Nearly 10% of coronavirus websites, false or suspicious

Experts agree that misinformation surrounding the coronavirus poses a threat to human health.....


Microsoft Issues March 2020 Updates to Patch 115 Security Flaws

Microsoft today released security updates to fix a total of 115 new security vulnerabilities in various.....


Top Tips for Secure Remote Working

We naturally tend to be more relaxed at home, especially when it comes to security. After all, we’re in the safety.....


Initiatives to eliminate misinformation: Functional or flawed?

Misinformation pertaining to the coronavirus is proliferating and circulating through pockets of society.....


Defeat hackers by using these two tricks to secure your Gmail account

Your Gmail account is a repository of your online purchasing history, your passwords and other personal information.....


Unnerving tax scams, businesses beware

This year, tax firms are facing intimidating malware threats. “If you have the word ‘tax’ in your domain name.....


Android Malware Can Break Your Phone When You Delete It

Android platform has stayed true to its commitment to provide open and free source code. The source code.....


Critical Bug in WordPress Theme Plugin Opens 200,000 Sites to Hackers

A popular WordPress theme plugin with over 200,000 active installations contains a severe but easy-to-exploit.....


WHO Warns of Phishing Scams Related to Coronavirus Alert

The World Health Organization (WHO) has released a warning about Coronavirus-themed phishing attacks.....


SPAM: What is Spamdexing and How to Address It?

In digital marketing and online advertising, Spamdexing or SEO spam is one of the most common hacks to increase.....


Navigating the difference between Geolocation and Geolocation by IP

Finding a user’s location can be one of the most powerful tools for digital marketers. However, factors such.....


Intel warns of critical security flaw in CSME engine, issues discontinued product notices

Intel has warned of a critical vulnerability in the CSME security engine and has urged users to apply.....


Adobe Releases Patches for Dozens of Critical Flaws in 5 Software

Adobe today released the latest security updates for five of its widely used software that patch a total.....


What is a Zero-Day Vulnerability and How Can It Impact Businesses

Zero-day attacks come without warning. Such attacks can pose a high risk for a company or business if appropriate.....


Using WhatsApp on Your Computer Could Put Your Files at Risk

Researchers have reported a vulnerability in WhatsApp desktop client for iPhones which puts victim's.....


Newly Released Emocheck Tool Can Detect Systems Infected With Emotet Trojan

A new utility tool called EmoCheck has been released by Japan CERT. It will allow Windows users to easily check.....


Sudo Bug Lets Non-Privileged Linux and macOS Users Run Commands as Root

Researchers has found another significant vulnerability in sudo utility that under a specific configuration.....


Microsoft Azure Flaws Could Have Let Hackers Take Over Cloud Servers

Cybersecurity researchers disclosed details of two recently patched potentially dangerous vulnerabilities in Microsoft Azure.....


How satellite imagery is crucial for monitoring climate change

At the Geospatial World Forum 2020 session on ‘Geo4SDGs’, light will be shed on the way geospatial and 5G together.....


How to Clear Data Facebook Collects About You from Other Sites and Apps

Facebook is one of the world's biggest advertising platforms, and that's because it knows a lot about you, me, and everyone.....


Intel is patching its Zombieload CPU security flaw for the third time

For the third time in less than a year, Intel has disclosed a new set of vulnerabilities related to the speculative.....


Fake Amazon Representatives Involved in England’s Phone Scam

Recently, scammers impersonating representatives from Amazon were reported calling up Amazon users and offering.....


How geospatial imaging can help solar developers

Solar development is an incredibly fast-growing industry. The solar industry has seen 50% growth year-over-year.....


FTCode Ransomware Returns with Credential-Stealing Capabilities

A group of researchers reported that FTCode ransomware is now armed with browser, email password-stealing.....


Microsoft discovers new sLoad 2.0 (Starslord) malware

After thoroughly having its secrets laid bare last month in a Microsoft exposé report, the operators.....


Juice Jacking, the Threat That Travelers Need to Know About

Juice jacking is becoming a real threat for people, especially for those charging their phones.....


