Norway's Data Protection Authority said it plans to fine dating app Grindr $11.7 million for what the regulator said was illegal disclosure of user data to advertising firms
Data of nearly 100 million credit and debit card holders in the country is being sold for an undisclosed amount on the Dark Web. Tune in for more
Breach after attack on Bengaluru-based fintech service provider Juspay's server
T-Mobile has suffered a security breach that may have exposed call records and phone numbers for some of its customers.
We realise the seriousness of the issue, and are continuing to engage with all relevant experts, the airline said
The issue cropped up before a bench headed by CJI Bobde which was hearing a plea seeking direction to RBI for framing regulation to ensure that data collected on UPI platforms is not exploited
Most net users have at some time or the other used some service, which has been compromised. You can probe further to check what that data is
Names, email IDs, password hashes, contact numbers, addresses of users put on sale on dark web, claims cyberintelligence firm Cyble
Restoration of the impacted systems is a priority and is underway, it added
The clarification came after US-based cyber research firm Cyble had said a hacker group with the alias 'John Wick' was able to gain unrestricted access to Paytm Mall's databases
Hacker group John Wick said to be behind breach. Ransom demanded pegged at 10 ETH (ether coins), equivalent to $4,000
Data breaches cost organisations in India about Rs 14 crore on an average between August 2019 and April 2020
Google-backed delivery services startup says clients' payment information was not compromised.
The app is the government's mobile application for contact tracing and disseminating medical advisories to users in order to contain the spread of Covid-19
Even getting approval for WFH during the ongoing crisis was not easy for many firms
Breach of privacy is a serious concern
Both employers, employees are liable for data breach from home
The government can also ask data processors to provide data for formulation of evidence-based policies for its own use
Find out extent of damage through dedicated websites, and get into damage control mode
Voter psychological profiles were built to determine political enthusiasm, political orientation, frequency in voting and consistency in voting for the same political party