Many public cloud infrastructures suffer from serious security loophole

Working with public cloud infrastructure without the right understanding of risks and security challenges may prove to be a risky bet today.....


Forget crowbars, hackers can break in with laser beams

Researchers recently announced that they discovered a means of taking over Apple’s Siri, Google Home, or Amazon’s Alexa from hundreds.....


New Update Lets Windows Users Test Extended Security Updates

Microsoft has a released an optional Windows 7 and Windows Server 2008 R2 SP1 update that let's customers who have signed up for extended.....


QRL Jacking: Are QR codes as secure as we believe them to be?

Scanning QR codes for authentication lets you log in to an app without having to memorize credentials. Chat applications, banking services.....


Advantages of dual-frequency GNSS (Global Satellite Navigation Systems) in smartphones

A smartphone identifies its position via either satellite radio signals or GNSS (Global Navigation Satellite System). Currently, the vast majority.....


Common evasive phishing tactics that cybercriminals opt to spread ransomware

There has been a steep rise in ransomware attacks against multiple government organizations, and cities across the globe. Hackers are.....


Google patches Chrome flaw used in mysterious WizardOpium exploit attack

Google last update to its Chrome browser for Windows, Mac and Linux desktop environments, fixing two high-level vulnerabilities.....


How Global Navigation Satellite System (GNSS) works?

Global Navigation Satellite System, popularly known as GNSS, is a satellite navigation or satnav system that uses small satellites.....


Dtrack RAT: The Malware Targeting Indian Financial Institutions

Researchers discovered the Dtrack spy tool when they were analyzing the ATMDtrack malware that was targeting Indian banks.....


Mysterious malware that re-installs itself infected over 45,000 Android Phones

Over the past few months, hundreds of Android users have been complaining online of a new piece of mysterious malware that hides.....


How to keep your IoT devices secured with these best tips

IoT is continuously making progress to our homes and as more IoT devices are getting released on a regular basis, it can help to track.....


Scammers are targeting Cash App users with fake ‘free-money’ giveaway campaigns

Cash App payment service conducts marketing campaigns that offer cash rewards, on social media platforms such as Twitter or Instagram.....


What We Know About The New Medusalocker Ransomware

A new ransomware dubbed MedusaLocker has been observed to be infecting victims from all over the world. Details such as mode of distribution.....


Stealthy Microsoft SQL Server Backdoor Malware Spotted in the Wild

Cybersecurity researchers claim to have discovered a previously undocumented backdoor specifically designed for Microsoft SQL servers.....


Employee behavior among biggest challenges to cyber security in India

The study further found that 63% of Indian businesses were concerned about being exposed to cyber criminals due to employee error.....


New Malvertising Variant Leverages Google Ads To Serve Malware Through Legitimate Websites

A new type of malvertising campaign that leverages Google ads has been found distributing malware. One such incident has been cited.....


What is Open Building information modeling (BIM) and why is it important?

Building information modeling (BIM) is a process involving the generation and management of digital representations of physical and.....


Scammers Using Hacked Servers, Bogus Links to Target LinkedIn Users

Digital fraudsters are using compromised servers and bogus links in an ongoing effort to target LinkedIn members with scams.....


Adobe patches 81 vulnerabilities for four products

Adobe issued an out of band updated today for Experience Manager, Experience Manager Forms, Adobe Acrobat and Reader and Download Manager.....


Future of data in a fast-changing digital landscape

With data being the ‘new oil’ and the debates on privacy occupying the center stage of social and political discourse, it is time.....


Different Bluetooth Hacking Techniques That You Should Know To Prevent Loss Of Data

Bluetooth is a wireless communication protocol developed in 1998. It simplifies the transfer of files, photos and docs for low peripheral.....


Using location intelligence to make business predictions

In real estate, there is a saying about what matters most: location, location, location. This is also true for other business.....


Instagram Adds New Tool to Help Users Identify Phishing Scams

The tool has been introduced following the rise in fake Instagram emails. The new feature introduced by Instagram aims to verify emails.....


Six Cybersecurity Information for Business Travelers

Travelers, especially those on business trips carry devices with valuable personal and business information making them lucrative.....


D-Link router models affected by remote code execution issue that will not be fixed

Security experts disclosed a remote code execution vulnerability tracked as CVE-2019-16920. The vulnerability is an unauthenticated.....


How to ensure cybersecurity in the world of remote work?

As an increasing number of companies offer the option of working remotely, cybersecurity is an important aspect to consider.....


New Masad Stealer Malware Exfiltrates Crypto Wallets via Telegram

A new and actively distributed malware strain dubbed Masad Stealer steals files, browser information, and cryptocurrency wallet data.....


Know about the risks and challenges associated with Geolocation

Geolocation technology is becoming a mainstay in society after being utilized from navigation tools to social media platforms.....


Malicious Ad Blockers for Chrome Caught in Ad Fraud Scheme

Google has removed two malicious ad blockers from its Chrome Web Store after a researcher discovered they were carrying out ad fraud.....


Flaw Gives Hackers Remote Access to Files Stored on D-Link DNS-320 Devices

D-Link DNS-320 ShareCenter network-attached storage (NAS) devices are affected by a critical vulnerability that can be exploited.....


