Paytm Mall hacking: ‘Our data are safe, no security lapses found,’ says company

New Delhi: The e-commerce unit of payment solutions provider Paytm, Paytm Mall, on Sunday said it has not found any security lapses yet after investigating claims of a possible hack and data breach. The clarification came after US-based cyber research firm Cyble had said a hacker group with the alias ‘John Wick’ was able to gain unrestricted access to Paytm Mall’s databases. “We would like to assure that all user, as well as company data, is completely safe and secure… We have been investigating the claims of a possible hack…

Read More

What is DataBase?

What is DataBase? – A Database is a collection of logically related information in an organized way so that it can be easily accessed, managed and updated. Some other operations can also be performed on database such as adding, updating and deleting data. A Database could be simple as a single text file with a list of names or it could be complex as a large bunch of text files including some data. How to Hack Facebook Account What is DataBase? Fundamentals of Database For defining database, two terms, which…

Read More

QakBot Banking Trojan Returned With New Sneaky Tricks to Steal Your Money

A notorious banking trojan aimed at stealing bank account credentials and other financial information has now come back with new tricks up its sleeve to target government, military, and manufacturing sectors in the US and Europe, according to new research. In an analysis released by Check Point Research today, the latest wave of Qbot activity appears to have dovetailed with the return of Emotet — another email-based malware behind several botnet-driven spam campaigns and ransomware attacks — last month, with the new sample capable of covertly gathering all email threads…

Read More

Iranian Hackers Pose as Journalists to Trick Victims Into Installing Malware

An Iranian cyberespionage group known for targeting government, defense technology, military, and diplomacy sectors is now impersonating journalists to approach targets via LinkedIn and WhatsApp and infect their devices with malware. Detailing the new tactics of the “Charming Kitten” APT group, Israeli firm Clearsky said, “starting July 2020, we have identified a new TTP of the group, impersonating ‘Deutsche Welle’ and the ‘Jewish Journal’ using emails alongside WhatsApp messages as their main platform to approach the target and convince them to open a malicious link.” This development is the first…

Read More

APT Hackers Exploit Autodesk 3ds Max Software for Industrial Espionage

It’s one thing for APT groups to conduct cyber espionage to meet their own financial objectives. But it’s an entirely different matter when they are used as “hackers for hire” by competing private companies to make away with confidential information. Bitdefender’s Cyber Threat Intelligence Lab discovered yet another instance of an espionage attack targeting an unnamed international architectural and video production company that had all the hallmarks of a carefully orchestrated campaign. “The cybercriminal group infiltrated the company using a tainted and specially crafted plugin for Autodesk 3ds Max,” Bitdefender…

Read More

Former Uber Security Chief Charged Over Covering Up 2016 Data Breach

The federal prosecutors in the United States have charged Uber’s former chief security officer, Joe Sullivan, for covering up a massive data breach that the ride-hailing company suffered in 2016. According to the press release published by the U.S. Department of Justice, Sullivan “took deliberate steps to conceal, deflect, and mislead the Federal Trade Commission about the breach” that also involved paying hackers $100,000 ransom to keep the incident secret. “A criminal complaint was filed today in federal court charging Joseph Sullivan with obstruction of justice and misprision of a…

Read More

6 tips to keep Gmail account secure and protect

Here are a few tips to keep your Gmail account safe from hackers. A lot of us are heavily integrated into the Google ecosystem with Android, Gmail, Search, Docs, Maps, YouTube, and many more. All of these things are controlled using one Gmail account. Due to such high-level integration, it gets mandatory to keep your Gmail account protected, because if it is compromised, then the whole Google ecosystem will be at risk. Today, we will take a look at a few tips with which you can keep your Google account…

Read More