Geospatial Technology: Use of LiDAR in disaster response

LiDAR can be used to generate detailed maps of topography and retrieve digital elevation data.....


Google Researchers Publish Technical Details of Critical iMessage Vulnerability

Google Project Zero security researchers have published technical details on the critical iMessage vulnerability.....


Mobile Sensor Becomes the New Evasion Technique for Phishing Attack

Security experts have detected that attackers are leveraging a new and unique evasion technique to launch phishing attacks.....


Dissecting Different Attacks on Wordpress-powered Websites

WordPress is a well-known open-source content management system (CMS) used for creating websites and personal blogs. Given the wide usage of the platform.....


Researchers Demonstrate How to Hack Any TikTok Account by Sending SMS

TikTok, the 3rd most downloaded app in 2019, is under intense scrutiny over users' privacy, censoring politically controversial content.....


Cyber Security: Fast forecasts for the future

Despite the formidable capabilities of cyber security tools, including their abilities to behave in hyper-fast, extremely dynamic, and exceedingly.....


Cybercriminals Adopt Steganography-based Credit Card Skimmer to Steal Payment Card Details

Steganography has long been used by malware authors to hide malicious data within legitimate-looking images and currently, it is being used by cybercriminals.....


Geospatial Technology: Role of geolocation tools in boosting sales

Geolocation platforms and apps have proven to be more than merely handy tools used in sales. They provide amazing insight into any kind of target.....


Some Old and New Security Vulnerabilities Which Need to be Patched Before 2020

Nearly 45 new vulnerabilities get discovered on average every day. Since 2016, Researchers has observed an increase of 130% in the total.....


Understanding the threats and risk of USB Flash Drive Malware

Plugging an unattended USB flash drive to a host system or network is no less than a threat. Such drives can be infected with viruses.....


Entrepreneurs hit by possible SS7 breach on popular messaging app

Recently, more than a dozen entrepreneurs’ accounts were hacked via the Telegram messaging app. The hack suggests a possible interception.....


5 ways LIDAR is transforming the world before our eyes

LIDAR has multiple applications and utilities and their full scope would soon extend beyond our imagination as it unravels in the future.....


Transforming Economies in 5G era – The Geospatial Way

5G will impact key sectors like manufacturing to energy, transportation, smart cities, healthcare and much more. Its improved speeds.....


WhatsApp exploit let one message render the app unusable for entire groups

WhatsApp may be one of the most popular messaging apps, but it has had its share of security issues. Security research group Check Point Research announced.....


Weak Password: What’s with workplace password security?

When it comes to creating long, secure passwords for accounts, computer users frequently fancy themselves too busy to bother, and unable to.....


New VegaLocker ransomware variant targets healthcare and IT sectors

Cybercriminals have developed a new ransomware variant called Zeppelin. It is being used to target healthcare and tech companies in U.S., Canada, and Europe.....


The largest cyber menaces for financial institutions

Previously, bank heists involved snatching the cash and running. Now, they’re digital, more elaborate, and more dangerous. Over the past five years.....


Adobe Releases Patches for 'Likely Exploitable' Critical Vulnerabilities

Adobe released updates for four of its widely used software—including Adobe Acrobat and Reader, Photoshop CC, ColdFusion, and Brackets—to patch.....


For social media, AI powered content recognition expands possibilities

Social media companies have been searching for better ways to identify, and remove harmful online content. Human moderation of social media.....


How innocent looking abstract designs can steal your money

The now ubiquitous QR code (machine readable optical labels that are arranged as squares with black designs in them) for phones are being.....


New Linux Bug Lets Attackers Hijack Encrypted VPN Connections

A team of cybersecurity researchers has disclosed a new severe vulnerability affecting most Linux and Unix-like operating systems, including FreeBSD.....


Unpatched systems are still one of the significant attack vectors to launch cyberattacks

Leaving a vulnerable system unpatched can invite troubles for an organization. The issue can turn worse when the organization suffers a cyberattack.....


This December Android Users Get Several Security Updates

A DoS flaw tracked as CVE-2019-2232 is said to be the most severe flaw this particular update tends to. The fix has been rolled out for Android.....


