The Indian Union Cabinet approved the proposal of Ministry of Home Affairs for Central Sector Scheme “National Forensic Infrastructure Enhancement... Read More
The enactment of the Digital Personal Data Protection (DPDP) Act, 2023 by Government of India in August 2023, is seen as a step towards the glob... Read More
Tableau Software, LLC, was acquired by Salesforce in 2019, the software ‘Tableau’ (a data visualization application), software in use since 2003, ... Read More
As per recent reports in the media: India in the year 2023 had recorded a total of 2,138 weekly cyberattacks per organisation. This is a record in... Read More
From the technology standpoint, the deployment is very simple as well. It seems likely that eSIMs are the way the mobile device industry is moving.
... Read More
In a recent incident in China, a woman dining at a restaurant, was provided with a bill of about ₹.49,00,000/- (60,000 USD or 430,000 yuan). This ... Read More
Chrome from Google (‘Alphabet’), the browser, is presently being used by almost 7 (seven) users among 10 (ten), across the globe. However, the b... Read More
The advent of artificial intelligence (AI) and its use in the world today in cybersecurity presents a paradox. Artificial Intelligence (AI) has pr... Read More
The Oil Minister of Iran Mr Javad Owji on Monday (18 Dec 2023) confirmed that a nationwide disruption to petrol stations was caused by a cyberat... Read More
India is presently on the path to become a USD 5 Trillion economy, within the present decade; notwithstanding, the challenges that the country... Read More
The OpenAI’s software platform, “ChatGPT” (Chat Generative Pre-Trained Transformer) released in the end of November 2022 is a ‘Chatbot’ that use... Read More
The Digital Personal Data Protection Bill 2023 (DPDP-2023) has been notified by the government, after its advances through the routine legislative... Read More
It is not uncommon for Threat Actors in the Cyber Domain, to use and at the same time abuse the Information Technology/ Communication Technolog... Read More
In any organisation that has adopted Information Technology or Information Communication Technology, the all-around protection of its networks and... Read More
The recent attacks on Corporate Entities through Cyber-Digital means, does cause considerable amount of damage to the Corporate House/OEMs/Profess... Read More
The ease of mobility and the ease of convergence, have made not only the Domestic Users of IT and ICT, but even the Enterprise Users, switch to th... Read More
Two CVEs (Common Vulnerabilities and Exposures) namely CVE-2022-27925 and CVE-2022-37042, where earlier reported and was targeted towards the Zimb... Read More
All India Institute of Medical Science (AIIMS), New Delhi, India was in the news in late November 2022, for a Cyber Attack that targeted them affe... Read More
Thales the French multinational company, which was earlier known as Thomson-CSF, finds its origin in 1968, the company was rebranded Thales (nam... Read More
The ISO/IEC 27001 has seen leaps and bounds from the erstwhile era of BS17799 to the present standard. The stringent nature and the difficulty ... Read More
A ‘Banking Trojan’ is a piece of malware that is used primarily to steal banking credentials by remotely installing malicious software on a vic... Read More
Joseph Sullivan, Joined Uber in Spring of year 2015 as its first CSO. This was the time when Uber was experiencing multiple safety and security ... Read More
Ireland’s capital Dublin was one of the two mains areas of focus against the Black Axe cyber crime and money laundering organisation. PHOTO: Interpol... Read More
Tata Power Company Limited in India has an installed and managed electricity generation capacity of 13,974 MW, which is the highest in the count... Read More
Heat Map of "Maggie" Malware (Highest infection being India)
Cyber attacks on Enterprises have been on the rise, post the COVID period. The Sophis... Read More
The US Joint Cybersecurity Advisory (CSA) is a consortium of many organisations like National Security Agency (NSA), Cybersecurity and Infrastruct... Read More
It is but common that System Managers, Information Technology Management Asset Owners, DBAs, CISOs, etc; face with the threat of losing data avail... Read More
A few good recce-warriors or Android Watchers have been able to identify the next batch of Unsuspected Android Apps being used by attackers to pus... Read More
In a recent announcement, the Government of India, voiced the concerns of the obsolete state of the over two-decade old IT Act (Information Techno... Read More
In a recent statement to the Parliament of India, on 19 June 2022, The Minister of State of Home Affairs, Shri Ajay Kumar Mishra, informed that a ... Read More
Media reports in the recent one year or so, has been flooded with reports of victims committing suicide, after having fallen prey to scamsters off... Read More
China, as a country is said to be among the most obsessed nations, with a Communist Regime, of its Cyber Security and Cyber Breach Consciousness. ... Read More
India is ever ready to counter any cyber attack on its infrastructure. Unlike the conventional form of warfare, the cyber warfare is ever predomin... Read More
The Organisation “Roskomnadzor” initially formed in March 2007 under the Russian Government, was earlier a cultural Watchdog of the nation, which ... Read More
The Reserve Bank of India, in a bid to enhance customer safety, have come out with master directions on issuance and operation of credit and debit... Read More
The United States of America, has always been at the forefront of Law Enactment and also implementation of Cyber Security Measures, when we compar... Read More
The new Google News has a fresh look, brand-new briefing and customised topics..
