<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>
Beware Of New Phishing Scam That's Attacking Our Google Calendar
Beware Of New Phishing Scam That's Attacking Our Google Calendar
07 Jul, 2020

Recently Kaspersky researches say that users can safeguard themselves by turning off the automatic adding of invites to our Google calendar app.

Read Details
WARNING---Apple Suddenly Catches Tik-Tok Secretly Spying On Millions of I-Phone Users
WARNING---Apple Suddenly Catches Tik-Tok Secretly Spying On Millions of I-Phone Users
30 Jun, 2020

TikTok has been found to be stealing information from your iPhone, which can include banking transactions, passwords and confidential files. With so many celebrities using TikTok, find out how vulnerable you are.

Read Details
Can TCS allow 75% of their employees to work from home by 2025? The answer is probably a NO
Can TCS allow 75% of their employees to work from home by 2025? The answer is probably a NO
18 Jun, 2020

Allowing to work from home is a very good option at the present situation, but it has some difficulties in the aspect of proper computer system, network security, consistent power supply, high speed internet, code and software piracy, PCI DSS compliance, etc. Are we moving more towards WFH, or is this a hype which is bound to fail.

Read Details
Korean Hackers Claim to Breech ZEE5 Databases
Korean Hackers Claim to Breech ZEE5 Databases
17 Jun, 2020

An Indian entertainment giant ZEE5 faced a serious threat in June 2020, when a self-declared group of hackers 'Korean Hackers' or 'John Wick' claimed to have hacked the huge databases of ZEE5.

Read Details
Huge Security Breach Detected-13,000+ VIVO Phone Detected With Same IMEI Number
Huge Security Breach Detected-13,000+ VIVO Phone Detected With Same IMEI Number
16 Jun, 2020

A major scam or security breach has been detected by the Meerut Police officials in Uttar Pradesh. They have found more than 13,000 (13,557 to be more precise) Vivo handsets running with the same International Mobile Equipment Identity (IMEI).

Read Details
Government of India Bans WeTransfer
Government of India Bans WeTransfer
09 Jun, 2020

It happened when the government decides to ban the WeTransfer website in India. According to a news report appearing in Mumbai Mirror, the instructions have been put into force with immediate effect. WeTransfer has been a popular file-sharing website that was fairly popular among Indian users. As per a report, the website allowed transferring huge files with anyone without having a paid account.

Read Details
Google Gets Rid Of 813 Creepware from Android Play Store
Google Gets Rid Of 813 Creepware from Android Play Store
05 Jun, 2020

In a drastic decision, Google has removed more than 813 creepware apps from the official Android Play Store. This step comes only after Google received research reports from a group of academics that were busy in their work to find the activities and impact of Creepware.

Read Details
Niti Aayog Open Sourced Arogya Setu App for Bug Bounty Program
Niti Aayog Open Sourced Arogya Setu App for Bug Bounty Program
02 Jun, 2020

Responding to the privacy concerns by renowned tech experts in the country, Niti Aayog, in a landmark move, has open-sourced the code of Arogya Setu App, an app developed by the Government Of India to track and monitor the happenings related to Covid-19 pandemic.

Read Details
Truecaller Data Compromised; Hacker Puts Data for Sale for INR 75,000
Truecaller Data Compromised; Hacker Puts Data for Sale for INR 75,000
01 Jun, 2020

Hacked! User data of more than 4.75 crore of Indian professionals have been compromised yet another time. This time, the hacker targeted the data from Truecaller, one of the most popular data service providers in India and abroad.

Read Details
Welcome Lockdown 4, As the World Awaits a Total Cyber Chaos
Welcome Lockdown 4, As the World Awaits a Total Cyber Chaos
19 May, 2020

India is experiencing the fourth instalment of the national lockdown to combat corona virus from Monday, 18thMay 2020. It has been nearly two months that we been masked and marooned on our individual islands executing our personal and professional duties in equal measure.

Read Details
A Bolt from the Blue: Thunderbolt Shortcoming Makes PC Hacking Easy
A Bolt from the Blue: Thunderbolt Shortcoming Makes PC Hacking Easy
15 May, 2020

Computers installed with Intel's Thunderbolt ports are vulnerable to hands-on hacking attempts due to security issues in its hardware interface, according to research by BjörnRuytenberg, a security researcher at Eindhoven University of Technology in The Netherlands.

Read Details
Chrome Browser Doubles up as Hacker's Hot Pad
Chrome Browser Doubles up as Hacker's Hot Pad
14 May, 2020

A cyber security researcher Matthew Bryant has released a Chrome extension called 'CursedChrome' that can turn the Chrome browser into a hacker's proxy bot. Though, there is another tool to avoid active attacks through such extensions.