How artificial intelligence (AI) enhances cyber security

Cyber attacks continue to evolve at an ever-increasing pace. Threats have become more sophisticated and dangerous compared to just a few years ago.....


What is Geoconstruction? and why is it required in the modern world?

With the increasing population and mass urbanization along with pressure of modernization on developing countries, the construction.....


Long-known Vulnerabilities in High-Profile Android Applications

Most mobile users understandably worry about known vulnerabilities in the core operating system of their devices, which can give an attacker.....


Use of geospatial AI(Artificial Intelligence) for business development

When it comes to the relationship between business development and technological innovation, we can generally separate two schools of thought.....


Digital lives in danger: How cyber attacks are evolving

Hostile cyber threats are escalating in frequency and severity, and threaten to undermine our civil and commercial institutions.....


20 minutes or less and hackers can weaponize your biometrics

Biometric passwords have become popular, but vulnerabilities in these systems leave users’ phones and data at risk of being hacked.....


Many public cloud infrastructures suffer from serious security loophole

Working with public cloud infrastructure without the right understanding of risks and security challenges may prove to be a risky bet today.....


Forget crowbars, hackers can break in with laser beams

Researchers recently announced that they discovered a means of taking over Apple’s Siri, Google Home, or Amazon’s Alexa from hundreds.....


New Update Lets Windows Users Test Extended Security Updates

Microsoft has a released an optional Windows 7 and Windows Server 2008 R2 SP1 update that let's customers who have signed up for extended.....


QRL Jacking: Are QR codes as secure as we believe them to be?

Scanning QR codes for authentication lets you log in to an app without having to memorize credentials. Chat applications, banking services.....


Advantages of dual-frequency GNSS (Global Satellite Navigation Systems) in smartphones

A smartphone identifies its position via either satellite radio signals or GNSS (Global Navigation Satellite System). Currently, the vast majority.....


Common evasive phishing tactics that cybercriminals opt to spread ransomware

There has been a steep rise in ransomware attacks against multiple government organizations, and cities across the globe. Hackers are.....


Google patches Chrome flaw used in mysterious WizardOpium exploit attack

Google last update to its Chrome browser for Windows, Mac and Linux desktop environments, fixing two high-level vulnerabilities.....


How Global Navigation Satellite System (GNSS) works?

Global Navigation Satellite System, popularly known as GNSS, is a satellite navigation or satnav system that uses small satellites.....


Dtrack RAT: The Malware Targeting Indian Financial Institutions

Researchers discovered the Dtrack spy tool when they were analyzing the ATMDtrack malware that was targeting Indian banks.....


Mysterious malware that re-installs itself infected over 45,000 Android Phones

Over the past few months, hundreds of Android users have been complaining online of a new piece of mysterious malware that hides.....


How to keep your IoT devices secured with these best tips

IoT is continuously making progress to our homes and as more IoT devices are getting released on a regular basis, it can help to track.....


Scammers are targeting Cash App users with fake ‘free-money’ giveaway campaigns

Cash App payment service conducts marketing campaigns that offer cash rewards, on social media platforms such as Twitter or Instagram.....


What We Know About The New Medusalocker Ransomware

A new ransomware dubbed MedusaLocker has been observed to be infecting victims from all over the world. Details such as mode of distribution.....


Stealthy Microsoft SQL Server Backdoor Malware Spotted in the Wild

Cybersecurity researchers claim to have discovered a previously undocumented backdoor specifically designed for Microsoft SQL servers.....


Employee behavior among biggest challenges to cyber security in India

The study further found that 63% of Indian businesses were concerned about being exposed to cyber criminals due to employee error.....


New Malvertising Variant Leverages Google Ads To Serve Malware Through Legitimate Websites

A new type of malvertising campaign that leverages Google ads has been found distributing malware. One such incident has been cited.....


What is Open Building information modeling (BIM) and why is it important?

Building information modeling (BIM) is a process involving the generation and management of digital representations of physical and.....


Scammers Using Hacked Servers, Bogus Links to Target LinkedIn Users

Digital fraudsters are using compromised servers and bogus links in an ongoing effort to target LinkedIn members with scams.....