Many of us who have a credential with Google, may be using he “Goo... Read More
Forget Pegasus, new spyware 'Hermit' on Android Discovered in Targeted Attacks..
Even as the allegation being heard by the Hon’ble Supreme Court of... Read More
“Critical Information Infrastructure (Protected System)"..
Section 70 of the Information Technology Act 2000 of India, which states that the govern... Read More
Google Search in India..
Google has become the companion of our life in the Digital Journey that we ensue day-after-day. The word “Google” is at th... Read More
China Playing The Cyber Attack Power Game.
The Chinese Leadership is ever ready to express its offensive Cyber Capability and keep the adversari... Read More
RSA Conference 2022 at San Francisco, USA.
RSA Conference, the world’s leading Information Security conferences and Expositions, after undergoing a... Read More
A Teenager Boy Loses Rs 36 Lakhs by Playing Mobile Games.
In a freak incident reported on 04 June 2022, at Hyderabad; a young 11th grade, 16-year... Read More
APIs are CISOs’ Greatest Threat to Secure Operations.
The Concept of API (Application Programming Interface) has been around in the IT industry ... Read More
GoI Inviting feedback and inputs on Draft National Data Governance Framework Policy
The Government of India, Ministry of Electronics and Informati... Read More
SpiceJet Under Ransomware Attack
SpiceJet is among the oldest Private Airlines in India and is present in most of the sectors in India with a fleet... Read More
Strengthening of Defence Energy Sector against Cyber Attacks on Critical Infrastructure.
Independent research specialised at risk evaluation of C... Read More
XML Injection Attacks and its different variants like XPath, XQuery, XXE & More............
Web Application and Mobile Applications have becom... Read More
VMware critical vulnerability should be patched or mitigated immediately.
VMware users have been issued caution by the OEM for two prominent vulner... Read More
Fraud incidents rising with surge in UPI transactions.
Unified Payments Interface (UPI) frauds have become rampant as much as it is being used by ... Read More
Phishing attacks are responsible for more than 80% of reported security incidents.
In a recent report released by Zscaler namely “Zscaler’s Threat... Read More
Supreme Court stays proceedings on new IT rules in High Courts.
The Supreme Court of India, comprising of the bench, Justice AM Khanwilkar and Jus... Read More
The Next Generation SIEM will need to be Nex-Gen ready to cater for the modern enterprise requirements.
Security Operation Centers (SOC), across th... Read More
Google is acquiring security intelligence firm Mandiant for $5.4B.
On 08 March 2022, Google LLC announced that it was in the process of acquiring a... Read More
India's Cyberspace Off Late Encountering a Surge in API Attacks, Mobile Application Attacks and Web Application Attacks.
Indian Computer Emergency ... Read More
The Payment Card Industry Security Standards Council (PCI SSC), a global group for the payment card industry that produces security standards and it ... Read More
Government of India Instruction to Virtual Private Network (VPN) service providers.
Come 28 June 2022, the Indian Government will ensure that Virtu... Read More
Cyber Threat Intelligence and Security Operations Center (SOC): Does threat intelligence improve SOC effectiveness and inturn Mitigate Risk?
Today ... Read More
A New Twitter Handle @Cyberdost.
Previous Article in www.cybersecureindia.in:
India establishes a Seven (7) pronged scheme to fight cyber crime wit... Read More
Canonical Ubuntu 22.04 LTS (Jammy Jellyfish) is released with additional exciting features.
