Blogs

GREEN COMPUTING: WHAT IS THE SIGNIFICANCE IN 21st CENTURY?

GREEN COMPUTING: WHAT IS THE SIGNIFICANCE IN 21st CENTURY?

Green Computing: An Overview The Application of ‘Green Computing’ refers to the adoption of a sustainable business landscape in designing, manufacture, use and disposal of various resources related to Information Technology (IT). Green computing is essentially an environmentally friendly use of IT technology to lessen the burden on the planet. Practice’s promoting green computing include …

Prioritize security – 2122 Password game

Prioritize security – 2122 Password game

There is a security epidemic! Why? Because of a lack of encryption. Plaintext passwords are not only highly vulnerable to password hacks, but they also open the door for other cybercrimes such as data breaches. Studies have shown that most people tend to use passwords that are simple and easily guessable. Unfortunately, this increases the …

Prometheus Ransomware

Prometheus Ransomware

Ransomware attacks are on a global increase. It is a particularly nasty computer malware that encrypts your important files and renders them inaccessible unless you pay a ransom to the hacker for the key to decrypt the files. It attacks the master boot record and blocks victims from accessing their operating system. The malware typically …

Future of Crypto and Cyber Casinos

Future of Crypto and Cyber Casinos

Technology is on the cusp of revolutionizing some of the most fundamental parts of everyday life. After all, the world began with barter and then proceeded to cash and checks before we got to this exciting concept known as cryptocurrency. And it seems that almost every week we hear about a new digital currency hitting …

Twitter War over New I.T Rules Compliance

Twitter War over New I.T Rules Compliance

With a growing global presence, social media platforms are under immense pressure to comply with local laws. Failure to do so could attract liabilities from lawsuits, fines and even imprisonment of companies or individuals associated with the platform in the respective country. The recent flip-flop about granting intermediary status to Twitter by the Indian government …

The Joker Malware

The Joker Malware

Android was notoriously famous for potentially being open to various malwares and viruses due to its inherent nature of being open source and allowing to install applications from external sources i.e. which are often not verified by the google play store. However, on certain instances the malwares have been known to creep in through various …

THE UNTOLD STORY OF ‘BOIS LOCKER ROOM’

THE UNTOLD STORY OF ‘BOIS LOCKER ROOM’

An analysis of controversy around the offences, under POCSO, IPC and IT Act, made out in ‘Bois Locker Room’ incident. Introduction ‘Bois Locker Room’, an Instagram group which shook everyone’s conscience to their cores, the group which held up a mirror to our faces and made us face the sad reality we live have built …

#incident_report : The Air India and SITA PSS Data Leak

#incident_report : The Air India and SITA PSS Data Leak

On March 19th 2021, Air India released a press report that their Passenger Service System, SITA PSS( a multinational information technology company providing IT and telecommunication services to the air transport industry), have fallen victim to a sophisticated cyber-attack. Further news reports also revealed that Air India wasn’t the only Passenger Airlines that was affected …

#Incident_Report: The Colonial Pipeline Incident

#Incident_Report: The Colonial Pipeline Incident

United States of America, one of the pioneers of Innovation and drivers of the industry of Cyber Security, recently fell into the hole of helplessness due to a Cyber Attack on one of the nation’s largest Gas Pipeline operators, Colonial Pipeline. According to several news reports operations of Colonial Pipelines were halted due to a …