” Tech Support scam ” uses rogue Google Chrome extension Given Google Chrome’s popularity, it is no surprise to see it being more and more targeted these days. In particular, less than reputable ad […]
DomainMonster Hacked: Hundreds of websites defaced Hundreds of websites have been defaced by hackers who hijacked a web-hosting server run by UK domain registrar DomainMonster. The index.php pages on the attacked sites were rapidly vandalized […]
The bug, which was discovered on February 17 according to Project Zero's Tavis Ormandy and is now fixed, has caused the most damage between February 13 and February 18, according to Cloudflare, when about one in every 3,300,000 HTTP requests caused data to leak.
Operation aims at indiscriminately eliminating residual / latent threat of terrorism, consolidating gains of operations made thus far and further ensuring security of the borders.
Some of these groups are making tens of thousands of Indian Rupees a day from their extortion campaigns. Those participating in the ecosystem appear to be doing so with impunity and with little fear of being caught.
How easy would it be for criminals to exploit your organisation using ransomware: what’s ahead in 2017? If 2016 saw a number of seismic changes on the political front, the cyber security arena has continued […]
Duqu Malware – Analysis Duqu 2.0 is a really impressive piece of malware, related to Stuxnet and probably written by the NSA. One of its security features is that it stays resident in its […]
The study, Security, Fraudulent Transactions and Customer Loyalty: A Field Study was put together by a team led by Professor Rahul Telang and analysed data from 500,000 anonymised financial services users over five years. The researchers observed actual user behaviour rather than quizzing them about their intentions.
We value your privacy
We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic. By clicking "Accept All", and by using this website you agree to our Cookies and Data Protection Policy.