Read Details
Samsung Confirms Security Threats For Galaxy Mobile Phones After 2014 Edition
Samsung Confirms Security Threats For Galaxy Mobile Phones After 2014 Edition
13 May, 2020

If you have a Samsung Galaxy Phone with versions from 2014, then you may have a reason to worry. This happens mainly because of Samsung's acceptance of a massive security threat that all Galaxy Mobile phones are likely to encounter, that were manufactured and marketed after 2014.

Read Details
Targeted Ransomware Attack Panics The Taiwanese Organizations
Targeted Ransomware Attack Panics The Taiwanese Organizations
12 May, 2020

The world is changing fast, especially due to the recent pandemic COVID-19. The leading organizations plan to leave China for their role in the spread of the pandemic. Till now, quite a few organizations have declared their move to Taiwan and it is here that the incident has hit.

Read Details
An Overview Of Data Theft at Unacademy
An Overview Of Data Theft at Unacademy
11 May, 2020

The news of data theft at Unacademy has struck the world with wonder as well as uncertainty. The news piece said that the academy faced a major setback when the hackers took away the database of more than 22 million users that the academy used to manage.

Read Details
Critical Vulnerability Affects Data Centre Security across a Multitude
Critical Vulnerability Affects Data Centre Security across a Multitude
07 May, 2020

Salt is a powerful Python-based automation and remote execution engine which allows users to issue commands to multiple machines directly.

Read Details
Whatsapp's Security Quotient Enhanced Amidst Increased Cyber Risk
Whatsapp's Security Quotient Enhanced Amidst Increased Cyber Risk
06 May, 2020

As federal entities of UK, USA and Australia are engaged in socio-political spat over the pros and cons of end to end encryption, Whatsapp, which was a strong supporter of the same, has been fuelled by two back to back security enhancers lately, which is all set to affect its massive user base worldwide.

Read Details
Anonymous Actors Wreck Panic with International Entities
Anonymous Actors Wreck Panic with International Entities
27 Apr, 2020

According to the SITE Intelligence Group, which checks online extremism and terrorist activities, anonymous activists have exposed nearly 25,000 email addresses and passwords allegedly belonging to the National Institutes of Health, the World Health Organization, the Gates Foundation and other groups working towards global abolishing of COVID-19.

Read Details
US Offers Whopping Rewards for Tracing North Korean Hackers
US Offers Whopping Rewards for Tracing North Korean Hackers
23 Apr, 2020

The United States agencies have released a joint advisory reminding the world about the 'significant cyber threat' posed by North Korean state-sponsored hackers to the global banking and financial institutions.

Read Details
ZOOM Accounts on Sale in Numbers on Dark Web
ZOOM Accounts on Sale in Numbers on Dark Web
21 Apr, 2020

Zoom is the new doom for the netizens, thanks to the spread of the COVID-19 virus all over the world.

Read Details
Zero Day Exploits, the Latest Cyber Hacking Instrument on the Rise
Zero Day Exploits, the Latest Cyber Hacking Instrument on the Rise
17 Apr, 2020

The year 2019 has witnessed more number of cyber attacks using Zero-Day vulnerabilities than its 3 preceding years.

Read Details
Credit Card Skimming In the Times of COVID-19
Credit Card Skimming In the Times of COVID-19
16 Apr, 2020

According to a report from Malwarebytes, web skimming attacks have increased by 26 percent in March alone compared to previous months.

Read Details
A New IoT Threat Malware Named Dark Nexus Discovered In the Wild
A New IoT Threat Malware Named Dark Nexus Discovered In the Wild
15 Apr, 2020

Recently cyber security researchers have discovered an IoT botnet threat that leverages corrupted smart devices to stage 'distributed denial-of-service' attacks, potentially triggered on-demand through platforms offering DDoS-for-hire services.

Read Details
Russian Telco Hijacks Internet Traffic for Google, AWS, CloudFlare among Others
Russian Telco Hijacks Internet Traffic for Google, AWS, CloudFlare among Others
10 Apr, 2020

Traffic meant for more than 200 of the world's largest content delivery networks (CDNs) and cloud hosting providers has been siphoned by Rostelecom, Russia's state-owned telecommunications provider.

Read Details
Visiting a Website Can Be Hackingly Harmful For Your Digital Device
Visiting a Website Can Be Hackingly Harmful For Your Digital Device
09 Apr, 2020

Just clicking on a website, malicious or otherwise, unknowingly loading malicious ads using Safari browser could have let remote attackers secretly access your device's camera, microphone or location and in some cases saved passwords as well.

