<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/">

<channel>
	<title>hackers | Business Upturn</title>
	<atom:link href="https://www.businessupturn.com/news/topic/hackers/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.businessupturn.com</link>
	<description>India&#039;s leading business and financial news portal — markets, economy, stocks and corporate news.</description>
	<lastBuildDate>Sun, 25 Feb 2024 03:35:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.businessupturn.com/wp-content/uploads/2023/07/favicon-150x150.jpg</url>
	<title>hackers | Business Upturn</title>
	<link>https://www.businessupturn.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Wireless chargers exposed to cyberattacks, raising concerns about device damage and fires</title>
		<link>https://www.businessupturn.com/technology/cyber-security/wireless-chargers-exposed-to-cyberattacks-raising-concerns-about-device-damage-and-fires/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Sun, 25 Feb 2024 03:35:15 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Data breaches]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[smartphones]]></category>
		<category><![CDATA[Tech]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=403150</guid>

					<description><![CDATA[A new cyberattack, &quot;VoltSchemer,&quot; exploits flaws in wireless chargers, potentially causing fires, device damage, and voice assistant manipulation.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:397&quot;&gt;A recent study published by researchers from Florida University and cybersecurity firm CertiK has sent shockwaves through the tech world, revealing a novel cyberattack method targeting wireless chargers. This “VoltSchemer” attack, as it’s been dubbed, exploits vulnerabilities in these seemingly innocuous devices, posing a significant risk to smartphones and potentially other nearby electronics.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:586&quot;&gt;The research delves into the intricate workings of wireless chargers, uncovering security weaknesses that hackers could leverage to wreak havoc. By manipulating the charger’s input voltage, attackers can trigger a series of alarming consequences. In the worst-case scenario, this manipulation can lead to overheating and potential fires within smartphones placed on the charging pad. Additionally, the attack can damage nearby devices due to excessive electromagnetic interference or even trigger unauthorized voice commands through voice assistants integrated into the targeted device.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:357&quot;&gt;The study’s findings are particularly concerning as they highlight the vulnerability of popular brands like Anker and Phillips, and even major smartphone manufacturers like Apple and Google. This widespread susceptibility underscores the potential scale of the threat, raising significant concerns for users who rely heavily on wireless charging technology.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:296&quot;&gt;The researchers emphasize the gravity of this discovery, describing the attack as scary and akin to black magic due to its ability to manipulate electromagnetic frequencies and inject inaudible voice commands. This emphasizes the sophistication and potential harm associated with VoltSchemer.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:439&quot;&gt;The researchers recommend staying informed about the latest developments regarding the attack and familiarizing oneself with the detailed findings outlined in their paper. Additionally, exploring alternative charging methods or implementing security measures specific to wireless chargers may offer some level of protection.&lt;/p&gt;
&lt;p data-sourcepos=&quot;13:1-13:362&quot;&gt;In conclusion, the discovery of the VoltSchemer attack serves as a stark reminder of the ever-evolving cybersecurity landscape. As wireless charging technology becomes increasingly integrated into our daily lives, it’s crucial to acknowledge the potential risks associated with it and take necessary precautions to safeguard our devices and personal information.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Wireless-chargers-exposed-to-cyberattacks-raising-concerns-about-device-damage-and-fires.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Wireless chargers exposed to cyberattacks, raising concerns about device damage and fires]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Wireless-chargers-exposed-to-cyberattacks-raising-concerns-about-device-damage-and-fires.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Hackers exploit generative AI, raising concerns about malicious use</title>
		<link>https://www.businessupturn.com/technology/cyber-security/hackers-exploit-generative-ai-raising-concerns-about-malicious-use/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Thu, 15 Feb 2024 15:40:36 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[generative AI]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=398691</guid>

