Easy Steps To Lock Google Chrome With Inbuilt Password Protection

Many of us are using Google Chrome, but rare of them know about the way to protect the browser with the password. In Google Chrome, you can use inbuilt password protection...

5 IT Security Skills Certifications on the Rise

As it comes to regarding information security, people only read the headlines to see that those with harmful intent find new and effective ways regularly to access and misuse the protected...

Cyber Is A Mathematical Battle, Nitin Verma

Event on Disruption in the digital age, a cybersecurity perspective observed. A demonstration on Disruption in the digital age, a cybersecurity perspective organized by Paloalto and Astral Computers Nepal Private limited...

Cyber Security Awareness At Academiacollege.edu.np

Keeping up with its ambition to spread awareness on Cyber Security Information Security Response Team Nepal successfully concluded its session on 25th January 2017 at Academia International College, Gwarko, Lalitpur. Academia...
Cloud Computing Security

How Does Cloud-Based Security Work? Cloud Computing Security

21 July 2021, Kathmandu Cloud security is the whole bundle of technology, protocols, and best practices that bulwark cloud computing environments, applications running in the cloud, and data held in the cloud....

Why And How The CISO Job Description Is Changing ?

Chief Information Security Officer, The senior executive officer, is regarded as a Chief Information Security Officer (CISO) who is responsible for establishing and maintaining the enterprise strategy, vision, and program to make...

Why Content Scrambling System (CSS) ?

The way of scrambling computer data is called encryption so it can only be read by authorized people. It is one of the best means of securing data over the internet....

Social Media And Cyber Crime Prevention Training

46th CSI Training at Himalayan Secondary English School, Gunjanagar, Chitwan Initially, Concept of Cyber Security Awareness in Nepal has been revealed by Prof. Dr. Ramhari Subedi, who lives in Washington DC;...
WhatsApp Scam

UK Police Issue Warning Over Huge WhatsApp Scam

2nd July 2021, Kathmandu WhatsApp scam alert 2021. WhatsApp verification codes (OTP) should not be shared with other people. They can Trade-off personal accounts. WhatsApp users are frequently getting OTP scammed. Hackers are...

CSI Nepal Conducted 45th Cyber Security Awareness Campaign

Initially, Concept of Cyber Security Awareness in Nepal has been revealed by Dr. Ramhari Subedi, who lives in Washington DC; also, he is the first appointed Cyber Security Advisor of Central...
SAM Vulnerability

Vulnerability Could Allow Enhanced Privileges to Unauthorized Users

25th November 2021, Kathmandu Researchers at Positive Technologies recently found a vulnerability in Intel processors. The CVE-2021-0146 vulnerability empowers testing or investigating modes on various Intel processor lines. This could permit an...
Kantipur Twitter Account Hacked

Kantipur TV’s Twitter account ‘Hacked’: Series of Hacking Continues

7th April 2022, Kathmandu The Twitter account of Kantipur Television has been hacked. The television account of ourktv has been out of access since this yesterday evening, said Dilbhushan Pathak, editor-in-chief of the television. The...
US Embassy event registration: Securing Ourselves Against Digital Threats

Online Presentation: “Securing Ourselves Against Digital Threats”

May 25, 2020, Kathmandu Are you working from home or use the internet for professional purposes? Have you taken sufficient precautions to protect your data? Every online user or organization is at...
Can a phone be hacked through Free WiFi Nepal

Free WiFi Can Be Used To Hack Your Phone, Here’s How To Prevent It?

Thursday, September 5, 2019, Kathmandu In today's world, we feel the need to be constantly connected to the people. We have our phones connected with Wi-Fi all the time, we care more...

Drupal Team Acknowledges Serious Vulnerability In CMS Drupal 

ThreatNix reports, the Drupal team publicly acknowledged a severe vulnerability in the open source CMS Drupal on March with the release of a patch to address the vulnerability. The vulnerability stemming...
Social Network Sites Must Be Registered In Nepal

Social Network Can No Longer Be Used Without Registration In Nepal

Kathmandu, 30 December 2019 Minister of Communication and Information Technology of Nepal, Gokul Baskota has said that social media should be regulated. During a discussion on the Bill for Information Technology at...

What Is Information Security Policy ? Cyber Security Law And Policy

Information Security Policy is a collection of policies implemented by an organization to make sure that all the information technology users within the grasp of the organization or its branches stay...

IOT Attacks Are Getting Worse, Why? Know In Detail

The IoT attacks are getting worse day by day. There is a running joke regarding connected gadgets and the internet of things: “the ‘’S’ in IoT stands for security.” Almost every...

Peekaboo Zero-Day Vulnerability Permits Hacking Of Surveillance Cameras

Security cameras of IoT that represents various vendors invite opportunities for flaws. Recently, researchers have discerned a similar vulnerability that lets the hacking of surveillance cameras. By employing this “Peekaboo zero-day vulnerability”...

Phishing Campaign Targets HMRC To Steal Login And Payment Data

Phishing is the fraudulent attempt to acquire sensitive information such as usernames, password and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in electronic communication. Email...

How To Know Whether Your Antivirus Is Working Perfectly Or Not

You might be wandering lots of sites searching for the Antivirus to detect malware of computer, sometimes it discovers your problem and recover but even if you installed the Antivirus how...
Global Cybersecurity Meeting

Emerging Cybersecurity Technologies to Know for 2022

Technology is continually developing and presently, like never before, remaining in front of the computerized advancement – explicitly online protection – is essential to an association's prosperity. This previous year, we have...

E-Marketing Data Exposed Online From Unsecured MongoDB

11M Records of E-Marketing Data Exposed Online From Unsecured MongoDB Instance. With the running time, there has been development in almost everything. Comparatively, the growth in the technology world is extreme. Along...

Fake Apps Targeted Australian Banks: Security Firm

The fake apps on the Google Play store have targeted the customer of six banks including two of Australian’s most significant lenders by stealing their details, said Security firm. The fake...
Actors Exploited Google

Threat Actors Exploited Google Clouds to Launch Phishing Attacks

21 August 2020, Kathmandu Sometimes we are unable to comprehend the advancement the world is making in terms of digital transformation. And those moments when we choose to ignore the threats that...

Learn to Build Cyber Security Awareness Program Training

24th Cyber Security Training at Chitwan: Cyber Security International has conducted 24th Awareness Generating Program at Gunjanagar, Chitwan Nepal. CEO Dr. Ramhari Subedi appeared through Skype coordinating with the field coordinator of...

CSI Nepal Hosted 6th Cyber Security Awareness Program

Cyber Security International Nepal held its 6th awareness campaign at Chabahil. The students who just gave SLC examinations were the primary target group of this program. The number of participants in...

Steps To Secure Government Issued Email

Recently, the government of Nepal has mandated the compulsory use of email in all the government workstation. The rule came up under a government directive entitled “Government entities email management directives...
Security Research Engineer

Nepali Security Research Engineer Yogesh Ojha in World’s Top Security Conference

14th June 2021, Kathmandu Big Achievement: Security Research Engineer Yogesh Ojha becomes the first Nepali to present his research at the world's top security conference, blackhat USA and DEFCON. Security research engineers are...

Dropbox Hacked – More Than 68 Million Account Details Leaked Online

It’s tough to believe that currently hackers have also hacked the Dropbox account and leaked more than 68 million account details on Dark Web as like LinkedIn, MySpace, VK.com and Tumblr....