India's Budget 2025-26 Coverage
Presented by:
spot_img

Topics: hackers

Indusface Launches CyberShiksha program to Educate Students on Cybersecurity

Indusface, a leading application security provider for SaaS solutions, has launched CyberShiksha, a national initiative to improve cybersecurity awareness among students. India has emerged as...

The Role of Behavioral Biometrics in Online Fraud Protection

The modern-day hacker has an almost unlimited repertoire of potential attack vectors to choose from when aiming to steal financial or private information from...

Why You Need to Be Serious About Cybersecurity for Your Business

The digital age has redefined how businesses communicate, advertise, and share information. Cyber threats are also becoming more frequent and sophisticated. Businesses need to...

Reaping the Benefits of Zero Trust

The advent of emerging technologies such as robotic process automation, artificial intelligence, and blockchain, as well as heightened security concerns due to the pandemic,...

The Future Of Remote Working Tech

Globally, the workforce is undergoing a technological shift of massive proportions. Known as the 'Fourth Industrial Revolution', this phenomenon is evidenced by the 159%...

Crypto: Bengaluru Police seized 31 bitcoin from hacker

The Bengaluru Police has seized a Bitcoin worth Rs 9 crore from an Indian hacker named Shri Krishna. Speaking to the Indian Express, Bengaluru Joint...

New Zealand’s Reserve Bank data systems hacked

New Zealand's Reserve Bank on Sunday said, "One of its data systems has been illegally accessed by unidentified hackers." "The third-party file sharing service used...

Adaptive Multi-factor Authentication (MFA) in BFSI

A few months back (just after the Covid pandemic had started) an important change was implemented by a popular retail US Bank, Bank of...

BigBasket data on sale for Rs 3 million on dark web

India-based online grocery platform, BigBasket on Sunday said, It has reportedly filed a police complaint with the cybercrime cell in Bengaluru after Cyber intelligence...

Trends in IAM – A Look-in

With the new normal after the Covid pandemic, the Digital Security space in general and Identity and Access Management (IDAM) in particular has become...

Prime Minister Scott Morrison: Sophisticated state-based actors trying to hack Australian organizations

Addressing the Press on 18th June 2020, Prime Minister of Australia Scott Morrison said, "A 'Sophisticated state-based actor' has been trying to hack a...

Facebook’s Twitter account hacked by OurMine

Dubai-based hacker group OurMine on Friday hacked the Twitter accounts of Facebook and Messenger and posted on social media by stating, “Even Facebook account...

Hacker arrested after hacking Twitter’s Boss account

The hacker, a minor who hacked Twitter CEO Jack Dorsey's account by the 'SIM swapping' technique in August and sent out numerous anti-semitic and...

A ‘Taj Mahal’ warning for you

Researchers with cyber security firm Kaspersky Lab have uncovered a sophisticated spying platform, TajMahal, that has been active for more than five years now...

Report: Over 79% of firms don’t have counter security measures for hacking

Nearly 79 percent of Indian firms do not have a computer security incident response plan (CSIRP) in place that is applied consistently across operations,...

Yahoo to pay $117.5 million in latest data breach settlement

Nearly 200 million people who had sensitive information snatched from their Yahoo accounts will receive two years of free credit-monitoring services and other potential...

Two out of three hotel websites inadvertently leak customers booking details to third party sites.

Two out of three hotel websites inadvertently leak guests' booking details and personal data to third-party sites, including advertisers and analytics companies, according to...

IoT in healthcare is likely to come under cyber attacks

While the healthcare industry is rapidly adopting new-age technologies such as the Internet of Things (IoT) and Artificial Intelligence (AI) to improve access and...

Hackers targets thousands of Asus computers last year

Hackers targeted "hundreds of thousands" of Asustek computer owners by pushing a backdoor update software tool from the computer maker's servers, cyber security firm...

Reports: 50 million cyber threats targeted enterprises during the second half of 2018

Researchers detected close to 50 million cyber threats targeting enterprises during the second half of 2018, according to a new report from Seqrite, the...

Hackers now have the access of most-secured corporate data files on Dark Web

Cyber criminals now have access to the most-secured data files used to facilitate confidential communication between organisations' servers and clients' computers on the Dark...

Two Ukrainian hackers leak the data of 60K Facebook users through online quizzes

Two Ukrainian men used online quizzes to lure more than 60,000 Facebook users into installing malicious browser extensions that leaked their profile data and...

Apple adds 2FA features for developer accounts

In a bid to secure developer accounts from hackers, Apple has added the requirement of a two-factor authentication (2FA) protocol for all app makers...

Researchers found a sheer vulnerability in the 5G network

Ahead of the roll-out of the advanced 5G network protocol, researchers have revealed the sheer vulnerability in the network that allows for spying of...

Avast: Over 55% of apps running on PC are obsolete software

More than half (55 per cent) of the personal computer (PC) applications installed worldwide are obsolete, thus making the users and their personal data...

Trend Micro says, Sophisticated cyber attacks on cloud will dominate in 2019

A Japan-based cybersecurity firm, Trend Micro on Friday released its cybersecurity reports, in which it said that "In 2019, the hackers will use more...

Trending

THE SNAPSHOTS

Sign up to get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.