हैकरों की गैंग जो करता था फिंगरप्रिंट की क्लोनिंग और चुराता था लोगो के पैसे !!

साइबर अपराधी हमेशा व्यक्तिगत जानकारी चुराने और निर्दोष पीड़ित से पैसे लूटने के लिए नित नए तरीके खोजते रहते हैं। हैकर के शस्त्रागार में फिंगरप्रिंट क्लोनिंग एक नया हथियार बन गया है। नोएडा पुलिस ने हैकरों के एक लखनऊ स्थित गिरोह का भंडाफोड़ किया है, जो पीड़ितों के बैंक खातों से पैसे  चुरा रहे थे और चुराए  फिंगरप्रिंट के माध्यम

Gang of hackers busted in fingerprint cloning and for stealing money!!

Cyber criminals always look for new and innovative ways to steal personal information and rob money from innocent victim. Fingerprint cloning has become a new weapon in the arsenal of hacker. Noida police has busted a Lucknow based gang of hackers who were siphoning off money from victims’ bank accounts by cloning fingerprints and withdrawing money through Aadhar Enabled Payment

फ़र्ज़ी ऐप्स से सावधान रहें। ऐसे ऐप्स बहुत ही खतरनाक होते है !!

नकली मोबाइल ऐप आम तौर पर एंड्रॉइड या आईओएस एप्लिकेशन के होते हैं जो असली एप्लिकेशनों के जैसा हिन् दीखता है और काम करता है , ऐसे ऐप दिखने में असली ऐप जैसे होते है लेकिन असल में उपभोगता के सारे इनफार्मेशन चुरा लेते है।   मुख्य लेखक: रिया सिंह, 10 वीं कक्षा, एनसीएस कोच्चि   योगदान: सास्वत, 10 वीं,

डिजिटल पदचिह्न क्या है? अपने डिजिटल पदचिह्न को सकारात्मक बनाएं

 डिजिटल पदचिह्न, सभी डिजिटल चीजों की तरह, यह एक भौतिक वस्तु नहीं है।  यह हमारे बारे में जानकारी के लिए एक रूपक है जिसे हम इंटरनेट के गलियारों से चलते हुए छोड़ रहे हैं।  डिजिटल पदचिह्न अच्छा या बुरा हो सकता है, यह निर्भर करता है कि आपने डिजिटल प्लेटफ़ॉर्म पर कौन से प्रिंट छोड़े हैं।   मुख्य लेखक: अमान

What is Malware, how it steals information and know Protection Mantra!!

A Malware or “malicious software” — is any software program which is designed to harm your device and data. There are Several types of malware — including trojans, viruses, ransomware, spyware and worms — can be installed on your computers. Millions of people have been becoming victim to malware every year. In this article our cyber warriors have explained what is malware and

Cyber Warrior’s News: Daring Game Lands Student in Jail

News Report: Agra student hacks bank account over online game dare, arrested (Source: Times Of India – 28 Jun 2020) Contributed by:  Cyber Warrior Keisha Choudhary, Std 7, Delhi Public School, Pune Extract of the News Report: How the children get trapped: Lock down period is the time when people – especially teenagers – get attracted to various things, without

यह स्मार्टफोन ऐप बहुत ही खतरनाक है, इसे तुरंत डिलीट करें!!

नवभारत टाइम्स.कॉम | Updated: 20 जून 2020, 07:05 PM   साइबर सुरक्षा के विशेषज्ञों ने गूगल प्ले स्टोर से सम्बंधित एक ऐप के बारे में चेतावनी जारी की है। इस चेतवानी में बताया गया है  की ये ऐप उपयोगकर्ताओं  के सभी बैंकिंग विवरणों को चुरा सकता है और खाता खाली कर सकता है! शोधकर्ताओं ने इस ऐप को उच्च जोखिम

Lock down – Why hackers are always at work?

While the whole planet is struggling with the current COVID-19 pandemic and life has come to a standstill because of lockdown being enforced in most parts of the work with most of the organizations, public offices, educational institutes, transportation systems etc. being closed, the hacking attempts are on the rise and the cyber-attacks have increased. With a large number of

What is the Internet of Things (IoT)?

Do we know that our homes have become more digitally connected? Most of the families all around the world are buying internet-enabled devices such as smart speakers, toys that connect to the internet and even Bluetooth enabled toothbrushes. In this article, we will explain what is meant by the ‘Internet of Things’ and how to use these devices safely with

Online Gaming: What parents need to know

Online games are popular among children and teens, by using online gaming platform cyber criminals can target children and build relationship with them. Parents need to understand the different elements of online gaming, how they can be used by cyber criminals, what parents can do to support and protect their children. The online gaming: Video games have been things of

Israeli firm ‘impersonated Facebook to spread spyware

A recent investigation from a news agency claims that a Facebook security lookalike domain was set up by an Israeli security company to spread Pegasus hacking tool. The investigating agency also claims that they found the evidence that the servers in USA were used to spread the spying tool. What is Pagasus Spyware? The Pegasus is a spyware, once installed,

Love Bug’s creator tracked down to repair shop in Manila

20 Years ago, the world’s first major computer virus outbreak had infected millions of computers worldwide. The man behind the virus outbreak has finally admitted his guilt after 20 years. The Love Bug pandemic began on 4 May’ 2000 and it unleashed havoc on internet.  Within 24 hours, it was causing major problems across the globe, reportedly infecting 45 million