Cyber Security Tip: How to be safe using social media

Social media sites such as Facebook, Instagram, Twitter and the rest are fun ways to keep in touch with friends and family.....


Update Google Chrome Browser to Patch New Critical Security Flaws

Google has released an urgent software update for its Chrome web browser and is urging Windows, Mac, and Linux users to upgrade.....


Researcher Drops phpMyAdmin Zero-Day Affecting All Versions

Cybersecurity researchers recently published details and proof-of-concept for an unpatched zero-day vulnerability in phpMyAdmin—one.....


Impact of technology on modern land surveying techniques

Cybersecurity researchers today revealed the existence of a new and previously undetected critical vulnerability in SIM cards.....


New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS

Cybersecurity researchers today revealed the existence of a new and previously undetected critical vulnerability in SIM cards.....


Mobile Security Flaw Leaves Android Smartphones Vulnerable to SMS Phishing Attacks

Check Point researchers recently discovered a vulnerability to advanced phishing attacks in a wide variety of Android phones.....


Foxit forcing customer password resets after data breach

Foxit Software is forcing its customers to reset their passwords in response to an unauthorized party gaining access to user accounts.....


Google updates Chrome to fix high-severity Blink engine flaw

Google has updated Chrome to fix a high-severity flaw that could enable hackers to carry out remote code execution (RCE) attacks.....


Apple Releases iOS 12.4.1 Emergency Update to Patch 'Jailbreak' Flaw

Apple released iOS 12.4.1 to fix a critical jailbreak vulnerability, like it or not, that was initially patched by the company.....


Malware Found in CamScanner Android App With 100+ Million Users

Beware! Attackers can remotely hijack your Android device and steal data stored on it, if you are using free version of CamScanner.....


GIS – A single source of truth for the utility asset lifecycle

Traditionally, within the electric utilities, GIS has primarily been a tool for asset managers to access basic information about.....


Epic Games Hit With Class Action Lawsuit Over Hacked 'Fortnite' Accounts

Epic Games, the creator of the popular 'Fortnite' video game, is facing a class-action lawsuit from gamers.....


Say Cheese: Ransomware-ing a Canon DSLR Camera

The threat of ransomware is becoming more prevalent and severe as attackers' focus has now moved beyond computers.....


WhatsApp flaw allows hackers to manipulate messages

New vulnerabilities found in messaging app WhatsApp can be used by hackers to manipulate and intercept messages.....


Reverse RDP Attack: The Hyper-V Connection (Vulnerability)

Earlier this year, we published our research on the Reverse RDP Attack. In our previous blog post, we described.....


Role of 4IR and Geospatial in making cities smarter

Cities are increasingly seen not just as the engines of innovation and economic growth but also as the epicenter.....


Google Researchers Disclose PoCs for 4 Remotely Exploitable iOS Flaws

Google's cybersecurity researchers have finally disclosed details and proof-of-concept exploits for 4 out of 5 security.....


India Is Ready To Launch Deep Ocean Mission This October

We are living in an era of environmental uncertainty. One the one hand the eastern and north-eastern Indian states.....


Your Android Phone Can Get Hacked Just By Playing This Video

You should be more careful while playing a video on your smartphone—downloaded anywhere from the Internet or received through email.....


AI-powered mapping service for OSM community from facebook

Facebook has opened up its Map With AI service to the OSM community. This means anyone can have access to Facebook’s....


Whatsapp, Telegram media files can be manipulated on android devices

A new research by Symantec talks about the dangers of Media File Jacking, a type of attack undertaken by cybercriminals....


“Agent Smith”: The New Virus to Hit Mobile Devices In India

Check Point Researchers recently discovered a new variant of mobile malware that quietly infected around 25 million devices,....


Digilocker Allows You To Carry Documents On The Go

The explosion of technology has led to a rapid rise in digital assets and transactions. Mobile phones are now....


Cyber Security in Financial Inclusion for International and National Sectors

Today, digital assets and transactions rapidly rised by the gwroth of advanced technolgy. social media platforms....


Important Flaw in Outlook App for Android Affects Over 100 Millions Users

Microsoft today released an updated version of its "Outlook for Android" that patches an important security vulnerability....


Five Tips To Improve Your Cybersecurity Knowledge

All of that sounds daunting—like cybersecurity is an exercise in futility—but there are things you can do....


Cyber Threat Intelligence Conclave On 31st May 2019

In today’s busy, high-tech world, most of us have a wide variety of our own personal information stored either online...


WhatsApp fixes a critical vulnerability that let attackers install spyware on phones

Whatsapp has recently patched a severe vulnerability that was being exploited by attackers to remotely install surveillance...


Microsoft released the source code of a new Windows Terminal Application

Microsoft released the source code of a new Windows Terminal application today featuring multi-tab support...


Parrot Security OS 4.6 Released with New Updates that bring all the hacking tools

Parrot 4.6 released by Parrot security with so many updates that bring all the hacking tools on the table with new futures...