					<description><![CDATA[Hackers from China, North Korea, Iran, and Russia misuse AI for intelligence gathering, phishing, and code development. Microsoft bans state-backed hackers from its AI products, urging responsible AI development.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;A recent report by Microsoft has shed light on a concerning trend: state-backed hackers from China, North Korea, Iran, and Russia are leveraging generative artificial intelligence (AI) tools for malicious purposes. This development underscores the potential dangers of AI misuse and the need for responsible development and deployment of this powerful technology.&lt;/p&gt;
&lt;p&gt;The report, based on Microsoft’s tracking of hacking groups affiliated with various governments, details how these actors have been utilizing OpenAI’s large language models (LLMs) for various activities. Chinese hackers, for instance, employed LLMs to gather intelligence on rival intelligence agencies, prominent individuals, and cybersecurity matters. They even used the technology to develop potentially malicious code and translate technical documents, suggesting an intent to weaponize AI capabilities.&lt;/p&gt;
&lt;p&gt;Meanwhile, Russian hackers focused on researching satellite and radar technologies relevant to their operations in Ukraine, while North Korean groups used LLMs to generate content for targeted phishing campaigns aimed at regional experts. Iranian hackers, known for their sophisticated cyber operations, leveraged the technology to craft more convincing phishing emails and even develop code for evading detection, highlighting their efforts to refine their tactics.&lt;/p&gt;
&lt;p&gt;These findings come amidst growing concerns about the potential misuse of AI by malicious actors. While AI offers immense benefits across various sectors, its power can be easily turned destructive if exploited. The ability to manipulate information, automate tasks, and even generate code for malicious purposes poses a significant threat to national security, personal privacy, and the overall stability of the digital landscape.&lt;/p&gt;
&lt;p&gt;Microsoft’s response to this alarming trend has been decisive. The tech giant has implemented a blanket ban on state-backed hacking groups using its AI products, including the popular ChatGPT language model. However, the issue of AI misuse extends beyond individual companies. As LLMs continue to evolve and become more sophisticated, the possibility of their exploitation by malicious actors cannot be ignored. In conclusion, the use of LLMs by state-backed hackers highlights the critical need for responsible AI development and deployment.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Hackers-exploit-generative-AI-raising-concerns-about-malicious-use.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Hackers exploit generative AI, raising concerns about malicious use]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Hackers-exploit-generative-AI-raising-concerns-about-malicious-use.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Zomato increases bug bounty, to pay $4,000 for detection of a critical vulnerability</title>
		<link>https://www.businessupturn.com/technology/cyber-security/zomato-increases-bug-bounty-to-pay-4000-for-detection-of-a-critical-vulnerability/</link>
		
		<dc:creator><![CDATA[Bhomik Mathur]]></dc:creator>
		<pubDate>Fri, 09 Jul 2021 13:46:10 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Zomato]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=123630</guid>

