A Kerala-based bug bounty hunter, Sahad NK discovered a critical vulnerability in Microsoft’s login that made it possible to hack into anyone’s MS Office and Outlook account.
Williams will be responsible for driving product roadmap, focusing on evolution of the company’s core security management platform and apps addressing firewall, security policy, vulnerability and threat management.
Knowledge-sharing platform Quora targeted by hackers - user names, email IDs and encrypted passwords compromised. As of February 2018, there were an estimated 880,000 Quora users based in India.
Amidst all the furore around Aadhaar being used for eKYC and UIDAI’s supposed ineptitude, PwC’s cybersecurity leader Sivarama Krishnan denounces the practice of media calling every vulnerability a breach. And he’s got a point.
McAfee researchers expect malware-as-a-service families to strengthen, energizing the market for attack outsourcing and the evolution of increasingly innovative and agile attack methods.
From just another buzzword a few years back, to one of the most pursued technologies across the globe, Blockchain has come a long way. And it is here to stay.
RDP-based brute-force attacks are being used to deploy cryptominers on infected systems, as well as to provide a platform for advanced ransomware families, according to a report by Seqrite.
Instagram’s ‘Download Your Data’ tool accidentally put user credentials at risk. What’s particularly worrisome though, is the possibility of Instagram storing passwords in plain text.
Experts predict threats to the aviation industry, continuing nation-state activity, rise in supply chain attacks and the widening cyber security skills gap in India.
The percentage has risen over the last year, demonstrating more than two thirds growth against Q3 2017, when its share in cryptor attacks was 16.78 percent.