Data Breach Canada Post

Data Breach at Canada Post Affected 950k Customers of 44 Large Businesses 

29th May 2021, Kathmandu Canada Post data breach affected 44 large businesses and their 950,000 customers. Commport Communications provided the information about the breach to Canada Post. A data breach occurred when a...
WiFi Signal Powers

“Wasted” WiFi Signal Powers Small Devices

28th May 2021, Kathmandu This article is freely split under the Attribution 4.0 International license. Researchers have developed a way to gather energy from WiFi signals to power small devices. The amount of...
CyberThreat Growing

Cyberthreats Growing Like The Stealthiest Cancer In Health Sector

28th May 2021, Kathmandu Know-how of the latest cyber threats in the health care sector is getting deeper, and be equipped with necessary cybersecurity measures to protect your people, data, and assets.  Cyberthreats...
Google Italy

Google: Italy to Contain Massive Abroad Tech Corporations in Nationwide

26th May 2021, Kathmandu Italy aims to produce a storage system for sensitive state data using cloud technology developed by big overseas firms. Its innovation minister said on Monday, following France's lead...
Data breach in Air India

Data breach in Air India Caused Exposure of 4.5 Million Passengers Personal Information

26th May 2021, Kathmandu Data Breach on SITA passenger system service of Air India compromised the personal data of 4.5 million passengers. A decade worth of data was accessed by the attackers. Data...
Slow down of Software Updates

67% Indians find no Harm in Slow down of Software Updates: Report

24th May 2021, Kathmandu While cybercrimes are on the growth, 67 percent of Indian clients think there is no harm in delaying software updates, giving hackers enough time to break into their...
Colonial Pipeline Hack

Colonial Pipeline Hack Matters and but Why Apparently?

24th May 2021, Kathmandu Due to colonial pipeline hack, the most likely to experience limited fuel availability and higher prices are Mississippi, Tennessee, and the East Coast from Georgia to Delaware. The recent...
Apple Advertisement

App Tracking Transparency the Highlight of the New Apple Advertisement

24th May 2021, Kathmandu Apple has just now uploaded a new privacy ad that highlights the App Tracking Transparency feature. The advertisement, ‘Privacy on iPhone Tracked’ title tells the story of a medium...
hack-proof Computer

Ever thought of a hack-proof Computer? Some Researchers Are Working

22nd May 2021, Kathmandu Computer security is becoming increasingly significant due to the increased reliance on computer systems, the Internet, and wireless networks. Ever thought of a hack-proof computer? Some researchers are working...
cybersecurity career path

Career Path in Cyber Security Webinar Successfully Conducted

22nd May 2021, Kathmandu A one-day event was organized virtually by npCert, CSRI Nepal in association with Texas College of Management and IT with the title 'Career Path in Cyber Security on...
Robust Regulatory Framework

Robust Regulatory Framework Needed to Deal with ‘Open Banking’

21st May 2021, Kathmandu Robust regulatory framework needed to deal with 'open banking' challenges: specialties. India wants a secure regulatory framework to take care of a number of challenges emanating from enlarging...
Darknet

Covid-19 Patient’s Health Data Being Sold on the Dark Web

21st May 2021, Kathmandu Some cybersecurity researchers have unearthed personal medical details and records of patients who were up for sale on the dark web. Investigators say they have seen a "sharp increase"...
Threat Con 2021

Nepali Hacker Conference in September: Participation is free

21st May 2021, Kathmandu 'Threat Con’ - a Nepali hacker conference, is about to take place in September. The date of the conference has been announced by Threatnix - a Nepalese cybersecurity company...
WhatsApp Privacy

User’s not Accepting Privacy terms to face Limited Functionality: WhatsApp

19th May 2021, Kathmandu What’s App has removed the May 15th finishing date for accepting the new privacy policy. In fact, the social messaging app now says the user will not lose...
Cryptocurrency in India

Follow Singapore Model to Regulate Cryptocurrency in India: Experts

19th May 2021, Kathmandu In a notable move that will streamline cryptocurrencies, S&P Dow Jones recently started three indices linked to Bitcoin and Ethereum; they are the most popular digital tokens, with...
Health Data Breach