The Canonical has released Ubuntu 22.04 on 21 April 202... Read More
Lazarus Group carrying out recce of Indian Targets
The Lazarus Group is a Cyber Offensive wing, of either a State Sponsored or may be otherwise of... Read More
Global Mobile Personal Communications by Satellite (GMPCS)
India’s Telecom Policy that was release in 1999, had envisaged introduction of Global Mo... Read More
Check if your ATM Card is Contactless with WiFi
The novel idea of using a card for purchases was described in 1887 in a utopian novel “Looking Back... Read More
The EnemyBot Malware that is targeting Network Devices
A group of researchers have recently identified EnemyBot, a brand new Linux-based botnet. At... Read More
Zero-Day and the academic references around it
Organisations tend to get paranoid with the term “Zero-Day”. Also, organisations while Managing Vuln... Read More
OIL Under Cyber Attack.
The Trend of Cyber Attack and demand of Ransom, had seen a little lull, post the COVID lockdown of June 2021. The laxity th... Read More
NPCI and WhatsApp to facilitate "WhatsApp Pay"
In a media release on 13 April 2022, National Payments Corporation of India (NPCI) has announced an ... Read More
The Nations Cyber Security Strategy and Status: India Among Top 10 Ranked Nations (Article 2 of 17)
Cyber Security Index of a Nation is not about t... Read More
"Cyber Secure India" will be running a series of this Title 'The Nations Cyber Security Strategy and Status' for the next 16 issues
India has moved ... Read More
The new fiber could help satisfy demand for 6G and beyond
5G is the fifth-generation technology standard for broadband cellular networks. 5G is sig... Read More
VPN(virtual private network) is a form of secure connection for both enterprise connection and for users who connect to the internet for routine usag... Read More
India has moved up by 37 places to rank as the tenth best country in the world in the Global Cybersecurity Index 2020 launched by the International T... Read More
Modern technology is advancing day by day. New updates and enhancements keep coming in the technology field. The main purpose of advancement in tech... Read More
REvil, A Notorious Ransomware Gang, Was Behind JBS Cyberattack
This time it’s the world’s largest meat processing company that has been targeted.
J... Read More
Imagine that you walk into your office, and/or login to your personal laptop and find your system with a blank white screen with a message telling yo... Read More
Beware of Fraud by use of TeamViewer and AnyDesk
In April 2020, after the rise of Cyber Crime especially through the use of Remote Desktop Software... Read More
PHARMING, PHISHING, WHALING, SMISHING & VISHING
The present era of cyber-attacks or cyber-crime, is mostly directed towards financial fraud... Read More
The hottest topic in the town - as a faithful user of Signal for last one year, I wanted to state my case for and against each app.
Like everyone... Read More
Today we have a large number of messaging apps like WhatsApp, Signal, Telegram, Facebook Messenger (and Messenger Lite), Skype, Snapchat, Viber Me... Read More
For a long time now, the engine of a car was the epicentre of innovations and R & D. The advent of the digital era today has made manufactures... Read More
The walls of the classrooms are no longer a barrier as technology enables new ways of learning, communicating, and working collaboratively. Technolog... Read More
“Ransomware is not just a cyber attack but can be termed as a Cyber Weapon of mass destruction to sabotage the IT and ICT infrastructure of a Country... Read More
The interaction of the Child with the Parent or Guardians is now a need that is more than ever. This is the time for parents and guardians to have a... Read More
Here’s a simple project idea for programming enthusiasts.
Inspiration
I’ve been pondering on a story about “Naranath Pranthan” (Madman of ... Read More
One of the pieces of news that caught the attention of the scientific community during lockdown was the announcements made by Google and Honeyw... Read More
This API will acts as a bridge for two applications to be able to talk to each other and exchange information.
The Aarogya Setu App, has been in us... Read More
Google services suffer outage in India, Gmail worst affected
Many users of Gmail were surprised to experience a never before and one of its king ou... Read More
Cyber Secure India, proposes to suggest some basic actions that need to be adhered to ensure a safe experience both for students and parents while ad... Read More
Are we read for the Taidoor RAT Cyber Attack proliferation into Indian Cyber Space?
The ‘Taidoor’ virus has been dominant on the Global Cyber Space... Read More
Cyber Security Proposal for the New Indian Railway Automatic Train Protection (ATP) Systems
The so called Cyber Cold War has been raging globally... Read More
‘Wangiri’ or the ‘One Ring and Drop’ form of Cyber Attack on the rise.
