Blog

Cyberespionage

Syria Internet shutdown: The Internet ‘Kill Switch’ exists

 November 30, 2012

Estimated reading time: 3 minutes

Can a country shutdown the Internet for its citizens with a simple kill switch? There have been many debates about this in the past and it seems that the answer is a resounding ‘yes’. Further proof of this surfaced yesterday with news that the Syrian Government shutdown complete Internet access...

Round-up of the latest security news updates

 November 23, 2012

Estimated reading time: 1 minute

Millions of hackers target Israel after Gaza offensive Israel undertook air-based attacks against the Gaza strip last week and as a result they were hit with more than 44 million hacking attempts. The targeted websites ranged from defense-related sites to several commercial websites. Cyberspace has fast transformed into a battlefield...

Latest news updates from the last week

 November 3, 2012

Estimated reading time: 2 minutes

Facebook offers new privacy setting indicators for new users In a move that suggests Facebook has begun to marginally accept that it is responsible for user privacy, the social network has revised the manner in which it informs new users about privacy settings. This includes little indicators like ‘light bulbs’...

US looks to ban Huawei and ZTE for cyberespionage, India waits in anticipation

 October 9, 2012

Estimated reading time: 2 minutes

Many people in India are unaware about Huawei and its large number of products that are sold here. These range from simple wireless modems to advanced networking equipment utilized by industries and other hardware manufacturers. Most of the USB dongles that are sold in the country also come from the...

Security news updates from the last week

 October 6, 2012

Estimated reading time: 1 minute

Japan enforces severe punishments for people who download illegal content Japan has modified its copyright laws and made it stricter for individuals who simply view pirated videos or download copyrighted content. Earlier, uploaders of such content faced severe consequences while downloaders were let go lightly. But this scenario has now...

Security news updates from the last week

 September 21, 2012

Estimated reading time: 1 minute

Microsoft releases ‘Fix it’ tool for IE vulnerability Microsoft has released a temporary “Fix it” tool for the highly publicized Internet Explorer vulnerability. A full IE update will soon be released as well. The security hole exploited Internet Explorer users when they visited a malicious website and installed a trojan...

Latest security news from the last week

 August 10, 2012

Estimated reading time: 2 minutes

Tech journalist blames Amazon and Apple for hack Mat Honan, formerly of Gizmodo, saw all his accounts hacked and devices wiped clean this week thanks to some elementary flaws in Amazon’s and Apple’s support systems. Anyone interested in security should read details about this ‘epic hacking‘. Apparently, all the hacker...

Security news updates from the last week

 August 4, 2012

Estimated reading time: 2 minutes

Indian power grids are vulnerable to cyber-attackers The recent power outage in North India caused mayhem and now officials have said that it is possible for cyber-attackers to hack into the Indian power grid. There is a surprising lack of defense protocols in this sector and this is the cause...

Rising cyber crime: A grave cause for concern

 June 20, 2012

Estimated reading time: 2 minutes

If you thought only Governments and industrial agencies are susceptible to cyber attacks, then you need to think again. According to a report by the Security and Defense Agenda (SDA), India ranks 5th in a worldwide list of countries affected by cyber crime. Ominously, the number of reported cyber crimes...

Will India go offensive in response to looming cyberwar threats?

 June 13, 2012

Estimated reading time: 2 minutes

Advancements in technology have brought the world closer together but have simultaneously opened up new fronts for global conflicts. Countries are increasingly adopting aggressive stances against critical networked systems that belong to other nations. Recent threats like Stuxnet, Duqu and Flamer have shown us the extent that such attacks can...