Privacy Fears Around Patients’ Health Data Breach Among Covid Surge

17th May 2021, Kathmandu Sufferers are gazing at a brand new sort of privateers breach the place wellbeing knowledge can impact all their future monetary selections, by cyber safety consultants. For example, a...
Malicious COVID-19 Vaccine

Malicious COVID-19 Vaccine SMS that Includes Android Phones Spreading

17th May 2021, Kathmandu Malicious COVID-19 vaccine SMS that includes Android phones spreading: Cyber agency. With people facing to book vaccination place in India, a new message which claims to provide registration...
Tag Tracker Hacked

Apple Air Tag Tracker Hacked and Reprogrammed by a Security Researcher

17th May 2021, Kathmandu Apple Air Tag may have some security matters that could be exploited by hackers to modify the firmware of the device. Apple had released the Air Tag last...
Flip kart users

Cyber Specialist Asks Flipkart Users to Reset Passwords to Avoid Fraud

17th May 2021, Kathmandu An alleged reveal database can potentially lead to unauthorized transactions from accounts of Flip kart client as well used grocery platform Big Basket with common user ID and...
WhatsApp New Privacy Policy

WhatsApp New Privacy Policy Started from 15th May

16th May 2021, Kathmandu WhatsApp Messenger is a free messaging app available for Android and smartphones which allows users to send text messages and voice messages, make a voice call, video calls,...
Hacking Techniques

10 Most Powerful Hacking Techniques You Must Know

15th May 2021, Kathmandu Hacking is the unauthorized access to or control over computer network security systems for some illicit purpose. Hacking means compromising computer systems, personal accounts, computer networks, or digital...
Cybercrime

Cybercrime Strongly Affected By The Covid-19 Pandemic

15th May 2021, Kathmandu Cybercrime is a criminal activity that either targets or uses a computer, a computer network, or a network device. Cybercrime may threaten a person, company, or a nation's...
DarkSide Wanted Money

DarkSide Wanted Money, Not Disruption from Colonial Pipeline Attack

13th May 2021, Kathmandu The colonial pipeline ransomware cyber attack forced the company to shut down operations and freeze IT systems. The FBI officially verified that DarkSide was responsible for compromising Colonial...
GitHub Passwords

GitHub Prepares to Move Beyond Passwords

13th May 2021, Kathmandu Github, a platform that provides internet hosting for software development and distributed version control, uses Git over SSH as supporting security keys. Kevin Jones, the Github security engineer, said...
European Rival Glovo by Hackers

Cyber Attack on Amazon’s European Rival Glovo by Hackers

12th May 2021, Kathmandu Hackers gained unauthorized access to Glovo. Just a month ago, Glovo announced a $530 million investment to create itself as Europe's Amazon. An e-commerce platform like Amazon delivers everything...
Cloud vs. On-Premises Security

Is the Cloud Really Less Secure than On-premises?

10th May 2021, Kathmandu Many years ago, cloud computing rolled onto the enterprise scene, hopefully, a new way of computing supporting an organization’s infrastructure, running applications. It’s been long, hard lumber to receive,...
Service Desk Reset Passwords

How Should the Service Desk Reset Passwords?

10th May 2021, Kathmandu Now and then, when employees forget passwords, they call the service desk to change or reset them. The help desk does other tasks too, but the average help...
Secure Browsing

How to Update Web Browsers for Secure Browsing

10th May 2021, Kathmandu The World Wide Web accessing software application also known as web browsers or simply “browser” is used to access and view websites through internet. Some of well-known browsers...
Security Updates from Google

Four Major Privacy and Security Updates from Google

10th May 2021, Kathmandu An American multinational technology company specializes in Internet-related services and products, including online advertising technologies, a search engine, cloud computing, software, and hardware also known as Google has...
Cloud Computing Security

Cloud Computing Security Vulnerabilities and What to Do

7th May 2021, Kathmandu Cloud vulnerability (Cloud Security Monitoring - Reduce Hours of Vulnerability) Many organizations are continuously trying to establish on cloud nowadays, which is one of the most important reasons why...