#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
DevSecOps

Digital Safety | Breaking Cybersecurity News | The Hacker News

Category — Digital Safety
Nepal Imposes New Rules on Cyber Cafes to Curb Cyber Crimes

Nepal Imposes New Rules on Cyber Cafes to Curb Cyber Crimes

Dec 28, 2011
Some 300 internet cafes in Nepal are now under police surveillance following a new government regulation aimed at curbing cyber crimes. According to SSP Rana Bahadur Chand, chief of the Metropolitan Police Crime Division (MPCD), cyber cafe users must now present ID cards and register their names, addresses, and telephone numbers. Chand mentioned, "There are around 1,200 cyber cafes in the Kathmandu Valley, and we will gradually bring all of them under this new law." With the growing internet use in urban areas, cyber crimes have surged significantly, Chand noted. In response, the MPCD has begun implementing measures to monitor cyber cafes operating in the Kathmandu Valley. These cafes are now required to provide information to the police upon request. Every month, approximately 8-10 cyber-related cases are reported to the police. Complaints range from email threats, theft of email IDs and passwords, email hacking, and misuse of images posted on social networking sites lik...
Vigilance Urged After Anti-Islamist Group Members' Details Leaked Online

Vigilance Urged After Anti-Islamist Group Members' Details Leaked Online

Dec 20, 2010
A controversial anti-Islamist group has advised its members to stay vigilant following a leak of their details online. Hundreds of names and addresses linked to the English Defence League (EDL) were exposed after hackers breached one of the organization's websites. The group warned its members about potential reprisals and advised them to "remain extra vigilant regarding their home and personal safety." The security breach occurred last weekend when hackers accessed a clothing website connected to the EDL. The attackers, identifying themselves as the "Mujahideen Hacking Unit," obtained lists of individuals who had recently purchased items from the site or donated money to the group. The EDL has gained attention over the past year by organizing protests against what it terms the "Islamification" of Britain. Although the group claims it is neither racist nor anti-Muslim, opponents like United Against Fascism argue that the EDL's agenda is clearly I...
Protecting Your Software Supply Chain: Assessing the Risks Before Deployment

Protecting Your Software Supply Chain: Assessing the Risks Before Deployment

Feb 11, 2025Software Security / Threat Intelligence
Imagine you're considering a new car for your family. Before making a purchase, you evaluate its safety ratings, fuel efficiency, and reliability. You might even take it for a test drive to ensure it meets your needs. The same approach should be applied to software and hardware products before integrating them into an organization's environment. Just as you wouldn't buy a car without knowing its safety features, you shouldn't deploy software without understanding the risks it introduces. The Rising Threat of Supply Chain Attacks Cybercriminals have recognized that instead of attacking an organization head-on, they can infiltrate through the software supply chain—like slipping counterfeit parts into an assembly line. According to the 2024 Sonatype State of the Software Supply Chain report , attackers are infiltrating open-source ecosystems at an alarming rate, with over 512,847 malicious packages detected last year alone—a 156% increase from the previous year. Traditional sec...
India Orders Security Certification for Government Websites After CBI Hack

India Orders Security Certification for Government Websites After CBI Hack

Dec 15, 2010
India has mandated that all government ministries and departments secure their websites with proper certification. This directive follows the hacking of the Central Bureau of Investigation (CBI) website by a group calling themselves the "Pakistani Cyber Army." The National Informatics Centre has been instructed to host websites only after these ministries and departments provide security certification and comply with government guidelines, according to India's Press Information Bureau (PIB). The CBI website was defaced by hackers over a week ago. The attackers claimed their actions were in retaliation for similar hacks on Pakistani websites. A CBI spokeswoman stated that the site would undergo a thorough security audit and fix all vulnerabilities before being restored. Importantly, the agency's internal IT systems remained uncompromised. As of Wednesday morning, the CBI site had not yet been restored. India's Minister of State for Communications and IT, Sachin...
cyber security

Level Up Your Cyber Skills at SANS 2025

websiteSANS InstituteCyber Security / Training
Master in-demand techniques at our largest training event in 2025. Explore 50+ courses. Train in person to claim your $769 savings!
Military Cautions Troops About Facebook's Location Revealing Risks

Military Cautions Troops About Facebook's Location Revealing Risks

Nov 20, 2010
Computer security firms and military personnel have issued warnings about certain Facebook features that could compromise both personal and national security. On Thursday, Sophos, a computer security developer, warned that Facebook's new online messaging service could increase users' vulnerability to identity theft. John Leyden of The Register reported that the service, which combines site updates, instant messaging chat, and SMS messages in one place, is an attractive target for cybercriminals. According to Leyden, spammers can easily target accounts, or they can be compromised to create Web 2.0 botnets. "Users need to realize that these new features increase the attack surface on the Facebook platform, making personal accounts more attractive to cybercriminals," said Graham Cluley, Sophos' senior technology consultant, to AFP. "Facebook accounts will now be linked with more people in users' social circles, creating new opportunities for identity fraud...
Expert Insights / Articles Videos
Cybersecurity Resources