Explained: What is IP spoofing and how cyber experts deal with it
In this article, we are going to look into ‘IP spoofing’, one of the methods employed by these bad actors and how it can be countered.
In this article, we are going to look into ‘IP spoofing’, one of the methods employed by these bad actors and how it can be countered.
With the rise in popularity of cryptocurrencies, the attacks on crypto users quadrupled in the first quarter this year, as cybercriminals installed malicious programs called Miners to steal cryptocurrency from infected devices, a new report has showed.
The increased use of online gaming has brought with it a slew of challenges and risks that include exposure of children to inappropriate content, cyberbullying, sexual exploitation, addiction, gambling and toxic peers, warned a new report on Thursday.
In what could put smartphone users at a new privacy and security risk, text-messaging management services are now being misused for as little as Rs 1,160 (nearly $16) to covertly redirect text messages from users to hackers, giving cybercriminals access to two-factor codes/login SMSes.
Cyber criminals are trying to lure Indian users into revealing important personal information with a new report on Monday warning that suspicious messages asking users to submit an application for the disbursement of income tax refund have been doing the rounds, with a link that directs users to a webpage looking like the income tax e-filing web page.
Just when cybercriminals are busy duping people through sophisticated hacking techniques in the pandemic, some users in India have reported receiving a letter in their emails, promising $450,000 (nearly Rs 3.3 crore) from "Microsoft" for being winner of the "Microsoft Relief Grant and Support Initiative".
The popular mobile game Fortnite, currently in a legal battle between its developer Epic Games and Apple, is a gold mine for hackers as cyber criminals are selling stolen accounts and in-game 'skins for roughly $1.2 million (about Rs 8.7 crore) per year.
'We know that cybercriminals will attack any organization that's an easy target, and see both midsize and large organizations being attacked equally.'
'Drive-by download' attacks involve downloading malicious code onto an unsuspecting user's computer when they visit a website or fill up a form. The malicious code that is downloaded is then used by the attacker to steal passwords or financial information.
Over 1 lakh scanned copies of Indians' national IDs, including Aadhaar, PAN card and passport, have been put on dark web for sale, cyber intelligence firm Cyble said on Wednesday.
29.1 million Indian jobseekers' personal details leaked in deepweb for free. We usually see this sort of leaks all the time, but this time, the message header got our attention as it included a lot of personal details - where most of the things are generally static such as education, address etc," according to online intelligence firm Cyble.