AIIMS servers nonetheless down as companies probe cyber assaults, services and products run manually

The investigation into the cyber assault at the servers of All India Institute of Clinical Sciences (AIIMS) persevered on Friday, even because the servers of the health center remained down for the 3rd consecutive day. The health center is managing the affected person care services and products manually, an legit mentioned on Friday. The web … Read more

Executive problems advisory for Mozilla Firefox customers: Main points

In its newest advisory, the Indian Laptop Emergency Reaction Crew (CERT-In) is caution in opposition to a couple of vulnerabilities in Mozilla Firefox browser. The vulnerability, the company says, can also be exploited via attackers to influence sufferers to seek advice from a specifically crafted web page. In its advisory, CERT-In has instructed customers to … Read more

Indian govt problems advisory for smartphone customers: Issues to do & to not do

As incidents of cybercrime proceed to extend, it will be important for web customers to be cyber mindful. Cyber criminals trap blameless customers to click on on malicious hyperlinks by means of promising faux rewards and money prizes. The Indian govt has issued an advisory on ‘Perfect Practices’ that may be adopted by means of … Read more

Right here’s why you should replace Google Chrome in your computer

Google has launched a important replace for the Google Chrome browser that fixes a safety trojan horse in it. The zero-day vulnerability in Google Chrome has been exploited via Google which the tech massive is acutely aware of. With a purpose to safe buyer’s knowledge and privateness on-line, it is vital that customers should replace … Read more

You wish to have to replace your Apple Watch from OS model 8.7, says India executive. Here is why

Are you the usage of an Apple Watch that runs on OS model 8.7 or older? Beware! The Indian Pc Emergency Reaction Group (CERT-in) has flagged critical vulnerabilities that the watches operating in this running tool or older variations would possibly permit attackers to run arbitrary code and bypass safety restrictions at the goal units.  … Read more