Instagram, the social media platform owned by Meta, has announced plans to discontinue its end-to-end encrypted direct messaging feature, marking a notable shift in how private conversations will be handled on the platform. The change is expected to take effect in May 2026, after which encrypted chat functionality within Instagram’s messaging system will no longer be supported. End-to-end encryption (E2EE) is a security technology designed to ensure that only the sender and the recipient of a message can read its contents. In such systems, messages are encrypted on the sender’s device and can only be decrypted on the recipient’s device,…

Read More

Income Tax Department officials uncovered a major case of suspected tax evasion during a raid at Mango Masala Restaurant in Ajmer, Rajasthan, where investigators say the business concealed nearly ₹15 crore in turnover by keeping part of its sales outside official financial records. The operation was conducted by the Investigation Wing of the Income Tax Department, which carried out a detailed search of the restaurant’s financial documents, billing systems and digital records. During the inspection, authorities found indications that the restaurant’s declared income did not match the actual volume of transactions being generated through its billing system. According to officials…

Read More

India’s market regulator, Securities and Exchange Board of India (SEBI), has imposed a monetary penalty of ₹10 lakh on Anand Rathi Share and Stock Brokers Ltd. after identifying cybersecurity-related compliance deficiencies during an inspection of the brokerage firm. The regulatory action follows a review conducted by SEBI to assess whether the company was complying with the cybersecurity and cyber resilience framework that applies to market intermediaries operating in India’s securities market. These rules require brokers and financial institutions to maintain strong IT security controls, monitor their systems for potential threats, and ensure proper reporting of cybersecurity incidents. During the inspection…

Read More

Reports of cyber fraud related to LPG cylinder bookings have increased across several parts of India, prompting warnings from cybercrime units and consumer protection authorities. Investigators say fraudsters are taking advantage of delivery delays, rising demand, and public concern about gas availability to trick consumers into making payments through fake booking links and fraudulent websites. Cooking gas is an essential household service in India, and millions of consumers depend on timely LPG cylinder deliveries for daily use. Over the past few weeks, many consumers have reported delays in gas delivery due to factors such as high seasonal demand, logistical issues…

Read More

The Viral Illusion of “Instant Hacking” Across Instagram Reels, YouTube Shorts, TikTok, and similar platforms, short videos claiming to reveal “secret hacking tricks” have become extremely common. These videos often promise dramatic outcomes. Some claim that anyone can access an Instagram account in seconds. Others claim it is possible to read someone’s WhatsApp messages secretly, bypass Snapchat passwords, or gain control of a Facebook account without knowing the login credentials. For viewers with limited cybersecurity knowledge, these demonstrations can appear convincing. A short clip shows a few steps, a tool is opened, a username is entered, and suddenly an account…

Read More

Instagram experienced a significant service disruption on Wednesday morning, impacting users across multiple regions including India, the United States, and parts of Europe. Thousands of users reported being unable to send or receive direct messages, refresh their feeds, search accounts, or access certain sections of the app. The outage began around 8:45 AM IST, according to real-time monitoring platform Downdetector, which recorded a sharp surge in complaints within a short period. Most issues were linked to the mobile application, while a smaller number of users reported problems with the web version. Some timelines stopped updating, and previously sent messages temporarily…

Read More

The General Data Protection Regulation (GDPR) is the European Union’s primary law governing the collection, use, storage, and protection of personal data. Enforced since 25 May 2018, it sets strict legal obligations for organizations that handle personal information of individuals located in the EU. What makes GDPR unique is its global reach: companies do not need to be established in Europe to fall under its jurisdiction. Any organization anywhere in the world can be subject to GDPR if it processes personal data of people in the EU in connection with offering goods or services to them or monitoring their behavior.…

Read More

A major cyber fraud incident has been reported at Bhavnagar District Cooperative Bank in Gujarat, where approximately ₹7 crore was allegedly transferred through unauthorized digital transactions. The incident has raised concerns about cybersecurity practices in cooperative banking systems. According to preliminary information, suspicious digital transactions were noticed from multiple branches of the bank. Bank officials detected irregular activity in internal transaction records, after which an internal review was immediately initiated and authorities were informed. Initial findings suggest that the fraud involved mobile-based digital transactions, through which the attackers were able to move money from several branches. Investigators believe the attackers…

Read More

Cybersecurity is one of the fastest-growing fields in technology. Because of this popularity, many people associate cybersecurity only with “hacking.” Movies, social media reels, and online ads often show hackers typing quickly on green screens, instantly breaking into systems. This creates a big misunderstanding. Real cybersecurity is not about flashy screens or running random tools. It is about understanding systems, networks, vulnerabilities, and how attacks actually work. One of the most commonly mentioned platforms in this field is Kali Linux. But what exactly is it? And why do security professionals use it? Let’s understand the reality — without hype. What…

Read More

Phishing is a cyberattack in which criminals send fraudulent emails, messages, or links pretending to be from legitimate organizations. The goal is to trick victims into revealing sensitive information such as passwords, banking details, credit card numbers, or login credentials. Most phishing emails appear to come from trusted companies such as banks, delivery services, social media platforms, or online shopping websites. The message usually asks the recipient to click a link, verify an account, or download an attachment. Once the victim interacts with the email, attackers can steal their information or infect their device with malware. Why Phishing Attacks Are…

Read More