The browser finger prints or browserprints – the way one uses their browser to go to different sites – can leak the identity, location, preference amongst other personal information to hackers. Web...
Jul 19, 2016
The Reserve Bank of India has set up an inter regulatory Working Group (WG) to study the entire gamut of regulatory issues relating to Fin Tech and Digital Banking in India. RBI’s financial stability...
Jul 15, 2016
IT will fight back against ‘the big hack’ in 2016, as per Spiceworks security survey. As per the survey, IT leaders believe that the responsibility for organization’s security is in their hands and...
Jul 08, 2016
CIOs in Asia Pacific need to analyse and understand the different phases of a cyber-attack to build better cyber defences in their corporate network, according to Fortinet – a leading high-...
Jul 08, 2016
Five years ago, Mozilla launched its new identity management system, Persona (originally called BrowserID). At the time, a sense of optimism was in the air. Everyone thought that the new technology...
Jul 05, 2016
Insider data theft and malware attacks top the list of the most significant concerns for enterprise security executives, as per the latest report by Accenture. Technology enterprises in Asia Pacific...
Jul 04, 2016
Almost one third (28%) security professionals admitted to have compromised their ethics to pass audit, as per latest research by FireMon, a security management vendor. The number of IT security...
Jul 01, 2016
Most CISOs see themselves neither as tech people nor as ‘business enablers’ but as the protector of organizational information, according to a study conducted by CIO&Leader and CSO Forum recently...
Jun 28, 2016
The noise created by the fan of your PC can leak the personal data, encrypted codes and every piece of information, as per the latest research by Israel based group. Fansmitter, a new malware can...
Jun 27, 2016
Data Security Council of India (DSCI) and Lockheed Martin have collectively launched a new cyber security education program for small and mid-size businesses to help them minimize risk from online...
Jun 27, 2016
In a letter issues to its customers, Acer Service Corporation has admitted that a massive security breach occurred in their systems. The official letter agreed that an “unauthorized access by a third...
Jun 22, 2016
As many as 69% of IT and information security decision makers are insecure about the effectiveness of their perimeter security system to tackle attacks. Despite that, organizations continue to invest...
Jun 10, 2016
The security appliance market registered eleventh consecutive quarter of growth in the first quarter of 2016 (1Q16), as per IDC. Top four vendors accounted for more than 53% of the market share. The...
Jun 10, 2016
Banks should immediately put in place a cyber-security policy approved by their respective boards, Indian banking regulator Reserve Bank of India has said in a circular sent to all CMDs/CEOs of...
Jun 07, 2016
Enterprises have moved to cloud and those left behind are working hard to take their companies ‘higher’. Despite the cloud services being widely accepted by the business throughout the world, the...
Jun 06, 2016
A Pakistan based cyber attack group has been trying to exploit Indian government data by sending spear phishing emails to the government employees, as per a Fireeye blog. The cyber criminals sent an...
Jun 06, 2016
There is a growing trend among cybercriminals to target and even filter out specific countries when designing ransomware and other malicious cyberattacks, and India is on top of the hit list,...
May 19, 2016
India is the on hit list of China based advanced cyber espionage group, Sucklfly. The hacking software which targeted many countries globally carried maximum attacks against India, as per cyber...
May 19, 2016
Cyber security was first recognized as a major global risk by World Economic Forum in its annual Global Risk Report in 2012. Since then, every year, cyber security threats—large scale cyber attacks...
May 05, 2016
Latest forecasts by Gartner, Inc. states that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new...
May 03, 2016
Email is still the initial entry point into an organization for targeted attacks, the email-attack vector delivered malicious payloads to organizations in 2015, with a focus on Office documents and...
Apr 29, 2016
Like physical security threats, Internet security threats are getting more serious, even as the mechanisms to fight them are getting better. But as older types of threats are beginning to be tackled...
Apr 25, 2016
As much as 90% of the respondents have a high or medium degree of vulnerability to cyber attacks, finds a new study released by Tanium and NASDAQ. The study, called The Accountability Gap:...
Apr 05, 2016
Cyber attacks are a way of life now. Three out of four security professionals in a recent global ISACA-RSA Conference research said that they think possibility of a cyber attack is likely or very...
Mar 30, 2016
Quite unexpectedly, just a day before a US court was to hear the case regarding the unlocking of the iPhone of the deceased shooter in the San Bernadino murder incident last year, the American law...