"Wangiri" is Japanese for "one ring and drop" is the new form of Cyber Scam,... Read More
Honda Motors under Cyber Attack.
In a delayed communication on 09 June 2020, the Japanese Automobile Giant, Honda Motor Company Headquarters, pass ... Read More
NPCI (National Payments Corporation of India) Issues Denial of claims that Private Details of 73 Lakh Indians stands exposed in CSC BHIM Data Leak or... Read More
[Image: Hana Kimura courtesy Instagram (image used with no prejudice)]
On 24 May 2020, the Internet world woke to one of the worst news of the year... Read More
The Aviation Industry is back in action, but more needs to be done from the IT and ICT perspective for profitability and security.
Aviation has be... Read More
It is also obvious that Individuals and Enterprises have been more vulnerable, as the workforce and individuals have been working from home through d... Read More
The popular app Zoom offers the simplest path to videoconferencing. The app has been put to extensive uses during this period when the world is under... Read More
Phishers use RBI loan leeway to defraud customers.
Since the advent of the COVID-19 threat, nations have resorted to a complete ‘Lockdown’ and have... Read More
WhatsApp introduces new restrictions and features to curb misinformation: puts new limits on the forwarding of viral messages.
On popular demand fr... Read More
Indian government officially launches its coronavirus tracking app, Google will also help in its contribution for the fight against COVID-19 Pandemic... Read More
Cyber Response Team apart from the eleven Empowered Groups under the Disaster Management Act during the COVID -19 threat in India.
The media is ful... Read More
How China is using technology to fight coronavirus.
Apart from the dedicated Health Workers, Medicines, Medical Equipments and the Enforcement Agen... Read More
Since the outbreak of the COVID-19 and the declaration of the same as a global pandemic, the Cyber World has noticed a rise in Cybercrime.
Since th... Read More
How hackers are using coronavirus maps to infect your computers.
As reported by Cyber Experts, it has been observed that the hackers have resorted ... Read More
New OS of Linux Kernel Released
Linux, computer Operating System (OS) created in the early 1990s by Finnish software engineer Linus Torvalds and th... Read More
It’s easy as 1,2,3 to avoid being a victim of SIM swap fraud
In a recent news, it was reported by the Primitive founding Partner, Dovey Wan, Zhouji... Read More
Kali Linux 2020.1 released: New tools, Kali NetHunter rootless, and more.
For long the aspect of Advanced Penetration Testing and Security Auditing... Read More
Japan prepares itself for a Cyber Security Incident Free Olympic and Paralympic Games 2020.
On 07 September 2013, Japan was selected to host the wo... Read More
Cyber Tipline monitoring facility under the aegis of Indian National Crime Records Bureau (NCRB) that provides reporting system for online exploitati... Read More
A National Web Portal to search for missing persons record and check police record of vehicle and generate No-objection Certificate of the vehicle co... Read More
National Cyber Security (NCS) Coordinator Lieutenant General Rajesh Pant inaugurated the first Cyber-security Centre of Excellence on 28 January 202... Read More
Amendments to Protection of Children from Sexual Offences Act, 2012 (POCSO Act) and Information Technology Act, 2000 (IT Act) on the way to cater for... Read More
Mastercard unveils its new Intelligence and Cyber Centre in Vancouver, Canada.
Amex, Visa and Mastercard are the most popular payment networks... Read More
BitPyLock Ransomware making rounds on the internet and threatening its victims.
A new ransomware called BitPyLock has quickly gone from targeting i... Read More
If your child is less than 13 years and is a registered user of WhatsApp, the child is violating laws.
In India alone, “WhatsApp” had reached over ... Read More
Microsoft had developed software that could test open source software to provide its customers high-quality software and services. Recognising the in... Read More
Samsung announces 'Privacy Choices' app for its Smart TVs.
Many Smart TV owners and consultants of Security have voiced the concern with regard to ... Read More
Formjacking: How Indian Users are falling victim to this new form of Cyber Attack in the present day Digital Payment Era.
India is presently among ... Read More
India establishes a Seven (7) pronged scheme to fight cyber crime with the inauguration of Indian Cyber Crime Coordination Centre (I4C) and launching... Read More
5G Technology to power not only Smartphones but Tabs, Laptops, connecting Machine-to-Machine and Internet of Things (IoT) devices.
The advent of th... Read More
It is time that India certify and promulgate its own indigenous Cyber Tools.
