31.5 C
Mumbai
Wednesday, October 21, 2020
Tel: 8850717892
Home Security Awareness

Security Awareness

India Govt. bans 59 Chinese Applications including TikTok

Chinese tech giants have seen numerous allegations regarding how they store users’ data they collect. This week the Indian Government banned 59 Chinese smartphone...

NVIDIA warns Windows Gamers About GPU Flaws

Recently, Nvidia, the market leader in the design of graphics processing units (GPUs), warns Windows gamers about the reported flaws in the GPU drivers....

Hakbit Ransomware Campaign 2020

Ransomware is the new normal for enterprises and businesses in 2020. Through advanced tactics and well-crafted custom malware, hackers compromise host system, steal sensitive...

CryptoCore Group Stole $200M From Cryptocurrency Exchanges

Along with the introduction of cryptocurrency and blockchain technology, cryptojacking also came into existence. Though experts review blockchain regularly, there are nefarious cyber crooks...

DarkCrewFriends Returns With Botnet Strategy

A notorious hacker-for-hire group DarkCrewFriends has resurfaced affecting content management systems. The group is infamous for targeting sites and systems by building a sprawl...

Oracle’s BlueKai: Billions Of Tracked Data Exposed

Have you ever wondered how ads on websites you visit, social platforms you use depict your interests? We often overlook the creepiness it holds....

DoppelPaymer Ransomware Group: A Threat To Enterprises

Ransomware-a familiar adversary for enterprises and individuals operating online, wholly. The practice of accessing systems, evading detection, keeping data as a hostage and coercing...

40,300 Cyber Attacks on Indian Web by Chinese Hackers

Chinese hackers attempted attack on Indian Cyberspace more than 40,300 times in a week post- Galwan clash An Overview: After a month's face-off at Galwan valley...

AcidBox Malware Leverages Turla’s Exploit To Target Russian Firms

Attackers have found a new way to exploit and compromise organisations by targeting virtualization software. In 2008, a highly notorious pro-Russian Advanced Persistent Threat...

Google Removed 106 Malicious Chrome Extensions

Google developed Chrome-a cross-platform web browser- in 2008. Google Chrome is the most used web browser. With the highest usage share on desktops, mobiles...

Lamphone Attack: Spying Using Light Bulbs

We have the perception of “hacking” as a practice of compromising “smart” devices. What else hackers could use to breach your privacy and spy...

Black Lives Matter Emails Deliver TrickBot Malware

Amid the vogue of COVID-19, the risk of data privacy continues. Recently researchers have figured out a Malspam campaign that delivers a survey on...

Most Read

Equinix Ransomware

RANSOMWARE attack hits Equinix companies internal system. Before going forward we will first see, What is Equinix? Equinix is a leading global interconnection platform, it is...

A brief to Architecture Journalism as a Career Path

Not all students prefer jumping into the career path of practising architecture. It is great when you design, but it could be dreading when...

Social Housing, Home for All

The term ‘social housing’ is given to accommodation which is affordable to low-income people or with particular needs on a secure basis. The state,...

Shopify International Data Breach

First, we will see, What is SHOPIFY ? and how does it work? 1) What is Shopify? Shopify is the best E-Commerce platform that allows anyone to...