Data Security News Headlines 20th October, 2016

  1. Malware Attacks Unleash Chaos Across Banking Systems; SBI Blocks 6 Lakh Debit Cards

India’s largest public sector bank, SBI, which has issued around 20.27 debit cards till July, 2016, has accidentally discovered that a malware from a non-SBI ATM network has entered their servers. SBI blocked 6 lakh debit cards due to malware infection and are now issuing fresh cards for these customers. Banks whose ATMs have been infected must come forward and declare those infected ATMs. The onus is on them to stop this.” Unless banks admit the breach, and conduct mass scale operations to contain the breach, anyone who uses such infected ATMs will involuntarily get the malware, and then pass on to other ATMs.

Cyber Security Tips: There is no internal issue in SBI, avoid to use Hitachi payment system for transaction, Avoid to use your ATM card in untrusted switches.

  1. No loss from cyber-attack, says Axis Bank

Axis Bank, India’s third-biggest private sector lender by assets, said on Wednesday there was no loss to its customers from a recent cyber-attack. Axis Bank was also caught malware entering their servers, and unleashing havoc, the extent of which is still unknown. No one knows how much damage has been done due to unauthorized logins, and due to the malware in their servers. A statement from Axis Bank said, “Safety and security of our systems and processes is of paramount importance to us and we constantly monitor and are vigilant in our efforts to combat any potential threats. We would like to state that there has been no monetary loss. Here are various possibilities of such daring hacks performed on Axis Bank’s servers – funds can be transferred into another accounts, sensitive details related to customers can be accessed and compromised, and even ATM networks can be hacked.

Cyber Security Tips: Axis bank need to fix their security issue, also need to improve their cyber security, users need to change their passwords and use strong password, avoid to use Hitachi payment system.

  1. Breaking- Russian hackers responsible for LinkedIn data breach arrested by FBI

The alleged Russian hacker arrested by the FBI in collaboration with the Czech police is none other than the hacker who was allegedly responsible for massive 2012 data breach at LinkedIn, which affected nearly 117 Million user accounts. Latest statement released by LinkedIn suggests that the arrest was related to a 2012 data breach at the social network that exposed emails and hashed password of nearly 117 Million users. Hacking scenario yet not disclosed, investigation is going on.

Cyber Security Tips: To prevent from data breach avoid to use same password for different account, Use strong password for different account.

  1. UK’s Financial Hub London Under Massive Ransomware Attacks

According to Malwarebytes, cyber-security firm, has identified that people working in London city are continuously being targeted by a new kind of attack, which takes the files stored on the computer as a hostage and one has to pay ransom for getting the data back. The attackers then communicate with the victim to receive cash in exchange of the data. The ransom is usually asked to be paid in bitcoins and the files are kept encrypted so that the victim is unable to access them without paying the ransom. Once the ransom has been paid, the attacker sends the user decryption key to unlock the data.

Cyber Security Tips: To prevent from ransomware attack keep updated antivirus in your system, regularly backup your data, Avoid to visit malicious sites, keep your data protected.

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Create a free website or blog at

Up ↑

%d bloggers like this: