Internet Security

Hackers Put TCS Website ‘tcs.com’ On Sale!

Hackers Put TCS Website ‘tcs.com’ On Sale!The latest news is that the official website of the country's biggest IT services company Tata Consultancy Services (TCS) 'tcs. com' has been hacked.

The cyber-terrorist placed a "For Sale" message in English and French for a whole day. Moreover, the cyber-terrorists offered email identification, abed_uk@hotmail.com.

The hack is said to be a DNS hijack, like the cyber attack that Twitter had during the last year.

Now, digital ants to protect your PCs from worms

Now, digital ants to protect your PCs from wormsWashington, Sep 26 : Security experts are taking a cue from nature to protect computer networks from intruders, and have created a new defence mechanism that mimics one of the hardiest creatures in the world - the ant.

Unlike traditional security devices, which are static, these "digital ants" wander through computer networks looking for threats, such as "computer worms" - self-replicating programs designed to steal information or facilitate unauthorized use of machines.

Hacker training has become an industry in China

Hacker training has become an industry in ChinaBeijing, Aug. 4 : In the last year, China has suffered a loss of a billion dollars because of hackers, and what has left authorities in Beijing very worried is a report that the training of hackers has become an industry, and generated an estimated income of 238 million Yuan in the same period.

According to a China Daily report, hackers have stolen people''s bank account numbers and passwords and damaged the Internet users'' computers and servers.

Now distributed security approach to curb cyber crime

Now distributed security approach to curb cyber crimeWashington, June 16 : A new approach to online security, based on distributed sanctions, could help prevent cybercrime, fraud and identity theft, according to a report.

Susan Brenner, of the University of Dayton School of Law, and Leo Clarke, of the Thomas M. Cooley School of Law, have suggested that the government could control cybercrime by making anyone accessing cyberspace to employ reasonable security measures but without infringing on civil liberties.

Cybercrooks take advantage of swine flu hysteria

Cybercrooks take advantage of swine flu hysteriaSydney, April 30: Cybercriminals are taking advantage of the swine flu buzz to sell counterfeit drugs and steal credit card details, Internet security experts have warned.

"The scare has spawned a spamming frenzy, like sharks smelling blood in the water," the Sydney Morning Herald quoted Symantec''s Mayur Kulkarni as stating in a blog post.

Chinese and Russian cyber spies hack US power grid

Chinese and Russian cyber spies hack US power gridWashington, Apr. 8: Chinese and Russian cyber spies have penetrated the U. S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials.

According to Fox News, the spies are also from other countries, and they were believed to be on a mission to navigate the U. S. electrical system and its controls. The intruders haven''t sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war.

What is “Conficker time bomb”?

Conficker wormJust a couple of hours have left for the blast of the Conficker time bomb! The Conficker time bomb is expected to blast tomorrow – on April 1; but, it’s still unknown whether the Conficker time bomb is an April Fool’s Day prank or a real threat. According to reports/rumors, the latest variant of the Conficker worm will hit the online computers around the globe, on the April Fool’s Day; that’s why it has been dubbed as “Conficker time bomb”.

Mike Stute of Dallas-based Global DataGuard, a network security firm, said, "Everybody is a little bit nervous about it. It could be nothing. It could be very dangerous."

‘Smashing your PC’, only way to prevent data theft by fraudsters

‘Smashing your PC’, only way to prevent data theft by fraudstersLondon, Jan 8: The safest way to stop fraudsters stealing information from old computer hard drives is to "destroy the PC with a hammer", a consumer magazine has said.

The computing magazine Which? recovered 22,000 "deleted" files from eight computers purchased on eBay.

They then used specialist software to recover files that the original owner had deleted, reports the Daily Express.

Sarah Kidner, editor of Which? Computing, warned that the risk of becoming a victim was increasing.

Hackers Attack The SBI’s Website

Hackers Attack The SBI’s WebsiteOn Saturday, the website of State Bank of India (SBI), was shut down due to an attempted attack by the hackers.

It was confirmed by a senior bank official, “There has been an attempt to disrupt the system.” However he did not give out any further details. The bank’s sites www.statebankofindia.com and www.sbi.co.in were down on Saturday, but its internet banking site www.onlinesbi.com was operational.

It was confirmed by the officials in the late evening, “The bank was targeting to get its website operational by 9.00pm.”

CID Website Hacked

CID Website Hacked Even as India and Pakistan renew efforts to resolve contentious issues through dialogue, it seems that a virtual war is going on between the two countries in cyberspace.

The latest news is that the official website of the Andhra Pradesh Crime Investigation Department (CID) has been hacked by pro-Pakistan hackers.

It is believed that the hacker who claimed himself to be Pakistani, also fiddled with website of a news channel and that of Bank Of Baroda. However, when accessed in the last evening, both these websites were found to be in the working condition.