					<description><![CDATA[The severity of the bug detected would be determined by the Zomato security team on the basis of the Common Vulnerability Scoring System(CVSS) score]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Food delivery company Zomato on Thursday announced an increase in bounties paid to those who can find bugs on its mobile and web platform. Anyone who finds a bug of a critical severity can get a maximum bounty of $4000(around INR 2.98 lakh).&lt;/p&gt;
&lt;p&gt;Zomato has set four tiers of bounty ranges to be awarded depending upon the severity of the vulnerability which gets exposed. Detection of a low severity threat would entitle a person to an amount in the range of $100 to $300. Meanwhile, those who find bugs of the medium and high category would be awarded in the ranges of $300-$1000 and $1,000 to $2,000 respectively. The maximum bounty range of $2000 to $4000 will be awarded for the detection of a bug of critical severity.&lt;/p&gt;
&lt;p&gt;“The Zomato Bug Bounty Program is a crucial part of our security efforts and we hope that this improvement will further motivate the hacker community. Thank you for your contribution to our program so far and we look forward to your reports!” it said in a statement on hackerone.com.&lt;/p&gt;
&lt;p&gt;The severity of the bug detected would be determined by the Zomato security team on the basis of the Common Vulnerability Scoring System(CVSS) score which would determine the amount of bounty to be granted. A bug of a critical severity with a CVSS score of 10.0 will be rewarded with $4000 while a score of 9.5 in the same category will entitle the person to $3,000. Two-factor authentication is mandatory for any user who wishes to participate in the bug bounty programme.&lt;/p&gt;
&lt;p&gt;The information was also tweeted by Yash Sodha, a security engineer at Zomato.&lt;/p&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-width=&quot;550&quot; data-dnt=&quot;true&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;Starting today, we’re increasing the rewards for &lt;a href=&quot;https://twitter.com/zomato?ref_src=twsrc%5Etfw&quot;&gt;@zomato&lt;/a&gt;&apos;s bug bounty program: $4,000 for critical, $2000 for high, and so on. We welcome your participation and look forward to your reports! Happy Hacking 🙂 Find more details here: &lt;a href=&quot;https://t.co/OSvNH1q6Mm&quot;&gt;https://t.co/OSvNH1q6Mm&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Yash Sodha (@y_sodha) &lt;a href=&quot;https://twitter.com/y_sodha/status/1413081817549209605?ref_src=twsrc%5Etfw&quot;&gt;July 8, 2021&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;script async src=&quot;https://platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;&lt;/p&gt;
&lt;p&gt;Meanwhile, &lt;a href=&quot;https://www.businessupturn.com/money/market/zomatos-ipo-worth-rs-9375-crore-to-be-open-from-july-14-complete-details-here/&quot;&gt;Zomato’s much-awaited IPO worth Rs 9,375 crore&lt;/a&gt; will hit Dalal Street on July 14 at a price band of Rs 72-Rs 76.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2021/07/Untitled-design-74-1.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Zomato increases bug bounty, to pay $4,000 for detection of a critical vulnerability]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2021/07/Untitled-design-74-1.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Elon Musk tweets Hannah Montana meme for hackers, Check out</title>
		<link>https://www.businessupturn.com/world/elon-musk-tweets-hannah-montana-meme-for-hackers-check-out/</link>
		
		<dc:creator><![CDATA[Govindraj Muttepawar]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 11:43:51 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[SpaceX]]></category>
		<category><![CDATA[Tesla]]></category>
		<category><![CDATA[tesla inc]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=113537</guid>

					<description><![CDATA[Tesla CEO Elon Musk, known for his love for memes, has a hilarious one as a response to a video...]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Tesla CEO Elon Musk, known for his love for memes, has a hilarious one as a response to a video targeting him by hacker group ‘Anonymous’. This time, his chosen weapon is fictional pop singer Hannah Montana.&lt;/p&gt;
&lt;p&gt;Sharing a screenshot of the hacker group’s video, whose subtitle was altered to say, “Hannah Montana is actually Miley Cyrus”, the billionaire’s tweet just read “!!”&lt;/p&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-width=&quot;550&quot; data-dnt=&quot;true&quot;&gt;
&lt;p lang=&quot;zxx&quot; dir=&quot;ltr&quot;&gt;!! &lt;a href=&quot;https://t.co/3H9gMEmSLF&quot;&gt;pic.twitter.com/3H9gMEmSLF&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Elon Musk (@elonmusk) &lt;a href=&quot;https://twitter.com/elonmusk/status/1404303796075859974?ref_src=twsrc%5Etfw&quot;&gt;June 14, 2021&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;script async src=&quot;https://platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;&lt;/p&gt;
&lt;p&gt;The meme mocks Anonymous’ video about Mr Musk’s ability to move cryptocurrency markets — as it is public knowledge — just like everyone knows Hannah Montana, a teen singer in a hugely popular sitcom of the same name, was played by musician-actor Miley Cyrus. Ms Cyrus was quick to reply to the billionaire.&lt;/p&gt;
&lt;p&gt;“I told you that in confidence! You can build a rocket but can’t keep a damn secret?!?!,” she tweeted. Mr Musk, 49, had earlier mocked the video threat as well – again with a meme. Last week, the international hacking collective ‘Anonymous’ saying they are planning to target the SpaceX CEO for influencing the cryptocurrency market far too often through just his tweets.&lt;/p&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-width=&quot;550&quot; data-dnt=&quot;true&quot;&gt;
&lt;p lang=&quot;qme&quot; dir=&quot;ltr&quot;&gt; &lt;a href=&quot;https://t.co/mGmRXu0gKy&quot;&gt;pic.twitter.com/mGmRXu0gKy&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Elon Musk (@elonmusk) &lt;a href=&quot;https://twitter.com/elonmusk/status/1402821269242793985?ref_src=twsrc%5Etfw&quot;&gt;June 10, 2021&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;script async src=&quot;https://platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;&lt;/p&gt;
&lt;p&gt;Two ‘Anonymous’ Twitter handles were prompt to distance themselves from the video that racked up millions of views in days. However, the third handle with 5.9 million followers, then shared the video. “It appears that your quest to save the world is more rooted in a superiority &amp; saviour complex than it is in actual concern for humanity,” the group captioned the video and added “cc: Elon Musk”. In the video message, ‘Anonymous’ appeared extremely miffed with Mr Musk due to the power he wields over the cryptocurrency market.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2021/06/Untitled-design-73.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[elon musk]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2021/06/Untitled-design-73.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Hackers’ group claims to have breached Airtel server; leaked personnel data</title>
		<link>https://www.businessupturn.com/technology/cyber-security/hackers-group-claims-to-have-breached-airtel-server-leaked-personnel-data/</link>
		