Retefe Banking Malware Attack on Windows and Mac Users

The Retefe banking Trojan resurfaces in that threat landscape and implements new techniques to avoid detection...


Docker Hub Suffers a Data Breach, Asks Users to Reset Password

Docker Hub, one of the largest cloud-based library of Docker container images, has suffered a data breach after an unknown...


Several video game companies found to be infected with malware used in ShadowHammer

Several video game companies have been found to be infected with malware in a similar manner as was done with ASUS computers...


'Karkoff' Is the New 'DNSpionage' With Selective Targeting Strategy

The cybercriminal group behind the infamous DNSpionage malware campaign has been found running a new sophisticated...


Google: Expect longer Android app review process for unknown developers

After Google began restricting which Android apps can gain SMS and Call Log permissions, the company is now focusing on...


The Nasty List Phishing Scam is Sweeping Through Instagram

A new phishing scam called the "The Nasty List" is sweeping through Instagram and is targeting victim's login credentials...


Microsoft reveals hackers accessed some Outlook.com accounts for months

Microsoft has started notifying some Outlook.com users that a hacker was able to access accounts for months earlier this year...


Bug in the Skype Android app makes it automatically answer incoming calls

Android device owners are complaining about a bug in Skype that makes it automatically answer incoming calls....


WARNING: Scammers now trying to steal your details through Paypal

The Australian Cyber Security Centre (ACSC) is warning Aussies about malicious emails from scammers pretending...


UltraHack: The Security Risks of Medical Internet of Things (IoT)

IoT devices make our lives easier. Smart home technology, for example, can help users improve energy efficiency...


"Family Locator" Leaks Real-Time Location Data of App Users

A popular family tracking app, Family Locator, was found leaking the real-time locations of more than ...


LTE protocol Revealed That There Are 51 Security Flaws

In the latest research, A four-person research team from the Korean Advanced Institute of Science and Technology...


Microsoft Announces Windows Defender ATP Antivirus for Mac

Microsoft Thursday announced that the company is bringing its anti-malware software to Apple’s macOS operating system...


Android Q provides users more control over location data

Location is at the very core of smartphone experience for Android users. Be it searching a good eatery or a store...


Check Point Forensic Files: A New Monero CryptoMiner Campaign

A new variant of the Monero mining malware has been detected by the Sand Blast Agent Forensics team, which is spreading...


JNEC.a Ransomware Spread by WinRAR Ace Exploit

A new ransomware called JNEC.a spreads through an exploit for the recently reported code execution ACE vulnerability in WinRAR.


Microsoft Releases New updates a total of 64 CVE-listed security vulnerabilities

Microsoft released its March 2019 software updates to address a total of 64 CVE-listed security vulnerabilities...


LokiBot: An info-stealer malware targets Android systems

LokiBot is an info-stealer malware that was first detected in February 2016. LokiBot targets Android systems...


The thermal drone market is rapidly expanding everywhere

Unmanned aerial systems (UAS), more commonly known as drones, have infiltrated the geospatial world. And that’s a good thing...


New Google Chrome Zero-Day Vulnerability Found Actively Exploited in the Wild

You must update your Google Chrome immediately to the latest version of the web browsing application...


Bluesky 3D models improve Mobile, 5G and Smart City network planning

3D digital models derived from high-resolution aerial photography are helping network operators plan the rollout of services...


"Beyond the Grave" Phishing Campaign Targets Hedge Funds

The International hedge funds have become a victim of a new phishing campaign called "Beyond the Grave" that alter data...


New Golang Brute-Forcer Targeting E-Commerce Sites

A new malware has been spotted by security firm Malwarebytes, which is making rounds in the e-commerce space...


Decongesting cities trough optimum utilization of assets

During the last few decades, congestion has become a major challenge in Indian Cities. Not only in India but cities across the world face...


Smart Hack: Smart Home Hub Vulnerable to Remote Attacks Due To Weak Credentials

Smart devices, like security cameras, baby monitors, TV media boxes, smart TVs, printers, and gaming consoles,...


Formjacking: The Latest Evolving Scam

Symantec’s 2019 Internet Security Threat Report takes a deep dive into insights...



Munchy Malware Distributed via DHL Phishing Campaign

A new trojan named Muncy, a phishing campaign from DHL and entitled “DHL Shipment Notification” has been found targeting users worldwide.



Kali Linux 2019.1 Released – Kernel 4.19.13, Metasploit 5.0 and Package Updates

Kali Linux 2019.1 released with a number of bug fixes and includes kernel up to...



New version of Separ malware infects hundreds of businesses through ‘Living Off the Land’

An ongoing phishing campaign is using a new variant of Separ malware to infect hundreds of businesses located mainly in Southeast Asia...



JD Finance stored user's screenshots without permission

JD Finance, a financial services arm of JD.com apologized to its users for storing screenshots without user permission after a user posted a video on...



Google implement new feature to stop sites from detecting Incognito Mode

Google Chrome's Incognito mode is a helpful feature for private browsing however, it is not free of any faults.



From 16 Famous Websites 620 Million Stolen User Data Hits The Dark Web

A new shocking report revealed that almost 620 million online account data from 16 famous websites are on sale on the dark web.