Hyderabad-based Shriram Life Insurance is alleged to have suffered a huge breach involving over 50 GB of critical data, including customer information. The reported attackers threatened to sell the data for 50 bitcoins.
Security leaders say data science is becoming the building block of contemporary security solutions, showing great promise for developing necessary cyber defences. But where and how is data science best deployed?
A report that the Russian government hacked into Democratic National Committee systems has security experts warning that just because malware was found on a hacked network, that doesn't mean a specific individual, group or nation-state was involved.
As insider channels increasingly become the vector through which attackers gain unauthorized access to data, organizations must look at context-aware security to understand user behavior and prevent data leak, says Naveen Gurusiddaiah of Micro Focus.
Insider fraud is one of the biggest challenges facing Indian security practitioners, yet they struggle to respond to insider crimes, says Berjes Shroff, CISO of Godrej Infotech, and a speaker at the ISMG Data Breach & Fraud Prevention Summit Asia in Mumbai.
Singapore is considering data privacy and protection legislation soon, owing to strong support from the industry's data privacy and protection leaders. The government seems to be studying EU's General Data Protection Regulation closely to incorporate some elements.
Ransomware, regulations, botnets, information sharing and policing strategies were just some of the topics that dominated the "International Conference on Big Data in Cyber Security" hosted by Edinburgh Napier University in Scotland.
The SWIFT messaging platform, which was hacked during the Bangladesh Bank heist, is used widely by most Indian banks for international financial transactions. Institutions that rely on the platform must be more vigilant, experts warn.
Close on the heels of the QNB leak, the same attackers have published data that appears to be from UAE-based InvestBank. The dump appears to contain payment card data, as well as a large number of sensitive, internal files relating to the bank's employees and systems.
In the aftermath of a media maelstrom surrounding an alleged hack, the IRCTC flatly denies any compromise, but it's anxious to verify data in police possession, which the authorities apparently have still not shared. Here's the full lowdown.
The Pakistan National Assembly has approved the cybercrime bill under the Prevention of Electronic Crimes Act, 2015. It is a positive move, but given the challenges of execution, there is still far to go in ensuring a cybersecure ecosystem.
Have you tested things before they break? Could an email be a trap? In honor of Star Wars Day, we proudly present essential cybersecurity lessons as derived from - and delivered via - the wisdom and wit of the iconic space opera.
A preview of director Oliver Stone's upcoming film "Snowden" portrays former NSA contractor Edward Snowden as a gung-ho action hero - a cunning insider and a clever operative.
Despite the arrest and conviction of scores of cyber criminals - including members of the Blackhole exploit kit, SpyEye and GameOver Zeus crews - malware and ransomware threats continue to grow.
India has become an IT software and services powerhouse and globally recognized technology brand. Can the country now repeat that success story when it comes to cybersecurity?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.