For years, victims have opted to quietly pay cybercriminals, calculating that the payment would be cheaper than rebuilding data and services
This can include data from social media accounts, banking details, even services like Uber, Netflix.
Attackers believe the attackers will leverage proven methods against growing Cloud adoption.
Spam campaigns disguised as delivery notifications, shopping invoices are popular ways to spread malware.
Online safety begins with awareness, and knowing the threat that sits behind your computer.
More than two million malware, 16,000 ransomware, and more were detected on a daily basis on Windows.
"The bad news is that cyber security threats will affect more enterprises in more diverse ways"
Microsoft starts rolling out new security features for Office 365 to protect users from phishing scams and ransomware
Ransomware has become an attack method in which cybercriminals 'lock up' and prevent access to files in an effort to extort money from victims.
Indian businesses are at high risk of repeated ransomware attacks and are vulnerable to exploits: Report
While $13.74 million was spent by 3 percent of organisations worldwide to rectify the impact of ransomware, India's share was the highest at $1.17 million
Ransomware grew by 3,000 percent in 2017 as compared to 2016 and could get more vicious in 2018: Report
The proliferation of fake apps and downloading of apps from third-party stores were the biggest mobile security concerns in the previous year.
CERT-In has developed a free bot removal tool in collaboration with QuickHeal, starts sending out awareness SMS
The SMS includes a link to the Botnet Cleaning and Malware Analysis Centre where one can get information about bots and how to remove them
It was designed to trick users of Telegram’s desktop computer software into enlisting their machines to mine cryptocurrencies.
US intelligence officials sent coded messages via Twitter to Russian spy who claims to have NSA data
The NSA reportedly paid about $100,000 to the Russian in hopes of recovering Shadow Brokers data.
"Machine Learning in cybersecurity is here to stay and will be a critical component of any enterprise endpoint security strategy," says Anand Ramamoorthy.
Aadhaar Virtual ID is a proactive move to fix privacy holes but might be useless without critical updates
Virtual ID is a welcome acknowledgment of the privacy and security issues with Aadhaar, as opposed to the UIDAI’s characteristic denial of privacy.
According to the report, nine new families of ransomware emerged on Windows in the third quarter.
In 2017, we saw massive DDoS attacks using hundreds of thousands of compromised IoT devices in people's homes and workplaces to generate traffic.
Odisha police issues an advisory to identify and arrest those involved in circulation of obscene content
The advisory has been issued by Odisha Police in the wake of several obscene pictures and videos going viral on the social media.
According to the Russia-based Kaspersky Lab, criminals are targeting popular cryptocurrencies such as Bitcoin, Ethereum, Zcash, Dash and Monero.
The 'WireX' botnet comprises primarily Android devices running malicious applications and is designed to create a denial-of-service (DDoS) attack.