CyberPeace Foundation

GREEN COMPUTING: WHAT IS THE SIGNIFICANCE IN 21st CENTURY?

GREEN COMPUTING: WHAT IS THE SIGNIFICANCE IN 21st CENTURY?

Green Computing: An Overview The Application of ‘Green Computing’ refers to the adoption of a sustainable business landscape in designing, manufacture, use and disposal of various resources related to Information Technology (IT). Green computing is essentially an environmentally friendly use of IT technology to lessen the burden on the planet. Practice’s promoting green computing include …

Minister opens e-Nari digital literacy event

Minister opens e-Nari digital literacy event

GUNTUR: Home Minister Mekathoti Sucharita and Andhra Pradesh Women Commission chairperson Vasireddy Padma inaugurated e-Nari digital literacy and online safety awareness programme at Mangalagiri on Thursday. Speaking on the occasion, the minister said that the commission in coordination with CyberPeace Foundation is conducting a month-long online awareness programme on cyber safety for women. It is open …

CyberPeace Foundation Report: Online Gaming World – Trust and Safety

CyberPeace Foundation Report: Online Gaming World – Trust and Safety

New Delhi [India], August 19 (ANI/NewsVoir): Today online gaming continues to have become a sky-rocketing business market. It is by no means a small industry. Perhaps, by the last quarter of 2021 approximately about 2.7 billion people globally is believed to be engaged into the segment of playing online games. This is accounting almost one-third …

Prioritize security – 2122 Password game

Prioritize security – 2122 Password game

There is a security epidemic! Why? Because of a lack of encryption. Plaintext passwords are not only highly vulnerable to password hacks, but they also open the door for other cybercrimes such as data breaches. Studies have shown that most people tend to use passwords that are simple and easily guessable. Unfortunately, this increases the …

Prometheus Ransomware

Prometheus Ransomware

Ransomware attacks are on a global increase. It is a particularly nasty computer malware that encrypts your important files and renders them inaccessible unless you pay a ransom to the hacker for the key to decrypt the files. It attacks the master boot record and blocks victims from accessing their operating system. The malware typically …

Future of Crypto and Cyber Casinos

Future of Crypto and Cyber Casinos

Technology is on the cusp of revolutionizing some of the most fundamental parts of everyday life. After all, the world began with barter and then proceeded to cash and checks before we got to this exciting concept known as cryptocurrency. And it seems that almost every week we hear about a new digital currency hitting …

Twitter War over New I.T Rules Compliance

Twitter War over New I.T Rules Compliance

With a growing global presence, social media platforms are under immense pressure to comply with local laws. Failure to do so could attract liabilities from lawsuits, fines and even imprisonment of companies or individuals associated with the platform in the respective country. The recent flip-flop about granting intermediary status to Twitter by the Indian government …

8 photos that show how new SBI OTP scam works

8 photos that show how new SBI OTP scam works

If you are a customer of State Bank of India then there is a new KYC scam that you need to know about. In the disguise of KYC verification, scammers are trying to collect your online banking information by sending a fake SMS with the link to a malicious website that looks exactly like the …

The Joker Malware

The Joker Malware

Android was notoriously famous for potentially being open to various malwares and viruses due to its inherent nature of being open source and allowing to install applications from external sources i.e. which are often not verified by the google play store. However, on certain instances the malwares have been known to creep in through various …