Adobe patches 81 vulnerabilities for four products

Adobe issued an out of band updated today for Experience Manager, Experience Manager Forms, Adobe Acrobat and Reader and Download Manager.....


Future of data in a fast-changing digital landscape

With data being the ‘new oil’ and the debates on privacy occupying the center stage of social and political discourse, it is time.....


Different Bluetooth Hacking Techniques That You Should Know To Prevent Loss Of Data

Bluetooth is a wireless communication protocol developed in 1998. It simplifies the transfer of files, photos and docs for low peripheral.....


Using location intelligence to make business predictions

In real estate, there is a saying about what matters most: location, location, location. This is also true for other business.....


Instagram Adds New Tool to Help Users Identify Phishing Scams

The tool has been introduced following the rise in fake Instagram emails. The new feature introduced by Instagram aims to verify emails.....


Six Cybersecurity Information for Business Travelers

Travelers, especially those on business trips carry devices with valuable personal and business information making them lucrative.....


D-Link router models affected by remote code execution issue that will not be fixed

Security experts disclosed a remote code execution vulnerability tracked as CVE-2019-16920. The vulnerability is an unauthenticated.....


How to ensure cybersecurity in the world of remote work?

As an increasing number of companies offer the option of working remotely, cybersecurity is an important aspect to consider.....


New Masad Stealer Malware Exfiltrates Crypto Wallets via Telegram

A new and actively distributed malware strain dubbed Masad Stealer steals files, browser information, and cryptocurrency wallet data.....


Know about the risks and challenges associated with Geolocation

Geolocation technology is becoming a mainstay in society after being utilized from navigation tools to social media platforms.....


Malicious Ad Blockers for Chrome Caught in Ad Fraud Scheme

Google has removed two malicious ad blockers from its Chrome Web Store after a researcher discovered they were carrying out ad fraud.....


Flaw Gives Hackers Remote Access to Files Stored on D-Link DNS-320 Devices

D-Link DNS-320 ShareCenter network-attached storage (NAS) devices are affected by a critical vulnerability that can be exploited.....


Cyber Security Tip: How to be safe using social media

Social media sites such as Facebook, Instagram, Twitter and the rest are fun ways to keep in touch with friends and family.....


Update Google Chrome Browser to Patch New Critical Security Flaws

Google has released an urgent software update for its Chrome web browser and is urging Windows, Mac, and Linux users to upgrade.....


Researcher Drops phpMyAdmin Zero-Day Affecting All Versions

Cybersecurity researchers recently published details and proof-of-concept for an unpatched zero-day vulnerability in phpMyAdmin—one.....


Impact of technology on modern land surveying techniques

Cybersecurity researchers today revealed the existence of a new and previously undetected critical vulnerability in SIM cards.....


New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS

Cybersecurity researchers today revealed the existence of a new and previously undetected critical vulnerability in SIM cards.....


Mobile Security Flaw Leaves Android Smartphones Vulnerable to SMS Phishing Attacks

Check Point researchers recently discovered a vulnerability to advanced phishing attacks in a wide variety of Android phones.....


Foxit forcing customer password resets after data breach

Foxit Software is forcing its customers to reset their passwords in response to an unauthorized party gaining access to user accounts.....


Google updates Chrome to fix high-severity Blink engine flaw

Google has updated Chrome to fix a high-severity flaw that could enable hackers to carry out remote code execution (RCE) attacks.....


Apple Releases iOS 12.4.1 Emergency Update to Patch 'Jailbreak' Flaw

Apple released iOS 12.4.1 to fix a critical jailbreak vulnerability, like it or not, that was initially patched by the company.....


Malware Found in CamScanner Android App With 100+ Million Users

Beware! Attackers can remotely hijack your Android device and steal data stored on it, if you are using free version of CamScanner.....


GIS – A single source of truth for the utility asset lifecycle

Traditionally, within the electric utilities, GIS has primarily been a tool for asset managers to access basic information about.....


Epic Games Hit With Class Action Lawsuit Over Hacked 'Fortnite' Accounts

Epic Games, the creator of the popular 'Fortnite' video game, is facing a class-action lawsuit from gamers.....


