With more and more Indians going online and generating never-heard-before kind of data, hackers have turned their focus on a country with over 450 million smartphone users and more than 550 million Internet users. The country has 366 million Internet subscribers in urban locations and 194 million in rural areas, says the latest report by
For more than two weeks, records of over 27.5 crore Indian citizens were left unprotected and eventually got hijacked by a hackers group - revealed Security Discovery researcher on Wednesday. According to expert Bob Diachenko, a huge MongoDB database of Indian citizens was left exposed and was publicly accessible on Amazon AWS using Shodan. On
Iranian hackers working to penetrate systems, businesses and governments around the world have caused hundreds of millions of dollars in damages, a report said Wednesday. Researchers for tech giant Microsoft said the attackers stole secrets and wiped data from computer networks after targeting thousands of people at some 200 companies over the past two years,
In these times of high penetration, high accessibility and low rates, internet has reached all facets of our lives. But with this rise of the internet, there has also been a considerable rise in hacking attacks or cyberattacks on individuals, businesses, corporations and government agencies. Large scale cyberattacks can even be termed as acts of
A new macOS malware has been discovered, dubbed as CookieMiner. The malware specifically targets Mac users and steals their cookies of login credentials and leverage it to steal money from wallets and Cryptocurrency exchanges such as Bitstamp, Coinbase, Poloniex, Binance and MyEtherWallet. Security researchers from PaloAltoNetworks Unit42 further reported that hackers can even bypass the
Cybersecurity is probably the primary segment that every internet user should be aware with if they want to safeguard themselves against any harm. The harm here may range from financial to personal data or identity. The world has progressively moved to the internet but not a whole lot of users are aware of how to
Google recently celebrated Chrome s 10-year anniversary by giving the web browser a major and design and feature overhaul. But as the tech giant gears towards making the web surfing experience seamless and immersive, it also plans on making it safer by successfully eliminating URLs. URLs (Uniform resource locators) serves as a web address for
One of the four hackers that were responsible for the celebgate scandal back in 2014 was sentenced to eight months in prison by a federal judge in the US district court of Bridgeport Connecticut. If you don t recall the scandal that we are talking about then let us recap so that you can catch
Mobile apps on your smartphone can range from most useful and secure to social media and games that help you pass your time. There are also quite a few apps that are plain redundant on the Play Store or App Store. Though, regardless of the type, smartphone apps are the backbone of our smartphone existence.
Fully operations research robots are often left unsecured on the internet, making it possible for hackers to remotely command these machines to move around and even spy on camera feeds. Researchers from Brown University in the US ran a worldwide scan in search of hosts running the Robot Operating System (ROS), a popular research robotics
Eli Biham and Lior Neumann from the Israel Institute of Technology have identified a Bluetooth vulnerability that has the potential to allow a nearby hacker to gain unauthorized access to your device. The published research paper on the CERT website says that the encryption vulnerability in the Bluetooth firmware implementation affects devices from vendors like
India ranked fourth in the list of top 10 target countries for Web Application Attacks as bot-driven abuse and distributed denial of service (DDoS) attacks continued to rise from November 2017 till April this year, Cloud delivery network provider Akamai Technologies said on Wednesday. Registering over 2.8 crore attacks, India also ranked eighth globally in
Cyber attacks are among the key security challenges that India is facing and they could pose wide-ranging threats to key installations and cripple financial institutions, Union Home Secretary Rajiv Gauba said today. Addressing a conference on homeland security, Gauba said that for countering cyber attacks, the security agencies have to stay ahead of the attackers
Security has become the keyword at a time when every single device is connected to something or the other. With the advent of Internet of Things, connected devices are everywhere, and so are the vulnerabilities. And in the latest example of a jaw-dropping incident, a casino s high-roller database was accessed by hackers, using a
Britain has conducted a "major offensive cyber-campaign" against the Islamic State militant group, the head of the intelligence agency GCHQ revealed. The cyber operation hindered the group's ability to co-ordinate attacks and suppressed their propaganda, former MI5 senior officer Jeremy Fleming was quoted as saying by the BBC. Fleming, speaking for the first time since
When it comes to increased cryptojacking activities, India is second in the Asia-Pacific and Japan (APJ) region and ninth globally as hackers create a highly-profitable, new revenue stream with crypto-mining, cyber security giant Symantec said on Wednesday. According to Symantec's "Internet Security Threat Report", detection of coinminers on endpoint computers increased by a whopping 8,500
Digitally connected health devices such as pacemakers and MRI scanners in an Internet of Things (IoT) era can be fatal as hackers can exploit such devices and harm patients, the Royal Academy of Engineering has warned. In two new reports published by the Royal Academy of Engineering and the PETRAS Internet of Things research hub
The vulnerability of Signalling System No. 7 (SS7), which enables SMS-based two-factor authentication, has long been debated. And a recent research has pointed out another gaping flaw in the system, making the need for action even more urgent. In a video demonstration, white hackers aka researchers from Positive Technologies showed how they were able to take control of a bitcoin wallet, and start pilfering funds via the SS7 flaws. They were even able to reset Gmail passwords using two-factor authentication.
In a slightly embarrassing event, WikiLeaks, a company which prides itself on technical competency, has apparently lost control of its own website to a notorious hacker group called OurMine. The attack saw visitors to WikiLeaks.org redirected to a page created by OurMine, which claimed that the attack was a response to a challenge from the organization to hack them.