Mar 29, 2016
The biggest cost to businesses suffering from ransomware attacks is not the ransom but the downtime, says a new study commissioned by Intermedia. Employee downtime lasts for days and while prevention...
Mar 25, 2016
Six out of ten respondents (58%) in a recent study said they are more concerned about uploading critical data to the cloud now, as compared to a year back. The same survey also reveals that about 82...
Mar 23, 2016
In the Managed Security Survey 2016 released by IT Next and CIO&Leader recently, information security managers in large Indian enterprises identified “expertise in relevant security standards” as...
Mar 08, 2016
The government cannot thwart the cybersecurity challenges alone. Businesses must come forward to collaborate with the government and spread awareness about cyberscecurity challenges, said Dr Gulshan...
Mar 02, 2016
Even as India is debating whether anti-India sloganeering in a university campus is a bigger threat to the nation or some lawyers beating up students and journalists in a court premise, allegedly...
Feb 18, 2016
The World Economic Forum has published the Global Risk Report of 2016, the 11th edition of the annual report. The report, based on a study involving 750 experts from WEF multi-stakeholder...
Feb 11, 2016
As consumer privacy becomes a major issue, more and more consumer technology companies are trying to encrypt user data. Law enforcement agencies complain that this is leading to a situation where...
Feb 10, 2016
Having the expertise to implement relevant security standards and delivering effective and rapid response to security incidents are top two expectations from managed security service providers (MSSPs...
Feb 01, 2016
In what could serve as an example for regulators around the world, the US Federal Trade Commission (FTC) has come out with a comprehensive report sensitizing the businesses to ensure that their use...
Jan 18, 2016
“Mobilizing” security will make it more pervasive and personalized: a new, more secure identity lifestyle will be built around the convenience of ever-present mobile devices. Computer and network...
Jan 18, 2016
Even as cities fall over one another to go smart, here is a finding from ISACA, global association of security professionals that could serve as a warning against not taking adequate security...
Jan 14, 2016
Negating the media hypothesis that consumers may be getting used to data breaches—thanks to an increasing number of incidents—a recent research has confirmed that data breaches can significantly...
Jan 08, 2016
Internet of Things (IoT) is clearly ruling the Consumer Electronics Show (CES) 2016 at Las Vegas. Coming at the beginning of the year, CES sets the agenda for the rest of the year—on what is going to...
Jan 07, 2016
Here is what ISACA presents as five trends in cybersecurity that are expected to surface in 2016 1. Cyber-extortion Will Hit Wearables, Medical Devices and Gaming Systems B2B use of the Internet of...
Dec 29, 2015
Less number of software security vulnerabilities were reported worldwide in 2015, as compared to 2014. However, vulnerabilities with a high level of severity increased by almost 16%, according to an...
Dec 29, 2015
Smart City Mission is a Government of India initiative that aims to improve the management of a city using the digital technology and Internet for updating its information constantly and dynamically...
Dec 07, 2015
The quarterly Distributed Denial of Service (DDoS) trends report published by Verisign for Q3 (1 July 2015 to 30 September 2015) shows that in addition to a rise in frequency of attacks, there has...
Dec 02, 2015
Right to privacy exists in India as many judgments by the Supreme Court ruled that the right to privacy is implicit in right to life and personnel liberty. Nevertheless, privacy needs to get explicit...
Nov 25, 2015
In a hall full of Chief Information Security Officers (CISOs) of key Indian private companies during the 8th Annual CSO summit organized by CSO Forum in Chandigarh, many CISOs present did not know...
Nov 24, 2015
Where do Indian chief information security officers (CISOs) stand in the organizational structure? Who do they report to? What is their relationship with other functional departments, especially IT...
Nov 23, 2015
Interpol's Dr Madan Mohan Oberoi highlighted various aspects of global cybersecurity scenario The 8th CSO Summit of CSO Forum started in Chandigarh today. Among the speakers were chief information...
Nov 20, 2015
Indian consumers affected by cybercrime lost on average 29.6 hours and INR 16,558, finds a new study by Norton. This is in comparison to an average of 21 hours and INR INR 23,878 (USD 358) across 17...
Nov 19, 2015
On one hand, consumers love personalization offered by the retailers; on the other, they do not trust the ability of the retailers to protect their data. A new research based on social media...
Oct 23, 2015