Sunday, May 19, 2024
Thales' offensive cybersecurity team, in collaboration with the Group's Information Technology Security Evaluation Facility, conducted a cyberattack on a European spacecraft to observe how a hacker would take control of the satellite's imaging sensors and jeopardize its...
The recent arrests of Chinese spies in different states in India over the last 24-months throw up an interesting covert strategy operated by the Peoples Liberation Army (PLA) of China in espionage on India – Hawala operators running money-laundering rackets through Loan Apps and Rummy Online. This investigation by Savio Rodrigues shows how microloan apps operated by Chinese intelligence pose a National Security threat to India.
Data breaches cost organizations billions of dollars each year to avoid and contain, while also degrading consumer trust and potentially reducing customer retention. Here's the list of the world's 50 biggest data breaches from 2004 to 2021.
The Coronavirus outbreak has triggered worldwide Cyberattacks from cybercriminals with economic motivation and state-sponsored cyber threat actors operating for cyber espionage. It is estimated that victims will be increasingly targeted with Coronavirus-themed activities, apps, websites and armed documents, reports...
A mysterious Chinese malware has hit systems on Guam, which Microsoft said was installed by a Chinese government hacking group called Volt Typhoon. There are speculations that Taiwan may be the real target of these cyberattacks.
The U.S. government is secretly ordering Google to provide data on anyone typing in certain search terms, an accidentally unsealed court document shows. There are fears such “keyword warrants” threaten to implicate innocent Web users in serious crimes and are more common than previously thought.
These days, every technological advancement has both positive and negative effects. The internet has democratized information while also improving global connectivity and enabling people to hide behind false identities. Approximately 37% of adolescents between the ages of...
Microsoft was the first to identify a Chinese hacking group named Volt Typhoon, which targeted the US Navy. This finding has been subsequently confirmed by authorities in the US, UK, and other allied nations.
We explain here the Bitcoin scam that has rocked the Karnataka BJP government. The political outrage is over a 25-year-old hacker, Srikrishna, who has everyone swirling around his finger with cybercrimes and cryptocurrencies.
Apple reveals a security flaw that potentially gives hackers complete control of iPhones, iPads & Macs. Security professionals advise users of the iPhone 6S and subsequent versions, iPad models starting with the 5th generation and after, the iPad Pro product lines, the iPad Air 2, and Mac computers running MacOS Monterey to upgrade the affected devices. A number of iPod models are also affected.