#1 Trusted Cybersecurity News Platform
Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cybersecurity

Digital Safety | Breaking Cybersecurity News | The Hacker News

Category — Digital Safety
Nepal Imposes New Rules on Cyber Cafes to Curb Cyber Crimes

Nepal Imposes New Rules on Cyber Cafes to Curb Cyber Crimes

Dec 28, 2011
Some 300 internet cafes in Nepal are now under police surveillance following a new government regulation aimed at curbing cyber crimes. According to SSP Rana Bahadur Chand, chief of the Metropolitan Police Crime Division (MPCD), cyber cafe users must now present ID cards and register their names, addresses, and telephone numbers. Chand mentioned, "There are around 1,200 cyber cafes in the Kathmandu Valley, and we will gradually bring all of them under this new law." With the growing internet use in urban areas, cyber crimes have surged significantly, Chand noted. In response, the MPCD has begun implementing measures to monitor cyber cafes operating in the Kathmandu Valley. These cafes are now required to provide information to the police upon request. Every month, approximately 8-10 cyber-related cases are reported to the police. Complaints range from email threats, theft of email IDs and passwords, email hacking, and misuse of images posted on social networking sites lik
Vigilance Urged After Anti-Islamist Group Members' Details Leaked Online

Vigilance Urged After Anti-Islamist Group Members' Details Leaked Online

Dec 20, 2010
A controversial anti-Islamist group has advised its members to stay vigilant following a leak of their details online. Hundreds of names and addresses linked to the English Defence League (EDL) were exposed after hackers breached one of the organization's websites. The group warned its members about potential reprisals and advised them to "remain extra vigilant regarding their home and personal safety." The security breach occurred last weekend when hackers accessed a clothing website connected to the EDL. The attackers, identifying themselves as the "Mujahideen Hacking Unit," obtained lists of individuals who had recently purchased items from the site or donated money to the group. The EDL has gained attention over the past year by organizing protests against what it terms the "Islamification" of Britain. Although the group claims it is neither racist nor anti-Muslim, opponents like United Against Fascism argue that the EDL's agenda is clearly I
Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches

Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches

Sep 10, 2024SaaS Security / Risk Management
Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While these applications may be legitimate, they operate within the blind spots of the corporate security team and expose the company to attackers.  Shadow apps may include instances of software that the company is already using. For example, a dev team may onboard their own instance of GitHub to keep their work separate from other developers. They might justify the purchase by noting that GitHub is an approved application, as it is already in use by other teams. However, since the new instance is used outside of the security team's view, it lacks governance. It may store sensitive corporate data and not have essential protections like MFA enabled, SSO enforced, or it could suffer from weak access controls. These misconfigurations can easily lead to risks like stolen source code and other issues. Types of Shadow Apps  Shadow apps can be categorized based on their interac
India Orders Security Certification for Government Websites After CBI Hack

India Orders Security Certification for Government Websites After CBI Hack

Dec 15, 2010
India has mandated that all government ministries and departments secure their websites with proper certification. This directive follows the hacking of the Central Bureau of Investigation (CBI) website by a group calling themselves the "Pakistani Cyber Army." The National Informatics Centre has been instructed to host websites only after these ministries and departments provide security certification and comply with government guidelines, according to India's Press Information Bureau (PIB). The CBI website was defaced by hackers over a week ago. The attackers claimed their actions were in retaliation for similar hacks on Pakistani websites. A CBI spokeswoman stated that the site would undergo a thorough security audit and fix all vulnerabilities before being restored. Importantly, the agency's internal IT systems remained uncompromised. As of Wednesday morning, the CBI site had not yet been restored. India's Minister of State for Communications and IT, Sachin
cyber security

DevOps Security Best Practices

websiteWizDevOps / Secure Coding
Develop securely from code to cloud with this DevOps Security Cheat Sheet from Wiz. Take a deep dive into secure coding, infrastructure security, and vigilant monitoring and response.
Military Cautions Troops About Facebook's Location Revealing Risks

Military Cautions Troops About Facebook's Location Revealing Risks

Nov 20, 2010
Computer security firms and military personnel have issued warnings about certain Facebook features that could compromise both personal and national security. On Thursday, Sophos, a computer security developer, warned that Facebook's new online messaging service could increase users' vulnerability to identity theft. John Leyden of The Register reported that the service, which combines site updates, instant messaging chat, and SMS messages in one place, is an attractive target for cybercriminals. According to Leyden, spammers can easily target accounts, or they can be compromised to create Web 2.0 botnets. "Users need to realize that these new features increase the attack surface on the Facebook platform, making personal accounts more attractive to cybercriminals," said Graham Cluley, Sophos' senior technology consultant, to AFP. "Facebook accounts will now be linked with more people in users' social circles, creating new opportunities for identity fraud
Expert Insights / Articles Videos
Cybersecurity Resources