comparemela.com

Page 16 - ஹேக்கிங் News Today : Breaking News, Live Updates & Top Stories | Vimarsana

Breach of Air India data poses litigation risk for airline, experts say

Breach of Air India data poses litigation risk for airline, experts say Updated: Updated: It could further delay the privatisation process, they say Share Article It could further delay the privatisation process, they say The breach of passenger data at Air India may pose litigation risks for the airline that could further delay the privatisation process, warn experts, adding that the national carrier must prioritise efforts to contain the damage from the cyber attack by informing passengers about steps they can still take to prevent fraud. In a press statement, the airline said that its passenger processing system, supplied by multi-national information technology company SITA, was a target of a sophisticated cyber attack on February 25. Nearly 45 lakh “data subjects” registered over a period of 10 years between August 2011 to February 2021 were affected around the world, including passengers of other airlines such as Singapore Airlines, Lufthansa, Cathay Pacific, United

New Dangers Of Working From Home: Cybersecurity Risks

Like any crime, cyber risk will have neither a defined solution nor a concrete endpoint. There is no simple solution nor any fixed game plan. What senior management needs to do is develop corporate skills and capabilities just as it does for marketing or other functions.

The Full Story of the Stunning RSA Hack Can Finally Be Told

To revist this article, visit My Profile, then View saved stories. Amid all the sleepless hours that Todd Leetham spent hunting ghosts inside his company’s network in early 2011, the experience that sticks with him most vividly all these years later is the moment he caught up with them. Or almost did. It was a spring evening, he says, three days maybe four, time had become a blur after he had first begun tracking the hackers who were rummaging through the computer systems of RSA, the corporate security giant where he worked. Leetham a bald, bearded, and curmudgeonly analyst one coworker described to me as a “carbon-based hacker-finding machine” had been glued to his laptop along with the rest of the company’s incident response team, assembled around the company’s glass-encased operations center in a nonstop, 24-hours-a-day hunt. And with a growing sense of dread, Leetham had finally traced the intruders’ footprints to their final targets: the secret keys known as “se

© 2025 Vimarsana

vimarsana © 2020. All Rights Reserved.