Tamil Nadu government domains lacks basic security protocols shows report
The Tamil Nadu government domain (tn.gov.in) has many exposures that can lead to phishing attacks and data breaches. The domain…
By web-post | 3 minutes readThe Tamil Nadu government domain (tn.gov.in) has many exposures that can lead to phishing attacks and data breaches. The domain…
By web-post | 3 minutes readTamil Nadu Generation and Distribution Company (Tangedco) has recently cautioned the public against fraudulent messages stating…
By web-post | 2 minutes readRansomware has become a popular means for cyber criminals to cash in on their activities. They use ransomware to encrypt…
By web-post | 2 minutes readOver a third, (36 percent) of employees say they have picked up bad cybersecurity behaviours and found security workarounds since…
By web-post | 2 minutes readNearly two-thirds (64 per cent) of business decision makers are anticipating Covid-themed phishing attacks targeting their…
By web-post | 2 minutes readThe Middle East region is facing acyber pandemic with Covid-19 related attacks skyrocketing this year, according to the United…
By web-post | 2 minutes readOne day after the Indian agency Cert-In, tasked with cybersecurity, issued an advisory regarding a possible cyber attack in the…
By web-post | 2 minutes readThe CBI has alerted police forces and central security agencies on an Interpol input about a malicious software, Cerberus, that…
By web-post | 2 minutes readThe coronavirus outbreak has led to a rise in hacking attempts and cyberattacks which is why an international group of close to…
By web-post | 2 minutes readCoronavirus is the new pick for cybercriminals. With the virus spreading and affecting people around the world, cybercriminals…
By web-post | 1 minute readKaspersky experts have detected multiple cases of a sophisticated scam targeting users through fraudulent, unsolicited Google…
By web-post | 2 minutes readSecurity company Symantec said that India ranks third in the list of countries with largest number of cyberattacks and, second,…
By web-post | 2 minutes read