		<dc:creator><![CDATA[Arnav Dogra]]></dc:creator>
		<pubDate>Sat, 06 Feb 2021 08:20:47 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Nation]]></category>
		<category><![CDATA[Airtel]]></category>
		<category><![CDATA[Army]]></category>
		<category><![CDATA[Bharti Airtel]]></category>
		<category><![CDATA[Bharti Airtel Ltd]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Indian army]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=92019</guid>

					<description><![CDATA[A hackers’ group that goes by the name ‘Red Rabbit Team’ today claimed to have breached some official Indian websites...]]></description>
										<content:encoded><![CDATA[&lt;p&gt;A hackers’ group that goes by the name ‘Red Rabbit Team’ today claimed to have breached some official Indian websites posted the supposedly private data on Twitter. The group is said to have done this using a Bharti Airtel network in Jammu and Kashmir, although the company has denied any breach.&lt;/p&gt;
&lt;p&gt;The hackers posted some links which direct the pursuer to the web pages containing the leaked data pages on Twitter. Both the Army and Bharti Airtel, when contacted, denied this cyber infiltration.&lt;/p&gt;
&lt;p&gt;A Bharti Airtel spokesperson said that the group has been making false claims for a while and that the threat isn’t serious – “We can confirm there is no hack or breach of any Airtel system as claimed by this group. Multiple stakeholders outside of Airtel have access to some data as per regulatory requirements. We have apprised all the relevant authorities of the matter to, therefore, investigate this and take appropriate action.”&lt;/p&gt;
&lt;p&gt;“This group has been in touch with our security team for over 15 months now and has made varying claims in addition to posting inaccurate data from one specific region,” he added.&lt;/p&gt;
&lt;p&gt;Red Rabbit Team also messaged the PTI and claimed that it had access to complete data of Bharti Airtel which it had obtained through a shell uploaded on the company’s server and threatened to leak more information soon.&lt;/p&gt;
&lt;p&gt;Indian Army officials also confirmed this saying, “We are not aware of any such information but it appears to be malicious intent of some inimical elements.”&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2020/05/bharti-airtel-1.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Hackers’ group claims to have breached Airtel server; leaked personnel data]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2020/05/bharti-airtel-1.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Instagram’s new feature ‘Recently Deleted’ to prevent hackers from permanently deleting content</title>
		<link>https://www.businessupturn.com/technology/social-media/instagrams-new-feature-recently-deleted-to-prevent-hackers-from-permanently-deleting-content/</link>
		
