Security News

An emerging threat actor out of China has been traced to a new hacking campaign aimed at government agencies in India and residents of Hong Kong intending to steal sensitive information, cybersecurity firm Malwarebytes revealed in the latest report shared with The Hacker News. The attacks were observed during the first week of July, coinciding the passage of controversial security law in Hong Kong and India's ban of 59 China-made apps over privacy concerns, weeks after a violent skirmish along the Indo-China border.

India on Monday banned 59 Chinese mobile apps, including the wildly popular TikTok and WeChat, over national security and privacy concerns two weeks after a deadly Himalayan border clash between the nuclear-armed neighbours. The apps "Are engaged in activities... prejudicial to sovereignty and integrity of India, defence of India, security of state and public order," the Ministry of Information Technology said in a statement.

Citizen Lab has a new report on Dark Basin, a large hacking-for-hire company in India. Dark Basin is a hack-for-hire group that has targeted thousands of individuals and hundreds of institutions on six continents.

Cyber-threats taking advantage of the COVID-19 pandemic are evolving, and Google is seeing an increase in related phishing attempts in countries such as Brazil, India, and the UK. As the coronavirus crisis spreads worldwide, cyber-criminals and state-sponsored actors have adapted their attacks to leverage pandemic-related lures. Google says it has observed an increase in the number of scams targeting Aarogya Setu, an initiative where the government is trying to connect people across India with essential health services.

India has open-sourced its Aarogya Setu contact-tracing app and announced a bug bounty programme to detect any security issues. The nation has now decided to open the app and run a bug bounty programme.

India has open-sourced its Aarogya Setu contact-tracing app and announced a bug bounty programme to detect any security issues. The nation has now decided to open the app and run a bug bounty programme.

India's government has released the protocol for using data gathered by its Aarogya Setu COVID-19 tracing app, weeks after its April 2nd release and after it was downloaded almost 100 million times. The protocols [PDF], released yesterday by India's Ministry of Electronics and Information Technology, state that the state-run National Informatics Centre will "Collect only such data as is necessary and proportionate to formulate or implement appropriate health responses."

The Indian government has acknowledged "Potential security issues" in the Aarogya Setu contact-tracing app which its opposition labels as a "Surveillance system with no oversight", but says the code issues are not that big a deal. Unlike other nations' contact-tracing apps, Aarogya Setu is not open source or known to be based on other open-source efforts.

In 1965, Gordon Moore published a short informal paper, Cramming more components onto integrated circuits. Based on not much more but these few data points and his knowledge of silicon chip development - he was head of R&D at Fairchild Semiconductors, the company that was to seed Silicon Valley - he said that for the next decade, component counts by area could double every year.

In 1965, Gordon Moore published a short informal paper, Cramming more components onto integrated circuits. Based on not much more but these few data points and his knowledge of silicon chip development - he was head of R&D at Fairchild Semiconductors, the company that was to seed Silicon Valley - he said that for the next decade, component counts by area could double every year.