Tag Archives: #SecurityAlert

Explosion in Delhi on November 28, 2024

Delhi blast

New Delhi, November 28, 2024 — A powerful blast rocked the capital city of India today, sending shockwaves through a busy area in central Delhi. Preliminary reports indicate that the explosion occurred around 11:30 AM in the Prashant Vihar area.

Emergency services have been swiftly deployed to the scene as authorities rush to assess the damage and assist victims.

The area has been cordoned off, and nearby businesses and buildings have been evacuated for safety.

So far, reports indicate that a few people have been injured. Rescue operations are ongoing, and nearby hospitals have been put on alert to handle any surprises. Eyewitnesses described hearing a loud explosion, followed by a thick cloud of smoke, as people rushed to safety. Later reported that a scooter blasted with a white powder spilled over the site.

The Delhi Police and National Investigation Agency (NIA) have initiated an investigation into the blast, with security heightened across the city. Officials are working to determine the motives/ cause behind the blast.

Residents are advised to stay clear of the affected areas while authorities continue their investigation. Updates on the situation will be provided as more information becomes available.

Alarming for Samsung Mobile Phone Users, Issues High-Risk Alert. A Must Read.

Samsung Mobile: This week, the Indian government issued additional security warnings specifically aimed at users of Samsung Galaxy phones. The security advisory, released by the Indian Computer Emergency Response Team (CERT-In), underscores various vulnerabilities impacting millions of Samsung Galaxy phones, encompassing both older and newer models.

Released on December 13, the security alert classifies the issue as high-risk, emphasizing the immediate need for current Samsung users to promptly update their phone’s operating system or firmware.

As outlined in CERT’s vulnerability note, “Multiple vulnerabilities have been reported in Samsung products that could enable an attacker to circumvent implemented security restrictions, gain access to sensitive information, and execute arbitrary code on the targeted system.”

The report specifies that the vulnerable software includes Samsung mobile Android versions 11, 12, 13, and 14.

What worst can happen: Samsung mobile?


These vulnerabilities expose the device’s security weaknesses. If a cyber attacker exploits these issues, they could:

  1. Steal the phone’s secret code (SIM PIN).
  2. Commandeer the phone with elevated privileges.
  3. Access private AR Emoji files.
  4. Manipulate the clock on the Knox Guard lock (castle gate).
  5. Probe the phone’s files, accessing arbitrary files.
  6. Extract sensitive information.
  7. Control the phone like a puppet, executing arbitrary code.
  8. Take complete control of the phone, compromising the targeted system.

Guidelines for Samsung smartphone users

Owners of Samsung mobile phones are strongly advised to promptly update their device’s operating system (OS) and firmware, as suggested by the reports. Failure to do so may render Samsung models vulnerable to potential threats from hackers. Neglecting system updates could provide hackers with an opportunity to bypass device security and gain unauthorized access to sensitive data. Samsung has released a solution for these vulnerabilities, and users are encouraged to install it promptly.


“Shield Your Smartphone: Defend Against Hacks and Breaches with These Clever Strategies!”

  1. Use Strong Passwords or Biometrics: Set a strong password, PIN, or use biometric authentication (like fingerprint or face recognition) to secure access to your phone.
  2. Keep Software Updated: Regularly update your phone’s operating system and applications to patch security vulnerabilities and benefit from the latest security features.
  3. Install Security Apps: Consider using reputable antivirus and security apps that can help protect your phone from malware, phishing, and other online threats.
  4. Be Cautious with App Downloads: Only download apps from official app stores, such as Google Play or the Apple App Store. Avoid downloading apps from third-party sources, as they may contain malicious software.
  5. Review App Permissions: Check and manage the permissions granted to each app. Disable unnecessary permissions to limit the information apps can access on your phone.
  6. Use a Virtual Private Network (VPN): When connecting to public Wi-Fi networks, use a VPN to encrypt your internet connection and protect your data from potential eavesdropping.
  7. Enable Two-Factor Authentication (2FA): Enable 2FA whenever possible to add an extra layer of security. This typically involves receiving a code on another device or through SMS in addition to entering your password.
  8. Regularly Back Up Your Data: Back up your phone regularly to ensure that you can recover your data in case of a security incident or device loss.
  9. Avoid Clicking on Suspicious Links: Be cautious about clicking on links in emails, text messages, or on websites, especially if they seem suspicious. Phishing attacks often use deceptive links to compromise devices.
  10. Review and Monitor Accounts: Regularly review your accounts for any suspicious activity. If you notice anything unusual, take immediate action to secure your accounts.
  11. Use Secure Wi-Fi Networks: Avoid connecting to open or unsecured Wi-Fi networks. When possible, use a password-protected and encrypted Wi-Fi connection.
  12. Implement Remote Tracking and Wiping: Enable remote tracking and wiping features on your phone. In case your phone is lost or stolen, you can track its location and remotely erase your data.

By following these practices, you can enhance the security of your phone and reduce the risk of hacks and compromises.


Important tips to manage your smartphone

Parliament Attack Anniversary Unleashes Pandemonium: Breach Ignites Fury with Smoke Canisters.

Two culprits were seized for breaching the Lok Sabha chamber on Wednesday amid the Winter Session of Parliament. Concurrently, two protestors were detained outside for orchestrating a demonstration embellished with vividly colored smoke. Here’s the evolving situation.

New Delhi-Parliament Attack

A significant breach in Lok Sabha security occurred on Wednesday afternoon, coinciding with the 22nd anniversary of the notorious Parliament terror attack in 2001. This attack claimed nine lives, including eight security personnel, causing shockwaves in India as it struck at the core of democracy.

The 2001 Parliament terror attack, orchestrated by the banned Pakistan-based terror groups Lashkar-e-Taiba and Jaish-e-Mohammed, led to the elimination of five terrorists. Ahead of the recent incident, Prime Minister Narendra Modi and Lok Sabha Speaker Om Birla paid tribute to the fallen. The Prime Minister emphasized, “Their courage and sacrifice in the face of danger will forever be etched in our memory,” while President Droupadi Murmur noted, “On this day 22 years ago, the nefarious plan of terrorists to eliminate the top line of political leadership and damage our Temple of Democracy was foiled.”

Exactly 22 years after the tragic attack on December 13, 2001, that claimed nine lives, a breach in security occurred within Parliament on Wednesday.

At approximately 11:40 am on that fateful day, five terrorists drove into the old Parliament House Complex in an Ambassador car, equipped with a red light and displaying a fake Home Ministry sticker on the windshield.

The individuals were armed with AK-47 rifles, grenade launchers, pistols, and grenades. Although both the Rajya Sabha and Lok Sabha had adjourned 40 minutes before the incident, numerous MPs and ministers, including then Home Minister L K Advani and Minister of State for Defense Harin Pathak, remained inside. Over 100 other MPs were also present, and miraculously, they all emerged unharmed.

Addressing the Lok Sabha afterward, Advani declared, “It is now evident that the terrorist assault on the Parliament House was executed jointly by Pakistan-based and supported terrorist outfits, namely, the Lashkar-e-Toiba (LeT) and Jaish-e-Mohammad (JeM).”