Say Cheese: Ransomware-ing a Canon DSLR Camera

The threat of ransomware is becoming more prevalent and severe as attackers' focus has now moved beyond computers.....


WhatsApp flaw allows hackers to manipulate messages

New vulnerabilities found in messaging app WhatsApp can be used by hackers to manipulate and intercept messages.....


Reverse RDP Attack: The Hyper-V Connection (Vulnerability)

Earlier this year, we published our research on the Reverse RDP Attack. In our previous blog post, we described.....


Role of 4IR and Geospatial in making cities smarter

Cities are increasingly seen not just as the engines of innovation and economic growth but also as the epicenter.....


Google Researchers Disclose PoCs for 4 Remotely Exploitable iOS Flaws

Google's cybersecurity researchers have finally disclosed details and proof-of-concept exploits for 4 out of 5 security.....


India Is Ready To Launch Deep Ocean Mission This October

We are living in an era of environmental uncertainty. One the one hand the eastern and north-eastern Indian states.....


Your Android Phone Can Get Hacked Just By Playing This Video

You should be more careful while playing a video on your smartphone—downloaded anywhere from the Internet or received through email.....


AI-powered mapping service for OSM community from facebook

Facebook has opened up its Map With AI service to the OSM community. This means anyone can have access to Facebook’s....


Whatsapp, Telegram media files can be manipulated on android devices

A new research by Symantec talks about the dangers of Media File Jacking, a type of attack undertaken by cybercriminals....


“Agent Smith”: The New Virus to Hit Mobile Devices In India

Check Point Researchers recently discovered a new variant of mobile malware that quietly infected around 25 million devices,....


Digilocker Allows You To Carry Documents On The Go

The explosion of technology has led to a rapid rise in digital assets and transactions. Mobile phones are now....


Cyber Security in Financial Inclusion for International and National Sectors

Today, digital assets and transactions rapidly rised by the gwroth of advanced technolgy. social media platforms....


Important Flaw in Outlook App for Android Affects Over 100 Millions Users

Microsoft today released an updated version of its "Outlook for Android" that patches an important security vulnerability....


Five Tips To Improve Your Cybersecurity Knowledge

All of that sounds daunting—like cybersecurity is an exercise in futility—but there are things you can do....


Cyber Threat Intelligence Conclave On 31st May 2019

In today’s busy, high-tech world, most of us have a wide variety of our own personal information stored either online...


WhatsApp fixes a critical vulnerability that let attackers install spyware on phones

Whatsapp has recently patched a severe vulnerability that was being exploited by attackers to remotely install surveillance...


Microsoft released the source code of a new Windows Terminal Application

Microsoft released the source code of a new Windows Terminal application today featuring multi-tab support...


Parrot Security OS 4.6 Released with New Updates that bring all the hacking tools

Parrot 4.6 released by Parrot security with so many updates that bring all the hacking tools on the table with new futures...


Retefe Banking Malware Attack on Windows and Mac Users

The Retefe banking Trojan resurfaces in that threat landscape and implements new techniques to avoid detection...


Docker Hub Suffers a Data Breach, Asks Users to Reset Password

Docker Hub, one of the largest cloud-based library of Docker container images, has suffered a data breach after an unknown...


Several video game companies found to be infected with malware used in ShadowHammer

Several video game companies have been found to be infected with malware in a similar manner as was done with ASUS computers...


'Karkoff' Is the New 'DNSpionage' With Selective Targeting Strategy

The cybercriminal group behind the infamous DNSpionage malware campaign has been found running a new sophisticated...


Google: Expect longer Android app review process for unknown developers

After Google began restricting which Android apps can gain SMS and Call Log permissions, the company is now focusing on...


The Nasty List Phishing Scam is Sweeping Through Instagram

A new phishing scam called the "The Nasty List" is sweeping through Instagram and is targeting victim's login credentials...


Microsoft reveals hackers accessed some Outlook.com accounts for months

Microsoft has started notifying some Outlook.com users that a hacker was able to access accounts for months earlier this year...


