Online users in India are yet to wake up to threat posed by hackers

November 21, 2016

Nov 21: Consumers who were victims of cybercrime within the past year often continued their unsafe behaviour, reveals the India findings from the 2016 Norton Cyber Security Insights Report.

OnlineFor example, while these consumers were equally likely to use the same password for every account, they were over twice as likely to share their password with others, said the annual report that was released on 17 November. Also, 79% of consumers know they must actively protect their information online, but they still share passwords and engage in other risky behaviour.

Also, close to one in five (18%) consumers have at least one unprotected device, leaving their other devices vulnerable to ransomware (malicious software that blocks access to a computer system until money is paid), malicious websites, zero days and phishing attacks.

While quoting various reasons for not protecting their devices, 36% said they don"t do anything “risky” online; 23% believed security measures would slow them down.

Among those surveyed, a vast majority (85%) of Indians have Wi-Fi in their homes. Proving that thinking about cybersecurity doesn"t mean you"re secure, people who experienced cybercrime within the past year were more likely to be concerned about the security of their home Wi-Fi network (79% vs. 70% non-victims), yet less likely to password-protect their home Wi-Fi network than non-victims (28% vs. 10% of non-victims have unprotected networks).

Only 56% of consumers knew how to determine whether the Wi-Fi network they are using is secure; this is of concern especially since 22% of respondents agreed to have used their neighbour"s Wi-Fi network without their permission, the report said. When it comes to public Wi-Fi, one in four (27%) regularly use public Wi-Fi connections available at places like airports and coffee shops.

Experiencing cybercrime is a potential consequence of living in a connected world, the report acknowledges but cautions that consumers are complacent about protecting their personal information online.

As many as 64% of consumers said that over the past five years, it"s become harder to stay safe online, compared to 60% who said the same of the real world.

According to the report, millennials exhibit surprisingly slack online security habits, and are happy to share passwords that compromise their online safety (34%).

This is likely why they remain the most common victims of cybercrime, with 55% having experienced cybercrime in the past year.

Consumers are still willing to click on links from senders they don"t know or open malicious attachments. One in three (33%) cannot detect a phishing attack. Among those surveyed, 65% of Indian consumers don"t believe there are enough connected device users for it to be a worthwhile target for hackers. Yet, 68% believe that just as hackers learnt to benefit from targeting social media and financial accounts, they are on their way to learning how accessing connected home devices can be lucrative.

Indians also rank high in terms of falling prey to ransomware, according to the report. One in three (33%) have either experienced ransomware or know someone who has; 83% of ransomware victims fell prey to it in the past one year alone, indicating a steady rise of this menace.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 28,2020

The US space agency has thrown open a challenge to win over Rs 26 lakh, calling the global community to send novel design concepts for compact toilets that can operate in both microgravity and lunar gravity.

NASA is preparing for return to the Moon and innumerable activities to equip, shelter, and otherwise support future astronauts are underway.

The astronauts will be eating and drinking, and subsequently urinating and defecating in microgravity and lunar gravity.

NASA said that while astronauts are in the cabin and out of their spacesuits, they will need a toilet that has all the same capabilities as ones here on Earth.

The public designs for space toilet may be adapted for use in the Artemis lunar landers that take humans back to the Moon.

"Although space toilets already exist and are in use (at the International Space Station, for example), they are designed for microgravity only," the US space agency said in a statement.

NASA's Human Landing System Programme is looking for a next-generation device that is smaller, more efficient, and capable of working in both microgravity and lunar gravity.

The new NASA challenge includes a Technical category and Junior category and the last date to send designs is August 17.

NASA's Artemis Moon mission will land the first woman and next man on the lunar surface by 2024.

The Artemis programme is part of America's broader Moon to Mars exploration approach, in which astronauts will explore the Moon and experience gained there to enable humanity's next giant leap, sending humans to Mars.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 24,2020

New Delhi, Jun 24: The Centre has made it mandatory for sellers to enter the 'Country of Origin' while registering all new products on government e-marketplace (GeM).

The e-marketplace is a special purpose vehicle (SPV) under the Ministry of Commerce and Industry which facilitates the entry of small local sellers in public procurement, while implementing 'Make in India' and MSE Purchase Preference Policies of the Centre.

Accordingly, the ministry said the move has been made to promote 'Make in India' and 'Atma Nirbhar Bharat'.

The provision has been enabled via the introduction of new features on GeM.

Besides the registration process, the new feature also reminds sellers who have already uploaded their products, to disclose their products' 'Country of Origin' details.

The ministry further said that failing to disclose the detail will lead to removal of the products from the e-marketplace.

"GeM has taken this significant step to promote 'Make in India' and 'Aatmanirbhar Bharat'," the ministry said in a statement.

"GeM has also enabled a provision for indication of the percentage of local content in products. With this new feature, now, the 'Country of Origin' as well as the local content percentage are visible in the marketplace for all items. More importantly, the 'Make in India' filter has now been enabled on the portal. Buyers can choose to buy only those products that meet the minimum 50 per cent local content criteria."

In case of bids, the ministry said that buyers can now reserve any bid for a "Class I Local suppliers. For those bids below Rs 200 crore, only Class I and Class II Local Suppliers are eligible to bid, with Class I supplier getting purchase preference".

In addition to this, the Department for Promotion of Industry and Internal Trade (DPIIT) has reportedly called for a meeting with all e-commerce companies such as Amazon and Flipkart to display the country of origin on the products sold on their platform, as well as the extent of value added in India.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.