		<dc:creator><![CDATA[Sanah Shah]]></dc:creator>
		<pubDate>Wed, 03 Feb 2021 07:54:30 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Instagram]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=90892</guid>

					<description><![CDATA[Instagram is introducing a new feature that allows users to restore deleted content on the app. “We’re rolling out Recently...]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Instagram is introducing a new feature that allows users to restore deleted content on the app.&lt;/p&gt;
&lt;p&gt;“We’re rolling out Recently Deleted, a feature to help you manage your content. We know this is something people have been asking for and now, for the first time, you can review and restore deleted content in the Instagram app,” Instagram said in a blog post.&lt;/p&gt;
&lt;p&gt;The company added, “We also added protection to help prevent hackers from compromising your account and deleting posts you’ve shared.”&lt;/p&gt;
&lt;p&gt;Hackers often delete user content on the app when they gain access to an account with users having no way of easily getting their photos and videos back. The Facebook-owned platform said that this feature will help prevent hackers from erasing content.&lt;/p&gt;
&lt;p&gt;The photo-sharing app will now ask users to confirm that they are the original account holders when permanently deleting or restoring content from Recently Deleted.&lt;/p&gt;
&lt;p&gt;Instagram is also testing a new feature where that will limit users from sharing posts to stories. Due to “Sharing to Stories” update users won’t be able to share feed posts on Stories that many upcoming creators do to expand their reachability as Instagram’s algorithm is lenient towards friends and family. It should be noted that Instagram is only testing this feature, and it is likely that the company may not enforce the update.&lt;/p&gt;
&lt;p&gt;In addition to this, the platform may soon allow users to hide Like-counts on their personal feeds, according to a social media expert who pointed out the development in a tweet.&lt;/p&gt;
&lt;p&gt;A ‘Recently Deleted’ folder will be created where content ranging from photos, videos, reels, IGTV videos to stories that a user chooses to delete will be stored. The ‘Recently Deleted’ folder can be accessed from the Account option within Settings – following the procedure of Settings &gt; Account &gt; Recently Deleted on the latest version of the Instagram app.&lt;/p&gt;
&lt;p&gt;Deleted stories that are reserved in a user’s archive will stay in the folder for up to 24 hours. All other content will be automatically deleted from the folder after 30 days.&lt;/p&gt;
&lt;p&gt;“During those 30 days, you can access your deleted content by going to on the latest version of the Instagram app. From there you can either restore or permanently delete it,” Instagram said.&lt;/p&gt;
&lt;p&gt;The update is rolling out in stages. Only a restricted number of users will be receiving it today.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2021/02/Instagram-recently-deleted.jpg" medium="image" width="1200" height="625"><media:title type="html"><![CDATA[Instagram’s new feature ‘Recently Deleted’ to prevent hackers from permanently deleting content]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2021/02/Instagram-recently-deleted.jpg" width="1200" height="625" />
	</item>
		<item>
		<title>Top 5 Indian Hackers ensuring cyber security</title>
		<link>https://www.businessupturn.com/people/top-5-indian-hackers-ensuring-cyber-security/</link>
		
		<dc:creator><![CDATA[Sanket Kate]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 15:42:03 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Features]]></category>
		<category><![CDATA[People]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=40602</guid>

