Online users in India are yet to wake up to threat posed by hackers

November 21, 2016

Nov 21: Consumers who were victims of cybercrime within the past year often continued their unsafe behaviour, reveals the India findings from the 2016 Norton Cyber Security Insights Report.

OnlineFor example, while these consumers were equally likely to use the same password for every account, they were over twice as likely to share their password with others, said the annual report that was released on 17 November. Also, 79% of consumers know they must actively protect their information online, but they still share passwords and engage in other risky behaviour.

Also, close to one in five (18%) consumers have at least one unprotected device, leaving their other devices vulnerable to ransomware (malicious software that blocks access to a computer system until money is paid), malicious websites, zero days and phishing attacks.

While quoting various reasons for not protecting their devices, 36% said they don"t do anything “risky” online; 23% believed security measures would slow them down.

Among those surveyed, a vast majority (85%) of Indians have Wi-Fi in their homes. Proving that thinking about cybersecurity doesn"t mean you"re secure, people who experienced cybercrime within the past year were more likely to be concerned about the security of their home Wi-Fi network (79% vs. 70% non-victims), yet less likely to password-protect their home Wi-Fi network than non-victims (28% vs. 10% of non-victims have unprotected networks).

Only 56% of consumers knew how to determine whether the Wi-Fi network they are using is secure; this is of concern especially since 22% of respondents agreed to have used their neighbour"s Wi-Fi network without their permission, the report said. When it comes to public Wi-Fi, one in four (27%) regularly use public Wi-Fi connections available at places like airports and coffee shops.

Experiencing cybercrime is a potential consequence of living in a connected world, the report acknowledges but cautions that consumers are complacent about protecting their personal information online.

As many as 64% of consumers said that over the past five years, it"s become harder to stay safe online, compared to 60% who said the same of the real world.

According to the report, millennials exhibit surprisingly slack online security habits, and are happy to share passwords that compromise their online safety (34%).

This is likely why they remain the most common victims of cybercrime, with 55% having experienced cybercrime in the past year.

Consumers are still willing to click on links from senders they don"t know or open malicious attachments. One in three (33%) cannot detect a phishing attack. Among those surveyed, 65% of Indian consumers don"t believe there are enough connected device users for it to be a worthwhile target for hackers. Yet, 68% believe that just as hackers learnt to benefit from targeting social media and financial accounts, they are on their way to learning how accessing connected home devices can be lucrative.

Indians also rank high in terms of falling prey to ransomware, according to the report. One in three (33%) have either experienced ransomware or know someone who has; 83% of ransomware victims fell prey to it in the past one year alone, indicating a steady rise of this menace.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 2,2020

Paris, Jul 2: Several interacting exoplanets have already been spotted by satellites. But a new breakthrough has been achieved with, for the first time, the detection directly from the ground of an extrasolar system of this type.

An international collaboration including CNRS researchers has discovered an unusual planetary system, dubbed WASP-148, using the French instrument SOPHIE at the Observatoire de Haute-Provence (CNRS/Aix-Marseille Universite).

The scientists analysed the star's motion and concluded that it hosted two planets, WASP-148b and WASP-148c. The observations showed that the two planets were strongly interacting, which was confirmed from other data.

Whereas the first planet, WASP-148b, orbits its star in nearly nine days, the second one, WASP-148c, takes four times longer. This ratio between the orbital periods implies that the WASP-148 system is close to resonance, meaning that there is enhanced gravitational interaction between the two planets. And it turns out that the astronomers did indeed detect variations in the orbital periods of the planets.

While a single planet, uninfluenced by a second one, would move with a constant period, WASP-148b and WASP-148c undergo acceleration and deceleration that provides evidence of their interaction.

The study will shortly be published in the journal Astronomy & Astrophysics.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 4,2020

Twitter has joined efforts to do away with racially loaded terms such as master, slave and blacklist from its coding language in the wake of the death of African-American George Floyd and ensuing Black Lives Matter protests.

The project started even before the current movement for racial justice escalated following the death of 46-year-old George Floyd in police custody in May.

The use of terms such as "master" and "slave" in programming language originated decades ago. While "master" is used to refer to the primary version of a code, "slave" refers to the replicas. Similarly, the term "Blacklist" is used to refer to items which are meant to be automatically denied.

The efforts to change these terms in favour of more inclusive language at Twitter were initiated by Regynald Augustin and Kevin Oliver and the microblogging platform is now backing their efforts.

"Inclusive language plays a critical role in fostering an environment where everyone belongs. At Twitter, the language we have been using in our code does not reflect our values as a company or represent the people we serve. We want to change that. #WordsMatter," Twitter's engineering team said in a post on Thursday.

As per the recommendations from the team, the term "whitelist" could be replaced by "allowlist" and "blacklist" by "denylist".

Similarly, "master/slave" could be replaced by "leader/follower", "primary/replica" or "primary/standby".

Twitter, however, is not the first to start a project to bring inclusivity in programming language.

According to a report in CNET, the team behind the Drupal online publishing software started using "primary/replica" in place of "master/slave" as early as in 2014.

The use of the terms "master/slave" was also dropped by developers of the Python programming language in 2018.

Now similar efforts are underway at Microsoft's Github and LinkedIn divisions as well, said the report.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.