Bug in the Skype Android app makes it automatically answer incoming calls

Android device owners are complaining about a bug in Skype that makes it automatically answer incoming calls....


WARNING: Scammers now trying to steal your details through Paypal

The Australian Cyber Security Centre (ACSC) is warning Aussies about malicious emails from scammers pretending...


UltraHack: The Security Risks of Medical Internet of Things (IoT)

IoT devices make our lives easier. Smart home technology, for example, can help users improve energy efficiency...


"Family Locator" Leaks Real-Time Location Data of App Users

A popular family tracking app, Family Locator, was found leaking the real-time locations of more than ...


LTE protocol Revealed That There Are 51 Security Flaws

In the latest research, A four-person research team from the Korean Advanced Institute of Science and Technology...


Microsoft Announces Windows Defender ATP Antivirus for Mac

Microsoft Thursday announced that the company is bringing its anti-malware software to Apple’s macOS operating system...


Android Q provides users more control over location data

Location is at the very core of smartphone experience for Android users. Be it searching a good eatery or a store...


Check Point Forensic Files: A New Monero CryptoMiner Campaign

A new variant of the Monero mining malware has been detected by the Sand Blast Agent Forensics team, which is spreading...


JNEC.a Ransomware Spread by WinRAR Ace Exploit

A new ransomware called JNEC.a spreads through an exploit for the recently reported code execution ACE vulnerability in WinRAR.


Microsoft Releases New updates a total of 64 CVE-listed security vulnerabilities

Microsoft released its March 2019 software updates to address a total of 64 CVE-listed security vulnerabilities...


LokiBot: An info-stealer malware targets Android systems

LokiBot is an info-stealer malware that was first detected in February 2016. LokiBot targets Android systems...


The thermal drone market is rapidly expanding everywhere

Unmanned aerial systems (UAS), more commonly known as drones, have infiltrated the geospatial world. And that’s a good thing...


New Google Chrome Zero-Day Vulnerability Found Actively Exploited in the Wild

You must update your Google Chrome immediately to the latest version of the web browsing application...


Bluesky 3D models improve Mobile, 5G and Smart City network planning

3D digital models derived from high-resolution aerial photography are helping network operators plan the rollout of services...


"Beyond the Grave" Phishing Campaign Targets Hedge Funds

The International hedge funds have become a victim of a new phishing campaign called "Beyond the Grave" that alter data...


New Golang Brute-Forcer Targeting E-Commerce Sites

A new malware has been spotted by security firm Malwarebytes, which is making rounds in the e-commerce space...


Decongesting cities trough optimum utilization of assets

During the last few decades, congestion has become a major challenge in Indian Cities. Not only in India but cities across the world face...


Smart Hack: Smart Home Hub Vulnerable to Remote Attacks Due To Weak Credentials

Smart devices, like security cameras, baby monitors, TV media boxes, smart TVs, printers, and gaming consoles,...


Formjacking: The Latest Evolving Scam

Symantec’s 2019 Internet Security Threat Report takes a deep dive into insights...



Munchy Malware Distributed via DHL Phishing Campaign

A new trojan named Muncy, a phishing campaign from DHL and entitled “DHL Shipment Notification” has been found targeting users worldwide.



Kali Linux 2019.1 Released – Kernel 4.19.13, Metasploit 5.0 and Package Updates

Kali Linux 2019.1 released with a number of bug fixes and includes kernel up to...



New version of Separ malware infects hundreds of businesses through ‘Living Off the Land’

An ongoing phishing campaign is using a new variant of Separ malware to infect hundreds of businesses located mainly in Southeast Asia...



JD Finance stored user's screenshots without permission

JD Finance, a financial services arm of JD.com apologized to its users for storing screenshots without user permission after a user posted a video on...



Google implement new feature to stop sites from detecting Incognito Mode

Google Chrome's Incognito mode is a helpful feature for private browsing however, it is not free of any faults.



From 16 Famous Websites 620 Million Stolen User Data Hits The Dark Web

A new shocking report revealed that almost 620 million online account data from 16 famous websites are on sale on the dark web.