talk to one another and trade information
The audacity of the virus has been categorised as 'severe' and cyber experts say such a malicious programme has been detected for the first time which asks for a ransom of an estimated Euro or $300 to unlock the genuine files of a user through 'anonymous pre-paid cash vouchers'.
Do you suspect that your partner is cheating on you and want to find out the truth by installing spyware on their phone? Or, perhaps you are a student who wants to get out of an online classroom so you can play an online game with friends? How about some Zoom raiding for a mere Rs 50-100? Or, are you a person who wishes to hack into someone's phone or laptop, and steal their financial details? Crimeware-as-a-Service (CaaS) allows you to do all this and more.
Mitron probably would have continued with the free run for quite some time, had it not come to light that the source code of the app was actually developed by a Pakistani developer, reports Neha Alawadhi.
With debit cards of 5 banks compromised, time to be very cautious while transacting. If possible, avoid non-bank ATMs.
Given the security dilemma prevailing between India and China, India should curb the operation of Chinese telecom companies in India, asserts Dr Rup Narayan Das.
Experts said attempts from China have increased in the last year, which further amplified after the Indian government banned Chinese applications post the Galwan clash.
'Even if your phone goes missing for 15 minutes, be warned.' With e-wallets playing a larger role in transactions, these precautions are a must.
In the last couple of months, top Indian IT services providers, including TCS, Infosys, Wipro and HCL Tech have announced setting up cyber threat management centres in the US and Europe.
A suspected Chinese government sponsored group is understood to have snooped on inaccessible government computer networks in India for over a decade, a cyber security group claimed.