Bois Locker Room: Indian teens’ lecherous Instagram group causes outrage

The Delhi Police have filed a first information report in connection with an online group on social media platform Instagram, where teenage boys from South Delhi schools engaged in conversations about rape, and sexually objectified and shared photos of several underage girls, The Indian Express reported. A 15 year-old boy was detained by Delhi Police cyber cell in connection with the Instagram group

Hackers having the busiest time in lockdown day

In March it was discovered by security research that an alleged hacking attempt was made on an Indian state tax department in Gujarat. According to the security analyst, the hackers have access to a remote desktop out of Gujarat and planning to sell nearly 800 GB of department’s data via a Russian hacker forums. The hackers claimed they had accessed

Zero-Day Warning: It’s Possible to Hack iPhones Just by Sending Emails

Watch out Apple users! The default mailing app pre-installed on millions of iPhones and iPads has been found vulnerable to two critical flaws that attackers are exploiting in the wild, at least, from the last two years to spy on high-profile victims. The flaws could eventually let remote hackers secretly take complete control over Apple devices just by sending an

How the WhatsApp hijacking technique works and how can protect WhatsApp?

How even it is possible that the richest man’s mobile can be hacked with a simple WhatsApp message. Just few months ago it was discovered that Jeff Bezos’ smartphone was compromised using a malicious video that Amazon’s founder received via WhatsApp. Imagine the possibility of compromise of smart phone of common users who do not bother about or even not aware

Malicious USB Drives Infect 35,000 Computers With Crypto-Mining Botnet

Cybersecurity researchers from ESET on Thursday said they took down a portion of a malware botnet comprising at least 35,000 compromised Windows systems that attackers were secretly using to mine Monero cryptocurrency. The botnet, named “VictoryGate,” has been active since May 2019, with infections mainly reported in Latin America, particularly Peru accounting for 90% of the compromised devices. “The main

How to check if your mobile phone is hacked or not

Our life would not be so easy if we don’t have mobile. We can’t imagine our life without mobile which has become an important and integral part of our life. Most of the mobile users spend at least 3-4 hours in a day on mobile, in modern day no one can live without their mobile devices. Mobile users use mobile

How hackers are recording zoom meeting without permission

Even in such critical situation when whole world is in locked down inside home, the essential work is going on via various remote applications like ZOOM, WebEx etc. Such applications gave a platform to everyone having a smart device, can connect and share screens, do videos session and  can make calls. But a major concern raised about security of such

Microsoft Teams fixes cyber attack flaw of funny Gifs

A security problem in Microsoft Teams fixes cyber attack flaw  meant cyber-attacks could be initiated via funny Gif images, researchers have revealed. Like many chat apps, Teams lets colleagues send each other whimsical animated Gif images. But CyberArk researchers discovered a problem that meant viewing a Gif could let hackers compromise an account and steal data. Microsoft has since patched

Google is blocking 18m corona virus scam emails every day

The tech giant says the pandemic has led to an explosion of phishing attacks in which criminals try to trick users into revealing personal data. The company said it was blocking more than 100 million phishing emails a day. Over the past week, almost a fifth were scam emails related to coronavirus. The virus may now be the biggest phishing topic ever, tech

A recently found security flaw in Apple’s mobile operating system may have left millions of iPhone and iPad users vulnerable to hackers.

A recently found security flaw in Apple’s mobile operating system may have left millions of iPhone and iPad users vulnerable to hackers. Research published by ZecOps, a mobile security firm, said a bug in the Mail app made devices susceptible to sophisticated attacks. The firm said it had “high confidence” the bug has been used to exploited at least six high-profile

How to spot and avoid Coronavirus scams

What can you do to protect yourself against scams and misinformation? We’ve got detailed advice on how to spot a malicious email, but broadly the things to watch out in emails and other messages are: Unsolicited emails and texts: be careful of anything you weren’t expecting that claims to be from an organisation such as a bank, phone company, internet

ISO 27001 ISMS implementation Training

ISO 27001 ISMS implementation Training: Learn ISO 27001 implementation, understand ISMS, SOA, Risk management.   Total Page Visits: 831 – Today Page Visits: 3

Know About Cyber Security!!

You must be using cyber space (internet) to stay connected with the world, friends and family but do you know how to stay secure? Do you know you can be a victim of a cyber-crime if you don’t use internet prudently? The current era has allowed us to connect online via social media, mobile apps, emails (Facebook, Instagram, SnapChat, WhatsApp,

The Top Five Cybersecurity Issues will Trend in 2020

With the average cost of a data-breach rising year on year, (with some estimates being close to $4million) it underscores the importance of why cyber security needs to be taken seriously. Cyber-security itself evolves over time meaning businesses need to remain updated on the latest trends and legal requirements such as those of the Indian Data protection laws and Europe’s

WhatsApp confirms Indian journalists and activists targeted in hack Read

The confirmation by WhatsApp that the mobile phones of several Indian rights activists and journalists had been hacked into has sparked a furore with privacy activists asking the government to clarify. The spyware — Pegasus — sold by Israel’s NSO Group was used to tap into 1,400 WhatsApp accounts globally. Responding to queries from ET, the NSO Group disputed the

Scammers are targeting Cash App users with fake ‘free-money’ giveaway campaigns

These scammers are using the same hashtags that are used by Cash App’s legitimate campaigns. When it comes to Cash App scams on YouTube, these scammers use YouTube to promote ‘money generators’ or ‘cash app’ hacks instead of running fake Cash App campaigns. This is edit effort Total Page Visits: 831 – Today Page Visits: 3

Total Page Visits: 831 - Today Page Visits: 3