Topics: Hacking

The Importance of Zero-Trust Security Models in Safeguarding Data

In an age where cyberattacks grow more sophisticated by the day, traditional security models are no longer enough to safeguard sensitive data. The zero-trust...

Indusface Launches CyberShiksha program to Educate Students on Cybersecurity

Indusface, a leading application security provider for SaaS solutions, has launched CyberShiksha, a national initiative to improve cybersecurity awareness among students. India has emerged as...

The Role of Behavioral Biometrics in Online Fraud Protection

The modern-day hacker has an almost unlimited repertoire of potential attack vectors to choose from when aiming to steal financial or private information from...

Don’t Get Hacked: Why Is Cyber Security So Important To Businesses?

In the wild, a brightly colored bird with no natural defenses becomes easy prey. In the digital jungle, businesses with weak cyber security are...

Don’t Let Your Identity Get Stolen

Identity theft is getting more common. Thirty-three percent of Americans have already been victims. You don’t want to join them if you can help...

Why You Need to Be Serious About Cybersecurity for Your Business

The digital age has redefined how businesses communicate, advertise, and share information. Cyber threats are also becoming more frequent and sophisticated. Businesses need to...

Reaping the Benefits of Zero Trust

The advent of emerging technologies such as robotic process automation, artificial intelligence, and blockchain, as well as heightened security concerns due to the pandemic,...

The Complete Guide to US Proxies and Their Uses

A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to...

NCFTA partners with Binance to prevent cryptocurrency fraud

Global cryptocurrency wallet company, Binance has announced its partnership with the National Cyber-Forensics and Training Alliance (NCFTA) to prevent frauds on its platform. Binance is...

Can You Find Out Who Is Tracking Your Online Browsing Activities?

What do you do when you find out that someone is following you on the road?  Or, do you like it when someone is keeping...

10 Cybersecurity Practises that a Small Business must adopt

Are you just starting to provide your services or products to customers? Have you hired a security guard to protect your workplace or your...

Interview: “Cybersecurity is a moving target which requires skill-based training,” RV Raghu of Versatilist Consulting India

In an interview with TechGraph, the Director of Versatilist Consulting India, and Former ISACA board director, RV Raghu talked about the adoption of cyber...

Tamil Nadu PDS system breached, data of 4.5 Mn people on sale: Technisanct reports

Technisanct, cybersecurity, and big data startup headquartered in Bangalore report a data breach of over 4.5 million citizens from the Public Distribution System (PDS)...

Trends in the dark web

Dark Web has been a repository of all evil, blasphemy and notorious since its inception, with its evolving trends and cutthroat techniques chiselling out...

Struggling with Slow-Moving Internet? Here are Ways to Increase it!

Does a slow internet speed worry you? Well, in this fast-paced life, a fast internet connection is a must-have. Without it, sending files, downloading...

The Future Of Remote Working Tech

Globally, the workforce is undergoing a technological shift of massive proportions. Known as the 'Fourth Industrial Revolution', this phenomenon is evidenced by the 159%...

BigBasket data on sale for Rs 3 million on dark web

India-based online grocery platform, BigBasket on Sunday said, It has reportedly filed a police complaint with the cybercrime cell in Bengaluru after Cyber intelligence...

Trends in IAM – A Look-in

With the new normal after the Covid pandemic, the Digital Security space in general and Identity and Access Management (IDAM) in particular has become...

FireEye’s mandiant launches its new SaaS threat intelligence suite

Leading intelligence-led security company, FireEye has announced the launch of Mandiant Advantage - a SaaS threat intelligence suite on Tuesday. In a statement issued, FireEye...

Prime Minister Scott Morrison: Sophisticated state-based actors trying to hack Australian organizations

Addressing the Press on 18th June 2020, Prime Minister of Australia Scott Morrison said, "A 'Sophisticated state-based actor' has been trying to hack a...

Facebook’s Twitter account hacked by OurMine

Dubai-based hacker group OurMine on Friday hacked the Twitter accounts of Facebook and Messenger and posted on social media by stating, “Even Facebook account...

Hacker arrested after hacking Twitter’s Boss account

The hacker, a minor who hacked Twitter CEO Jack Dorsey's account by the 'SIM swapping' technique in August and sent out numerous anti-semitic and...

Reports: Indian education institutions attacked most by hackers

Education domain is one of the most "at-risk" industries in India, with the sector accounting for more than 30 percent of cyber threats targeting...

A ‘Taj Mahal’ warning for you

Researchers with cyber security firm Kaspersky Lab have uncovered a sophisticated spying platform, TajMahal, that has been active for more than five years now...

Google sharing data with US officials

At a time when concerns over data collection and breach by tech majors are on the rise, it has been reported that US law...

Report: Over 79% of firms don’t have counter security measures for hacking

Nearly 79 percent of Indian firms do not have a computer security incident response plan (CSIRP) in place that is applied consistently across operations,...

Yahoo to pay $117.5 million in latest data breach settlement

Nearly 200 million people who had sensitive information snatched from their Yahoo accounts will receive two years of free credit-monitoring services and other potential...

Two out of three hotel websites inadvertently leak customers booking details to third party sites.

Two out of three hotel websites inadvertently leak guests' booking details and personal data to third-party sites, including advertisers and analytics companies, according to...

IoT in healthcare is likely to come under cyber attacks

While the healthcare industry is rapidly adopting new-age technologies such as the Internet of Things (IoT) and Artificial Intelligence (AI) to improve access and...

Apple bans another spyware app from App store

Immediately after spyware-maker Connexxa's infamous app "Assistenza SIM" was caught abusing the iOS enterprise certificate to bypass Apples App Store guidelines, the iPhone-maker revoked...

Trending