High-tech Internet fraudsters have stolen £3.3B in last one year

High-tech Internet fraudsters have stolen £3.3B in last one yearLondon, Nov 24: Credit card numbers and bank details have apparently come as a boon for tech-savvy thieves, for they have actually made a fraud of a huge 3.35 billion pounds in the last one year, according to a new research.

The study by Symantec calculated the amount so that it could quantify the scale of fraud during a year-long look at the internet''s underground economy.

The researchers found that credit card numbers were the most popular item on sale.

Ultra fast random numbers by lasers to tackle cyber crime more effectively

Ultra fast random numbers by lasers to tackle cyber crime more effectivelyLondon, Nov 24: A new method that uses lasers to produce streams of truly random numbers faster than ever before may help improve security at a time when digital traffic and cyber crime are both growing.

Strings of random numbers are used to make secret keys and other parts of encryption protocols.

But, software that generates random numbers can generally only manage a close approximation to random.

Now, a battery-powered credit supercard that fights online fraud

Melbourne, Nov 12 : An Australian technology firm has come up with a unique battery power super card, which they believe can fight online fraud.

The company reckons that it can stop up to 1 billion dollars a year in credit card fraud with its new revolutionary invention.

The card, which includes an alpha-numeric display, built-in microprocessor, a keypad and three years of battery power, will display a one-time number with which to authenticate each online credit card transaction, whenever the user will enter the pin number.

The technology was developed over two and a half years by a small Deloitte-backed technology firm based in Adelaide and Melbourne called EMUE Technologies.

Computer criminals can hear what you type on a keyboard

Computer criminals can hear what you type on a keyboardLondon, October 22: Swiss researchers have shown that computer criminals can misuse the electromagnetic signals produced by when buttons on a keyboard to eavesdrop on what a user types.

Martin Vuagnoux and Sylvain Pasini, doctoral students from the Security and Cryptography Laboratory at the Swiss Ecole Polytechnique Federale de Lausanne (EPFL), have been successful in analysing the signals produced by keystrokes to reproduce what a target typed.

Study Reveals; India Top Spam Sender Of Asia

Study Reveals; India Top Spam Sender Of Asia A latest study claims that the top spam sender of Asia is India. Its also the seventh largest in the world, responsible for over four percent of the total global spam. 

Trend Micro, a firm that delivers Internet content security, concentrating on securing the exchange of digital information for businesses and consumers, said, “India is the leader among Asian countries in spam, accounting for more than four percent of the total global spam and is ahead of other Asian countries such as China (3.39 percent), Republic of Korea (2.57 percent) and Thailand (2.04 percent).”

British security agencies take war on terror into cyberspace

British security agencies take war on terror into cyberspaceLondon, Oct. 3: Britain's security agencies are fighting a covert war in cyberspace against extremist Islamist internet sites as part of a new anti-terrorist strategy, senior Whitehall officials have revealed.

As well running its own sites, the Government gives material support to groups that monitor and combat jihadist material on the web in an attempt to prevent indoctrination of young Muslims.

According to The Independent, the scheme is being introduced when the threat level is described as being "at the severe end of severe".

Hacker says it was easy to break into Sarah Palin's e-mail

Sarah PalinLondon, Sept. 20: The person claiming to be the hacker who accessed Sarah Palin’s private e-mail account has gone on record to say that it was easy and simple to achieve.

He or she has posted online what appears to be first-person account of the simple steps needed to impersonate the Republican vice-presidential candidate and obtain her password online.

The hacker apparently guessed that the Alaska governor had met her husband in high school, and knew Palin’s date of birth and home zip code.

Japanese shrine offers protection for computers

Japanese shrine offers protection for computersTokyo - In high-tech Japan, not only programmers provide protection from viruses and other computer bugs, but also the gods.

At Tokyo's Kanda-Myojin Shinto shrine, the faithful can bring their computer and have the priests use centuries-old ceremonies to ask the gods for help and protection for their computer, a shrine spokesman said Friday.

The shrine is located near the Akihabara quarter, Tokyo's technology hub and popular destination for geeks and lovers of the latest electronic gadgets.

‘Trusted notary’ sites may help protect against hack attacks

‘Trusted notary’ sites may help protect against hack attacksLondon, Aug 27: Scientists at Carnegie Mellon have found a way to thwart hack attacks that intercept data passing from a personal computer to a website.

Since the "man-in-the-middle" attacks involve hi-tech hackers who have total control over data streams, such activities are hard to spot.

The defence mechanism involves sites designated as trusted "notaries".

Software compares responses received by trusted websites and tells users if it looks like data is being intercepted.

Britain faces thousands of cyber attacks on key utilities every day

Cyber SecurityLondon, August 23: The Government of Britain has said that thousands of cyber attacks are being carried each day on key utilities in the country by criminals and terrorists, some of them backed by foreign states.

According to a report in The Times, computer networks controlling electricity supplies, telecommunications and banking are being attacked thousands of times a day in a new cyber war in Britain.




Check out More news from Telecom Sector :: Pharmaceutical Sector :: Auto Sector :: Infrastructure :: Real Estate


Syndicate content