IT Audit in Accordance with COBIT Standard, Suman Thapaliya
4th June 2021, Kathmandu
IT audit is the process of gathering and evaluating evidence-based on which one can evaluate the performance of IT systems, i.e., to determine whether the operation of information...
Data Breach at Canada Post Affected 950k Customers of 44 Large Businesses
29th May 2021, Kathmandu
Canada Post data breach affected 44 large businesses and their 950,000 customers. Commport Communications provided the information about the breach to Canada Post.
A data breach occurred when a...
“Wasted” WiFi Signal Powers Small Devices
28th May 2021, Kathmandu
This article is freely split under the Attribution 4.0 International license. Researchers have developed a way to gather energy from WiFi signals to power small devices.
The amount of...
Cyberthreats Growing Like The Stealthiest Cancer In Health Sector
28th May 2021, Kathmandu
Know-how of the latest cyber threats in the health care sector is getting deeper, and be equipped with necessary cybersecurity measures to protect your people, data, and assets.
Cyberthreats...
Google: Italy to Contain Massive Abroad Tech Corporations in Nationwide
26th May 2021, Kathmandu
Italy aims to produce a storage system for sensitive state data using cloud technology developed by big overseas firms. Its innovation minister said on Monday, following France's lead...
Data breach in Air India Caused Exposure of 4.5 Million Passengers Personal Information
26th May 2021, Kathmandu
Data Breach on SITA passenger system service of Air India compromised the personal data of 4.5 million passengers. A decade worth of data was accessed by the attackers.
Data...
67% Indians find no Harm in Slow down of Software Updates: Report
24th May 2021, Kathmandu
While cybercrimes are on the growth, 67 percent of Indian clients think there is no harm in delaying software updates, giving hackers enough time to break into their...
Colonial Pipeline Hack Matters and but Why Apparently?
24th May 2021, Kathmandu
Due to colonial pipeline hack, the most likely to experience limited fuel availability and higher prices are Mississippi, Tennessee, and the East Coast from Georgia to Delaware.
The recent...
App Tracking Transparency the Highlight of the New Apple Advertisement
24th May 2021, Kathmandu
Apple has just now uploaded a new privacy ad that highlights the App Tracking Transparency feature.
The advertisement, ‘Privacy on iPhone Tracked’ title tells the story of a medium...
Ever thought of a hack-proof Computer? Some Researchers Are Working
22nd May 2021, Kathmandu
Computer security is becoming increasingly significant due to the increased reliance on computer systems, the Internet, and wireless networks.
Ever thought of a hack-proof computer? Some researchers are working...
Career Path in Cyber Security Webinar Successfully Conducted
22nd May 2021, Kathmandu
A one-day event was organized virtually by npCert, CSRI Nepal in association with Texas College of Management and IT with the title 'Career Path in Cyber Security on...
Robust Regulatory Framework Needed to Deal with ‘Open Banking’
21st May 2021, Kathmandu
Robust regulatory framework needed to deal with 'open banking' challenges: specialties. India wants a secure regulatory framework to take care of a number of challenges emanating from enlarging...
Covid-19 Patient’s Health Data Being Sold on the Dark Web
21st May 2021, Kathmandu
Some cybersecurity researchers have unearthed personal medical details and records of patients who were up for sale on the dark web.
Investigators say they have seen a "sharp increase"...
Nepali Hacker Conference in September: Participation is free
21st May 2021, Kathmandu
'Threat Con’ - a Nepali hacker conference, is about to take place in September.
The date of the conference has been announced by Threatnix - a Nepalese cybersecurity company...
User’s not Accepting Privacy terms to face Limited Functionality: WhatsApp
19th May 2021, Kathmandu
What’s App has removed the May 15th finishing date for accepting the new privacy policy. In fact, the social messaging app now says the user will not lose...
Follow Singapore Model to Regulate Cryptocurrency in India: Experts
19th May 2021, Kathmandu
In a notable move that will streamline cryptocurrencies, S&P Dow Jones recently started three indices linked to Bitcoin and Ethereum; they are the most popular digital tokens, with...
Privacy Fears Around Patients’ Health Data Breach Among Covid Surge
17th May 2021, Kathmandu
Sufferers are gazing at a brand new sort of privateers breach the place wellbeing knowledge can impact all their future monetary selections, by cyber safety consultants.
For example, a...
Malicious COVID-19 Vaccine SMS that Includes Android Phones Spreading
17th May 2021, Kathmandu
Malicious COVID-19 vaccine SMS that includes Android phones spreading: Cyber agency. With people facing to book vaccination place in India, a new message which claims to provide registration...
Apple Air Tag Tracker Hacked and Reprogrammed by a Security Researcher
17th May 2021, Kathmandu
Apple Air Tag may have some security matters that could be exploited by hackers to modify the firmware of the device. Apple had released the Air Tag last...
Cyber Specialist Asks Flipkart Users to Reset Passwords to Avoid Fraud
17th May 2021, Kathmandu
An alleged reveal database can potentially lead to unauthorized transactions from accounts of Flip kart client as well used grocery platform Big Basket with common user ID and...
WhatsApp New Privacy Policy Started from 15th May
16th May 2021, Kathmandu
WhatsApp Messenger is a free messaging app available for Android and smartphones which allows users to send text messages and voice messages, make a voice call, video calls,...
10 Most Powerful Hacking Techniques You Must Know
15th May 2021, Kathmandu
Hacking is the unauthorized access to or control over computer network security systems for some illicit purpose. Hacking means compromising computer systems, personal accounts, computer networks, or digital...
Cybercrime Strongly Affected By The Covid-19 Pandemic
15th May 2021, Kathmandu
Cybercrime is a criminal activity that either targets or uses a computer, a computer network, or a network device. Cybercrime may threaten a person, company, or a nation's...
DarkSide Wanted Money, Not Disruption from Colonial Pipeline Attack
13th May 2021, Kathmandu
The colonial pipeline ransomware cyber attack forced the company to shut down operations and freeze IT systems. The FBI officially verified that DarkSide was responsible for compromising Colonial...
GitHub Prepares to Move Beyond Passwords
13th May 2021, Kathmandu
Github, a platform that provides internet hosting for software development and distributed version control, uses Git over SSH as supporting security keys.
Kevin Jones, the Github security engineer, said...
Cyber Attack on Amazon’s European Rival Glovo by Hackers
12th May 2021, Kathmandu
Hackers gained unauthorized access to Glovo. Just a month ago, Glovo announced a $530 million investment to create itself as Europe's Amazon.
An e-commerce platform like Amazon delivers everything...
Is the Cloud Really Less Secure than On-premises?
10th May 2021, Kathmandu
Many years ago, cloud computing rolled onto the enterprise scene, hopefully, a new way of computing supporting an organization’s infrastructure, running applications.
It’s been long, hard lumber to receive,...
How Should the Service Desk Reset Passwords?
10th May 2021, Kathmandu
Now and then, when employees forget passwords, they call the service desk to change or reset them. The help desk does other tasks too, but the average help...
How to Update Web Browsers for Secure Browsing
10th May 2021, Kathmandu
The World Wide Web accessing software application also known as web browsers or simply “browser” is used to access and view websites through internet. Some of well-known browsers...
Four Major Privacy and Security Updates from Google
10th May 2021, Kathmandu
An American multinational technology company specializes in Internet-related services and products, including online advertising technologies, a search engine, cloud computing, software, and hardware also known as Google has...