With social media gaining prominence, the Union Ministry of Electronics and IT has made amendments to Information Technology (IT) Act 2000, which is likely to be introduced in the ongoing winter session of Parliament. A Cabinet note has been readied by the ministry. The note has already received a legal vetting from the law ministry, a senior government official told ...
Read More »Cyber Security News
HOW DISRUPTIVE TECHNOLOGIES ARE TRANSFORMING THE CYBER SECURITY LANDSCAPE
In this digital savvy world, what could be the most daunting nightmare of a technophile? Cyber-crime, evidently! Yes, online privacy and data breaches can shoot nervous breakdown of a tech-geek. And the way to ride out this issue is efficient cyber security, for sure! The nexus of techniques and tools to protect computer networks, programs, and data from illegitimate access ...
Read More »DLL Hijacking attacks: What is it and how to stay protected?
DLL Hijacking attacks are broadly categorized into three types – DLL search order attack, DLL side-loading attack, and Phantom DLL Hijacking attack. For DLL hijacking attack to be successful, it would require an attacker to trick victims to open a file using a vulnerable application from a remote network location. DLL Hijacking is an attack vector that could allow attackers ...
Read More »Cybercriminals leverage ‘Fake CDC Flu’ warning to distribute GandCrab 5.2 ransomware
The attack begins with users receiving a fake CDC email. In order to make it less suspicious, the email is distributed under the subject line of ‘Flu Pandemic Warning’. The infamous GandCrab is back in a new phishing campaign. Here, the attackers are using fake Center for Disease Control (CDC) warning to distribute the GandCrab 5.2 ransomware onto the victims’ ...
Read More »Attackers compromised Pakistani government website to deliver Scanbox Framework payload
Researchers detected a compromised Pakistani government website that delivers Scanbox Framework payload whenever anyone visits the site. Trustwave notified the Pakistani government website about the infection, however, the site still remains compromised. What is the issue – Researchers from Trustwave detected a compromised Pakistani government website that delivers Scanbox Framework payload whenever anyone visits the site. Worth noting – The compromised Pakistani ...
Read More »Man drives 3,300 miles to talk to YouTube about deleted video
On Sunday, police in Mountain View, California, where Google is headquartered, arrested a man who drove more than 3,300 miles from Maine to discuss what he thought was the company’s removal of his YouTube account and the one video he’d posted – one about getting rich quick. It was not, in fact, deleted by YouTube. It turns out, his wife ...
Read More »SECURITY & FRAUDIndia Lender Warns Of WhatsApp Scam That Steals Bank Details
State Bank of India (SBI), the country’s biggest lender, has issued a warning that account holders are being tricked into offering up personal banking details. According to a report in BGR, SBI said messages from WhatsApp and other social media platforms are tricking customers into sharing details of their accounts. The hackers are tricking the users by first sending a message in an effort ...
Read More »Stolen email credentials being used to pry into cloud accounts
Malicious actors are using the massive supply of previously stolen login credentials to help brute force their way into high-profile cloud-based business systems that cannot easily use two-factor authentication for security. Proofpoint researchers found the availability of these tools has powered a massive increase in the number of cloud attacks taking place which in turn enable the attackers to possibly ...
Read More »RSAC 2019: For Domestic Abuse, IoT Devices Pose New Threat
When it comes to domestic abuse, smart products around the house are turning into new threats, a panel of experts said at RSA. SAN FRANCISCO – The influx of connected products in the home – from smart thermometers to connected locks – presents a disturbing new threat surface for victims of domestic abuse. That’s what Lisa Green, senior director of ...
Read More »Software maker Citrix hacked, business documents removed
Acting on a tip from the FBI, Citrix has investigated and confirmed that its network has been penetrated and data had been exfiltrated by an outside force. Neither the extent of nor the specifics of what has been removed has been determined, but in a statement Citrix said business documents have been accessed and downloaded by malicious actors. The FBI contacted Citrix ...
Read More »