The U.S. has reported to have passed a new legislation that will requ... Read More
When Two Bulls Fight The Grass Suffers, is India also under threat of Cyber Attack proliferation.
The Pentagon, USA, confirmed on 02 January 2020, ... Read More
The Government of India has announced the setting up of the “New, Emerging and Strategic Technologies” (NEST) Division under the MEA on Wednesda... Read More
Indian Government Approves Huawei to Participate in 5G Trials and not gone the US way: Security is still a Concern.
In a recent announcement by the... Read More
We at CYBER SECURE INDIA evaluate the top Ten (10) Technology Trends and also contemplate the envisaged Security Measures that will dominate the year... Read More
State Bank of India (SBI) customer are advised to carry their mobile/smartphone, for cash withdrawal at ATMs, as they will receive an OTP on the Regi... Read More
01 January 2020, is again a similar nightmare for many IT System Engineers, as was the scenario on 31 December 1999.
01 January 2020, is again a s... Read More
We at CYBER SECURE INDIA evaluate the risks of using public WiFi and suggest strategies to use the free service while being secure and not being a vi... Read More
The Andhra Pradesh Disha Bill, 2019 (Andhra Pradesh Criminal Law (Amendment) Act 2019).
The Andhra Pradesh (AP) State Government has brought in a ... Read More
The Andhra Proposal suggests Amaravati as the Legislative Capital, Visakhapatnam as the Executive Capital and Kurnool as the Judicial Capitals.
Ch... Read More
WhatsApp Breach in India: is it time for a Home-Grown secure messaging & calling apps
In India, we have now changed the outlook towards inter-p... Read More
10 Point Formula from CYBER SECURE INDIA, that will help your against being a victim of cyber crime.
India has reported 3.13 lakh Cyber Security in... Read More
The Implementation of The Citizenship (Amendment) Bill, 2016, is a Digital Challenge, and requires a robust, foolproof and secure IT system and infra... Read More
Should India also tow-the-line to ensure its Digital Sovereignty, like the Chinese Ban on Foreign Hardware and Software by year 2020.
In a recent a... Read More
WhatsApp End-To-End Encryption, is it here to stay of the Government is looking for a Ban.
There is no single solution to Privacy or Security. Ther... Read More
India's Booming "Cybercrime as a Service" Industry
India’s dream of achieving a over USD 5 Trillion economy by the year 2024-25 seems implausible a... Read More
India's Personal Data Protection Bill 2018 will be implemented soon
There are reports on 04 December 2019, in the media that the Union Cabinet of I... Read More
One Nation One Ration Card to be effective nationwide from June 2020
The Government of India, has again announced that the “One Nation One Ration C... Read More
INDIA NATIONAL CYBER SECURITY STRATEGY 2020
Government of India had first come out with a National Cyber Security Policy in the year 2013. The poli... Read More
A Vishing Attack is much easier on a Smartphone user and can be an easy victim of financial fraud
Many Indians today, perceive that their Smart Pho... Read More
Cyber Secure India evaluates the Advantages and Threats to the FASTag Project
On 01 December 2019, India will migrate to the Electronic Toll Collec... Read More
The Paytm users have been duped through the KYC Scam
On 26 November 2019, the General Manager of Ambience Mall, Delhi, received a call from a claim... Read More
Attackers install Remote Access software for “Live Clonejack Attack” on Smartphone/Devices to take control of e-wallets and net-banking accounts of ... Read More
Social Media will now have stricter rules of engagement
The Social Media arena and Social Media Platform Users are now in the phase of being reform... Read More
Spread of e-crime corridor beyond Jamtara, a Parliament Question
Most of us at some point of time, may have received calls from fraudsters with ca... Read More
NCRB Cyber Crime Report 2017 shows an increase of 77 percent in reported offences
The Cyber Crime Cases in India
On 21 October 2019, the National C... Read More
The Small Devil can result in an unwarranted Juice Jacking Attack on your Smart Phone: Avoid the USB Charging Hubs at Public Places for Charging
Th... Read More
India’s concern against cyber terrorism and use of technology for terrorism was again voiced by the External Affairs Minister of India, Dr Subrahmanya... Read More
It is time to update your Android device, with the newly released Android patch provided in the last week of October 2019. It is during the same time ... Read More
Introduction
In the last week of October 2019, all the news media had carried the news pertaining online sale of over 1.3 million Indian credit and de... Read More