Headlines
  • At least five ballistic missile launches from Iran have been detected by the Israelis since midnight.
  • Mehrabad Airport in Tehran is hit by strikes
  • The Prince Sultan Air Base was the target of a ballistic missile that Saudi Arabia's military intercepted and destroyed, according to the country's defense ministry.
  • Heavy gunfire on Friday injured three peacekeepers from the United Nations Interim Force in Lebanon inside their base in southwest Lebanon.
  • To put an end to the bloodshed, UN Secretary-General António Guterres urged serious diplomatic negotiations..
  • In a social media post, President Trump said that "no deal" other than "unconditional surrender" will be with Iran.
  • Iran reportedly receives intelligence from Russia on US targets.

More Details

Cybercrime Alarmingly on the Rise in India

In its publication "Crime in India," the National Crime Records Bureau (NCRB) complies and publishes crime statistics. NCRB does not keep separate records on cybercrimes powered by artificial intelligence (AI).
In its publication "Crime in India," the National Crime Records Bureau (NCRB) complies and publishes crime statistics. NCRB does not keep separate records on cybercrimes powered by artificial intelligence (AI).

In its publication “Crime in India,” the National Crime Records Bureau (NCRB) complies and publishes crime statistics. NCRB does not keep separate records on cybercrimes powered by artificial intelligence (AI).

According to data from the Union Ministry of Home Affairs (MHA), the number of cybercrime incidents has increased by over 400 percent in the previous four years, and reporting trends have clearly shifted from major cities to smaller towns and villages.Telangana, Gujarat, Himachal Pradesh, Bihar, and Odisha have become new hotspots for cybercrime.

Thirteen people were arrested in six fraud cases, including part-time work and trading schemes, by the Cyberabad Cyber Crime division of Telengana. The victims of 37 cases received a total of Rs 53.47 lakh from the police, who also obtained refund orders in 132 cases.

The Gujarat government has chosen to create a dedicated Cyber Crime Unit, akin to the Gujarat ATS and State Monitoring Cell, in response to the state’s increasing cybercrime cases. The new section will be led by IG and DIG rank officials with the goal of reducing the threat of online fraud.In Gujarat, complaints of cybercrime have increased significantly in recent months.According to media reports,cyber criminals are using new strategies like “digital arrests,” online link frauds, and fake audio-video calls to extract money from the public.

Twelve instances of “digital arrest” frauds have been reported in Himachal Pradesh in 2024 and 2025 thus far, with citizens losing more than ₹5.91 crore to online digital artists impersonating law enforcement.Media reports say,in these scams, scammers pose as police officials, CBI agents, or court authorities, defrauding victims of ₹5,91,94,589, according to State Cyber Crime Police. With prompt action, the police were able to collect ₹33.05 lakh, but the remaining amount is still being investigated.

In 2022, 606 cybercrime instances were reported in Bihar, according to the CID. This figure rose to 1,257 in 2024, with 3,058 cases documented thus far in 2025.

Union Minister of State for Home Affairs Bandi Sanjay Kumar recently told the Rajya Sabha that cybercrime is rapidly and alarmingly on the rise in Odisha, with the number of reported crimes nearly doubling in just four years.According to the data, the number of cases increased from 6,053 in 2021 to nearly 53,000 in 2024. This year, the number exceeded 28,000 by the end of June, suggesting that the tendency is still increasing.

Related Article

Fileless Malware

A type of malicious software known as "fileless malware" infects a computer by using reliable apps. ...
March 6, 2026

Process Hollowing

Using the covert malware injection technique known as “process hollowing,” an attacker suspends ...
March 5, 2026

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) is a company policy or practice that permits workers to use their perso ...
March 4, 2026

Cyber Threat Hunting

The act of actively searching for hidden cyber threats in a computer network is known as "cyber thre ...
March 3, 2026

Hash-Based Message Authentication Code (HMAC)

A cryptographic hash function and a secret cryptographic key are used in the Hash-based Message Auth ...
March 2, 2026

Dictionary Attack: How to Avoid

A dictionary attack involves methodically inputting each word in a dictionary or word list as a pass ...
February 27, 2026

Other Article

Pick of the Day

UN Permanent Representative of Iran Briefs…

Amir Saeid Iravani, Permanent Representative of the Islamic Republic of Iran to the United Nations, ...
March 7, 2026
Bizzare News

Malaysian Man Holds Record for Having…

Malaysian Prathab Muniandy has ten more teeth than the typical human. This indicates that he has the ...
March 6, 2026
Pet Corner

Identify the Dog Breed

Identify dog and cat breeds using pictures.ideal match for you.Consider about these facts before pur ...
Prevent Cyber Crime

Fileless Malware

A type of malicious software known as "fileless malware" infects a computer by using reliable apps. ...
Pick of the Day

UN Security Council Meets on Energy,…

Chris Wright, Secretary of Energy of the United States and President of the United Nations Security ...
Bizzare News

Just Before it Collapses, New Jersey…

A horrifying collapse happened minutes after four Jersey Shore police officers were captured on came ...
March 5, 2026

Top