
Building up strong cybersecurity in organisations: It's all about looking inside
Insider threats can be classified into an intentionally criminal employee and the clueless one.

Twitter accounts belonging to Anupam Kher and several politicians were hacked by a pro-Pakistan hacker collective
Twitter accounts belonging to various prominent Twitter users in India were hacked by a Turkish group calling itself the “Turkish Cyber Army Ayyildiz Tim”.

Norton records 2400% rise in Kim Kardashian related spam and scams
After reality TV star Kim Kardashian was reportedly robbed of jewellery worth six million euros and more at gunpoint, cyber security leader Norton recorded a whopping 2,400 per cent increase in Kardashian-related spam and scams within the first 24 hours of the news.

New-age social media cybercrimes and how to tackle them
A victim of a social media cybercrime must keep in mind that intermediaries like Facebook and Twitter cannot be held responsible for any content, link or information that is made available by a third party on their website

Organisations to spend over $37 billion on security in 2016: Ovum
In 2016, cybercrime, state-sponsored activities and advanced persistent threats (APTs) will continue to make the headlines, and social engineering that targets human frailties will continue to put business systems at risk.

Social engineering: How Congress lost its traditional vote banks in Haryana
The once mighty Congress that won 67 of 90 seats in the Haryana assembly in 2005 and 40 in 2009 has now been reduced to a pathetic 15 seats, a poor third after the BJP and the Indian National Lok Dal (INLD).

Social Engineering Attacks On IM Apps Rising
The attack uses the common social engineering tactic of posting a link to instant messaging applications for a potential victim to follow.

Forget doom-sayers, in UP Maya holds the aces
Political analysts should not be in a hurry to write her off; despite all her weaknesses Mayawati still a very strong force in UP.

SOCIAL ENGINEERING AND CYBER ATTACKS
This whitepaper explores the psychology of social engineering and why it works and provides examples of the latest cyber attacks that rely on social engineering

Polymorphic Malware Rate Peaks At 72% In September
Symantec announces results of the Intelligence Report.

An answer to 'thinking class' hubris
What’s the message for the civil society? Well, trust the Indian voter, trust the political system.

People, Corporates Easily Conned Into Parting With Vital Information
Social Engineering in the IT context refers to the art of using social codes and knowledge of human behaviour to get people to provide sensitive information.

Constant Audit - A Must For Security
Sanjeev Kumar, chief-IT, Philips Lighting, South Asia, talks about the new MPLS deployment and how security breach results from social re-engineering.