Researchers at Promon, a cybersecurity firm better known for its in-app security protection, have found a vulnerability in the Android operating system named “StrandHogg.” It allows malware gangs to hijack legitimate apps and perform malicious operations like phishing.
It is...
Mixcloud, an online music streaming service provider, was recently compromised by a hacker that tried to sell stolen data of more than 20 million users on the dark web marketplace.
The incident came to light after the hacker, who goes...
By Vaidyanathan Iyer, Security Software Leader, IBM India/South Asia
Today, the biggest test chief information security officers (CISOs) face is to find the perfect balance between watertight security and seamless user experience across all the endpoints in their network. This...
NYPD’s fingerprint database was shut down for a few hours in October last year, when an accidental ransomware infection affected nearly 23 machines linked to the department’s LiveScan fingerprint-tracking system.
How it happened?
The incident took place at the Police Academy...
Security researchers revealed that most Malvertising campaigns (malicious ads) target the Windows platform more often than any other operating system.
According to the analysis by cybersecurity firm Devcon, 61 percent of the malicious ads observed between July 11, 2019, and...
By Rudra Srinivas
Since the inception of cryptocurrency (Bitcoin) in 2009, there is a significant evolution of blockchain technology and a variety of challenges as well. Not only investors, but the unique features of cryptocurrency also attracted many eyeballs of...
By Venkat Krishnapur, Vice-President of Engineering and Managing Director, McAfee India
Cloud computing has become near-ubiquitous, with India’s cloud market poised to reach over US$7 billion by 2022. The use of cloud services has empowered organizations to accelerate their businesses...
Nyotron’s research team has discovered a new ransomware technique that goes undetected in most antivirus, anti-ransomware and Endpoint Detection and Response (EDR) solutions. The researchers have named it “RIplace”, as it bypasses latest security products by replacing all sensitive...
In order to boost cybersecurity and tackle next-generation cyber threats, the Singapore government decided to adopt new data protection measures. The government also established a committee, named Public Sector Data Security Review Committee, to review its data security practices.
The...
Statinko Botnet has been around since 2012 and has kept evolving. The latest addition to its wide portfolio of malicious activities like click fraud, ad injection, social network fraud and password-stealing attacks, is Cryptomining. According to the researchers at...














