Tag "cyber attack"

Insider Threats: The sleeper cells of Cybersecurity

by January 18, 2019

Authored By: Sameer Shelke, COO, Aujas It is no secret that Data breaches and cyber attacks have damaging effects. What is most concerning however is the growing sophistication of these cyber …

Read More [shareaholic app="share_buttons" id="15671367"]

Beware: Whatsapp Gold is not real!

by January 7, 2019

With Whatsapp being one of the most widely used mobile applications in the world, it has painted a target on itself as being a platform for cyber attackers to float …

Read More [shareaholic app="share_buttons" id="15671367"]

NETGEAR Orbi RBK20 – A Tri-Band Wi-Fi System for Broader Range of Homes & Budget

by December 20, 2018

Hardly a day goes by without yet another organisation falling prey to a cyber attack or data breach that has led to reputational and financial losses, home routers …

Read More [shareaholic app="share_buttons" id="15671367"]

Cyber Attacks: 3 Essential Tips to Protect Yourself

by October 8, 2018

Author: Ellie Martin, co-founder of Startup Change group One of the most pressing issues of the technological age goes largely overlooked. Cybersecurity is our last line of defence against cyber warfare. …

Read More [shareaholic app="share_buttons" id="15671367"]

Qatar’s Al-Jazeera combats cyber attack

by June 9, 2017

Pan-Arab satellite network Al Jazeera is combating a large-scale cyber attack on its media platform, but all its entities remain operational, a company source said recently. “There were attempts made on …

Read More [shareaholic app="share_buttons" id="15671367"]

Gemalto’s 2016 Breach Level Index Finds 36.6 million Records Breached in India

by March 30, 2017

Gemalto has released the findings of the Breach Level Index revealing that 33 reported data breaches led to almost 36.6 million data records being compromised in India during 2016, an …

Read More [shareaholic app="share_buttons" id="15671367"]

Cybercriminals Breach Enterprises in 40 Countries Using Hidden Malware

by February 13, 2017

Kaspersky Lab experts have discovered a series of “invisible” targeted attacks that use only legitimate software: widely available penetration-testing and administration tools as well as the PowerShell framework for task …

Read More [shareaholic app="share_buttons" id="15671367"]

EY Survey: Higher Budgets Not Enough to Inspire Confidence in India Inc.’s Cyber Security

by January 12, 2017

While India Inc. is spending more on cybersecurity each year, organizations are still not confident of their ability to sense, resist and respond to cyber threats, says the latest survey …

Read More [shareaholic app="share_buttons" id="15671367"]

Four in Ten Businesses Unclear How to Save Themselves from DDoS

by January 6, 2017

Research from Kaspersky Lab has found that businesses are not ready to protect themselves against DDoS, with four in ten (39 percent) businesses unclear about the most effective protection strategy …

Read More [shareaholic app="share_buttons" id="15671367"]

Accenture Survey: One in Three Cyber Attacks Results in a Security Breach

by November 7, 2016

ONE in three cyber attacks results in a security breach, yet most organizations remain confident in their ability to protect themselves. A new security survey from Accenture finds that in the …

Read More [shareaholic app="share_buttons" id="15671367"]

eScan Research Advices How to Use Your Debit and Credit Card Safely

by October 25, 2016

Recently it had been revealed that around 3.2 million Debit Cards have been compromised, belonging to Indian users. According to various reports, Debit card users of SBI, HDFC bank, ICICI, …

Read More [shareaholic app="share_buttons" id="15671367"]

Closing the Cybersecurity Skills Gap — Calling All Women

by October 25, 2016

By Michelle Johnson Cobb: Vice President, Worldwide Marketing for Skybox Security As cyber threats have become more sophisticated, networks more complex and cyber security issues of greater concern at the board …

Read More [shareaholic app="share_buttons" id="15671367"]

Securing Smart Cities from Cyber Attacks

by September 17, 2016

Kaspersky Lab researchers examined a number of digital kiosks and interactive terminals used in smart cities for different purposes – from paying for different services through to entertainment – and discovered …

Read More [shareaholic app="share_buttons" id="15671367"]

From Captain Crunch to Stuxnet: Five Hacks That Are Totally Insane

by June 1, 2016

NEW DELHI, INDIA: In the early 70s John Draper made a long-distance call for free by blowing a precise tone into a telephone which opened the phone system’s line. He …

Read More [shareaholic app="share_buttons" id="15671367"]

Low-tech Attackers Harness Open Source Security Tools for Targeted Cyberespionage

by April 28, 2016

NEW DELHI, INDIA: A new trend among cyber espionage threat actors has been uncovered: instead of developing customized hacking tools or buying them from third-party suppliers on the criminal underground, …

Read More [shareaholic app="share_buttons" id="15671367"]

Electricity Outage and Cyber Espionage in Ukraine Connected – ESET

by January 6, 2016

NEW DELHI, INDIA: Researchers at ESET have found a connection between the recent cyber-attacks against energy companies in Ukraine in December 2015 and the attacks on media and Ukrainian government …

Read More [shareaholic app="share_buttons" id="15671367"]

Black Vine targeting multiple industries since 2012

by July 31, 2015

Earlier this year, the second largest health insurance provider in the US publicly disclosed that it had been the victim of a major cyber attack which is believed to be …

Read More [shareaholic app="share_buttons" id="15671367"]

Global Cyber Security Threats Landscape

by July 15, 2015

Attacks to penetrate security setups of organizations are becoming more targeted, with attackers focusing ever more sharply on stealing business …

Read More [shareaholic app="share_buttons" id="15671367"]

Small Businesses are big opportunities for cyber attacks

by May 8, 2015

Small businesses often have fewer resources to invest in security, and many are still not adopting simple and basic best practices such as blocking executable files and screensaver email attachments. …

Read More [shareaholic app="share_buttons" id="15671367"]

RSA Conference 2015 Study: 82% of Organizations Expect a Cyberattack

by April 17, 2015

According to a study by ISACA and RSA Conference, 82 percent of organizations expect to be attacked in 2015, but they are relying on a talent pool they view as …

Read More [shareaholic app="share_buttons" id="15671367"]