Read Details
Australia under Dual Attack: Corona and Mandrake
Australia under Dual Attack: Corona and Mandrake
08 Apr, 2020

A cyber security research team has discovered the "Mandrake" spying operation targeting Australian mobile banking users.

Read Details
The Latest Zoom Hack Allows Hackers Compromise Windows with Login Passwords
The Latest Zoom Hack Allows Hackers Compromise Windows with Login Passwords
08 Apr, 2020

As per the findings of cyber security expert @_g0dmode, the Zoom video conferencing software for Windows is exposed to a classic 'UNC path injection' vulnerability that could allow remote attackers to steal victims' Windows login credentials and even execute arbitrary commands on their systems.

Read Details
Hotel Giant Falls Victim to Data Fraud in a Row
Hotel Giant Falls Victim to Data Fraud in a Row
06 Apr, 2020

A renowned name in the international hotel industry the Marriott has fallen prey to a data breach for the second time in quick succession during the last two years.

Read Details
Cyber Scam in the days of Coronavirus & Lockdown
Cyber Scam in the days of Coronavirus & Lockdown
03 Apr, 2020

The recent pandemic was unexpected and unknown to most part of the world. It has changed our life and we are slowly adapting to our new lifestyle.

Read Details
Magecart Hackers Inflict 19 Websites with I-frame Skimmers to Hack Payment Data
Magecart Hackers Inflict 19 Websites with I-frame Skimmers to Hack Payment Data
03 Apr, 2020

At least 19 popular electronic merchandising websites have been corrupted with a new version of the digital skimmer called 'Make Frame' by a current Magecart skimmer campaign intended at stealing payment card information of the customers.

Read Details
Popular Websites Being Compromised To Wreck Hacking Attack on Users
Popular Websites Being Compromised To Wreck Hacking Attack on Users
02 Apr, 2020

Recent analytical findings from Dr.Web have revealed hackers actively targeting users with a malicious Chrome update which runs s backdoor on the target device which then allows the later malware attacks.

Read Details
Work from Home Ignites Wild Attack in the Virtual World
Work from Home Ignites Wild Attack in the Virtual World
01 Apr, 2020

With an alarmingly high global population staying put at homes and using virtual communication platforms like 'zoom' to communicate online, the bad actors of the world are making the most of the moment by coming up with phoney platforms to cajole the innocent and the unsuspecting.

Read Details
Hackers celebrate Corona carnival
Hackers celebrate Corona carnival
27 Mar, 2020

Third party Android App developers are using Corona virus related keywords in their app names, descriptions, or in the package names in order to delete malware, perpetrate financial theft and rank higher in Google Store searches related to the topic.

Read Details
Adding Insult to the Injury: Corona Clubbed With Cyber Attack
Adding Insult to the Injury: Corona Clubbed With Cyber Attack
24 Mar, 2020

Hammersmith Medicines Research, the British medical organization that had earlier researched the Ebola vaccine and is now on standby to perform the medical trials on any COVID-19 vaccine has been hit by the cyber crime group in terms of stealing medical reports of those affected by the virus and publishing them online to extort ransom.

Read Details
Corona Consumed By Cyber Criminals to Sell Malware
Corona Consumed By Cyber Criminals to Sell Malware
23 Mar, 2020

The global black hat community is out to reap the most of the present worldwide vulnerability by cajoling people into getting infected with malware in the garb of Corona consciousness.

Read Details
What Do CISOs do when Corona Virus Meets Cyber Security Challenges?
What Do CISOs do when Corona Virus Meets Cyber Security Challenges?
20 Mar, 2020

Researchers have zeroed down upon immediate remedies of corona affected cyber security issues of working from home on personal computers.

Read Details
Hacking Holds Hands with Communal Vendetta, Maharashtra Government Pays the Price.
Hacking Holds Hands with Communal Vendetta, Maharashtra Government Pays the Price
17 Mar, 2020

On Friday an Islamic hackers group called Legion hacked the website of Maharashtra CID as payback procedure to the Delhi massacre which caused the death of many Muslims.

Read Details
Facebook Hijacked, Yet Again
Facebook Hijacked, Yet Again
16 Mar, 2020

A new simple yet extremely risky strain of Android malware has been discovered which steals users' authentication cookies from the web browsing and other apps, including Chrome and Facebook, installed on the corrupted devices.

Read Details
Let's Encrypt Damage Controls Releasing 3 Million Invalid TLS Certificates
Let's Encrypt Damage Controls Releasing 3 Million Invalid TLS Certificates
06 Mar, 2020

The signing entity is having to retrace 3 million TLS certificates issues by default because of avirus in its Certificate Authority software.

Read Details