					<description><![CDATA[Hacking is always linked with something illegal with a breach of privacy. But ethical hacker or white hat hackers direct...]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Hacking is always linked with something illegal with a breach of privacy. But ethical hacker or white hat hackers direct their skills for some good cause like finding security bugs. It requires expertise, concentration and indeed the most brilliant of minds to breach into systems silently overruling all their top-notch salient manifestations. Hacking is supposed to be the toughest and coolest task among those who understands technology. The best hackers indeed are the ones who build up this acumen to breach security again and again, so that they can guard the interest of millions of users to which these cyber systems cater.&lt;/p&gt;
&lt;p&gt;Here are some of such top 5 hackers in India  who are sought after by people even around the world.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1. Vivek Ramachandran&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img fetchpriority=&quot;high&quot; decoding=&quot;async&quot; class=&quot;alignnone size-full wp-image-40604&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/a-5.jpg&quot; alt=&quot;&quot; width=&quot;190&quot; height=&quot;265&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Vivek Ramachandran has already made a name for himself. He has won accolades and awards for his work from both Cisco and Microsoft. Vivek specializes in several systems including e-governance, embedded systems security, computer forensics, and wireless security.&lt;br /&gt;
One of the 2006 winners of the Microsoft Security Shootout Contest, Ramachandran is the founder of SecurityTube.net, a free video-based computer security educational portal. Cisco Systems also awarded Vivek the Team Achievement Award for his contribution to the Port security modules in a certain model.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2. Ankit Fadia&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-40606&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/b-7-300x227.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;227&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/b-7-300x227.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/b-7.jpg 529w&quot; sizes=&quot;(max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Ankit Fadia is an Indian author, speaker, television host, and self-proclaimed “BLACK HAT hacker” of computer systems, whose skills and ethics have been debated. His work mostly involves OS and networking-based tips and tricks, proxy websites, and making people think that he is a hacker. Ankit Fadia’s range of skills that grant him easy access to the critical domains of computers and the like have very often been debated and scrutinised.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3. Rahul Tyagi&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img decoding=&quot;async&quot; class=&quot;alignnone size-full wp-image-40607&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/c-7.jpg&quot; alt=&quot;&quot; width=&quot;204&quot; height=&quot;204&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/c-7.jpg 204w, https://www.businessupturn.com/wp-content/uploads/2020/08/c-7-150x150.jpg 150w&quot; sizes=&quot;(max-width: 204px) 100vw, 204px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Rahul Tyagi is a talented hacker who has proved himself several times by entering and breaking into secure computer systems. You will also want to know that he is an actor and also an author. He had provided more than several hundred training sessions on hacking. He completed his education from LPU, Punjab. An expert in cyber security training, Tyagi is one of the leading ethical hacking trainers of the country with a decade of expertise backing him up. His hacking forte has led him to emerge as a skilled dealer of vulnerabilities on websites that are reputed and harbour immense confidentiality.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;4. Trishneet Arora&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-40608&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/d-5-300x225.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;225&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/d-5-300x225.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/d-5-900x675.jpg 900w, https://www.businessupturn.com/wp-content/uploads/2020/08/d-5-768x576.jpg 768w, https://www.businessupturn.com/wp-content/uploads/2020/08/d-5.jpg 1200w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Arora is an entrepreneur who found a Cyber Security company that provides protection to corporations against data theft and network vulnerabilities. Few of his clients are Central Bureau of Investigation, Reliance Industries, Gujrat Police and Punjab Police. Arora has written books on cybersecurity, ethical hacking, and web defence. He was named in Forbes 30 Under 30 2018 Asia list and Fortune 40 Under 40 2019 List of India’s Brightest.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5. Sai Satish&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-40609&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/e-4-300x300.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;300&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/e-4-300x300.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/e-4-150x150.jpg 150w, https://www.businessupturn.com/wp-content/uploads/2020/08/e-4.jpg 400w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Sai Satish is an young entrepreneur, founder &amp; CEO of Indian Servers. Administrator of Andhrahackers (Top hacking awareness forum in INDIA). An Author, A renewed Ethical Hacker &amp; Cyber Security Expert, Microsoft Security Researcher, International Cyber Security trainer. Satish was rewarded by IAS Officer for pentesting on government sites, which gave him huge exposure and helped them to improve security, Forensics Investigator and safe transaction.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2020/08/hackers-1.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Top 5 Indian Hackers ensuring cyber security]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2020/08/hackers-1.jpg" width="1200" height="675" />
	</item>
	</channel>
</rss>
