Posts

Showing posts from December, 2025

Enabling Next-Gen Growth with Agile Cyber-Resilient Ecosystems

Shibu Paul  is a visionary leader with more than 25 years of experience in spearheading digital transformation in IT, telecom, and information services. He has been instrumental in bringing about trailblazing IP networks, private ISPs, and certification bodies in India. Acclaimed for the creation of high-performance teams, strong operational models, and strategic international partnerships, he is adept at crafting novel, resilient, and scalable business ecosystems that yield consistent growth and lasting influence. In a recent interaction with  M R Yuvatha, Senior Corres pondent  at  siliconindia ,  Shibu Paul , shared his insights on  ‘Enabling Next-Gen Growth with Agile Cyber-Resilient Ecosystems’. In today’s rapidly changing industrial landscape,  AI platforms  and  technological advancements  are reshaping the way organizations operate. The pace of transformation across supply chains, technology, and cybersecurity is unprecedented....

Sturnus Trojan: How a New Android Threat Penetrates Secure Apps and Drains Bank Accounts

Android users have enjoyed the flexibility of their devices, but it can also be a double- edged sword. A new malware strain Sturnus, identified as android banking trojan by cybersecurity researchers has been flagged as one of the most severe mobile threats. Preliminary findings suggest it could rank among the most dangerous malware strains in recent years. Although still in its testing or early deployment stage, Sturnus has already shown a devastating ability to read communications from supposedly safe, encrypted apps, take over devices and steal banking passwords. How the Sturnus TrojanOperates? 1)  Disguised as Safe Apps:  Malicious APKs (Android installation files) that imitate well-known apps, like a fake “Google Chrome” or a utility software called “Preemix Box,” are used to spread Sturnus.  Users may unintentionally welcome the malware onto their phones if they sideload or install such apps outside of the legitimate app shops. 2)  Using Accessibility Services...