Biometric data, unlike passwords, can never be changed, so if hackers successfully impersonate a fingerprint then they can cause serious havoc.
The Defence Cyber Agency will have more than 1,000 experts who will be distributed into a number of formations of the Army, Navy and IAF.
Kaspersky Lab has uncovered a number of compromised servers being used as part of the threat actor's global command and control infrastructure, the software company said.
Cyber crime investigations require the law enforcement to be nimble on their feet as well as technologically proficient but that is often not the case.
The regulations will be country neutral and will aim at boosting local manufacturing, said the official, who did not wish to be identified.
A breach, or a compromise of the digital perimeter of a company, is one of those things most firms think happen to others.
Researchers claim to have discovered a weakness in a Wi-Fi security protocol called WPA2 that leaves password-protected Wi-Fi connections open to cyber-attacks and manipulation.
North Koreans have quietly developed a cyberprogram that is stealing hundreds of millions of dollars and proving capable of unleashing global havoc.
Hackers will exert huge influence over our lives as we move towards an even more connected world. Civil society and governments need to invest in understanding them.
Among the simplest of things you could do to protect yourself against malware like ransomware - which 'kidnaps' your data, is to save a copy of everything.
Malware, literally, is a software that's bad. It sneaks into your system, steals your personal data, deletes files and can even disable your system.
Cyber experts say what makes Indian industry vulnerable is changing threat profile due to resource rich nation states now targeting companies.
Consumers should be attuned with security requirements of their digital products that they immediately know when to move away from faulty products.
Millennials—those who were born between 1980 and 2000—are considered digital natives since they were weaned away, as it were, on internet.
Smart gadgets or Internet of Things (IoT), a universe of devices from toaster to your car connected to internet, are highly vulnerable to hacking.
Smartphone apps, especially those that come free, are risky because your smartphone is more vulnerable than your desktop to security threats.
Blue Whale Challenge and other viral challenges like the Choking Game and the Cinnamon Challenge, are not the only forms of cyber threats out there.
There have been reported cases of malware being injected through USB sticks into the automatic teller machine forcing it to spew cash.
A survey conducted by ESET in the Asia Pacific region in 2016, found that Indian SMEs have been the most vulnerable to cyber attacks in the past three years.
Your Google searches, voice searches, all are tracked and stored by Google so that the advertisements can be as tailored and accurate as they can be.
The website that infects your computer with malware could well be the most innocuous one such as an e-commerce marketplace visited by millions.
The number of users attacked by ransomware in India has nearly doubled from 2015-16 to 2016-17, according to a Kaspersky Labs report.
With mass malware attacks becoming common, you should watch out for suspicious activity on your computer that you might ignore as random malfunction.
The sudden surge in digital payments also increases the risk of cyber theft as new users don't take all the required precautions for safe transactions.
The vulnerability of our cyber systems is a ticking time bomb. It can explode anytime, anywhere. Even in your hands, as your smartphone too is on target.
Copyright © 2020 Bennett, Coleman & Co. Ltd. All rights reserved. For reprint rights: Times Syndication Service