Blogs

Indian Judiciary Embracing Technology for the Future

Indian Judiciary Embracing Technology for the Future

The Supreme court of India recently launched a tool named ‘SUPACE’, which is based on the concepts of machine learning and artificial intelligence. The present blog will take one through the highlights of this new tool and will throw some light on how the supreme court is going to use it and essentially pave a …

Cybercriminals using online gaming to target kids

Cybercriminals using online gaming to target kids

New Delhi: The increased use of online gaming has brought with it a slew of challenges and risks that include exposure of children to inappropriate content, cyberbullying, sexual exploitation, addiction, gambling and toxic peers, warned a new report on Thursday. The global gaming industry is expected to grow in the next few years, and the …

A guide against the menace of ‘blackmail through video calls’

A guide against the menace of ‘blackmail through video calls’

A group of scamsters have raised havoc, in Ranchi, by taking advantage of innocent people and extorting money from them by threatening to Leak certain videos and images which violate their bodily privacy. The present blog will explain how to understand the modus operandi of these scamsters and be aware of any such incidents so …

#incident_report: The Microsoft Exchange Hack

#incident_report: The Microsoft Exchange Hack

A blog post by the corporate vice president of Microsoft revealed that Microsoft’s popular email exchange software Microsoft Exchange, which is used by many private and governmental organizations and departments, has been affected by an alleged state-sponsored cyber attack from China. The present blog will take one through the whole incident and what exactly happened. …

Highlights of the New Information technology Rules 2021( for Digital Media)

Highlights of the New Information technology Rules 2021( for Digital Media)

Ministry of Electronics and Information Technology (MEITy) recently released a new set of rules for Intermediaries and Digital Content Providers by exercising their powers under sub-section (1), clauses (z) and (zg) of sub-section (2) of section 87 of the Information Technology Act, 2000 (21 of 2000). These new rules are named as Information Technology (Intermediary …

How do Whatsapp, Telegram and Signal Share Data with Third Parties?

How do Whatsapp, Telegram and Signal Share Data with Third Parties?

After a massive outrage from the general public and the platform’s users, against Whatsapp’s new updated policy, the popular messaging platform decided to delay their decision of implementation of new policies. A lot of this outrage was also caused due to some misconceptions which were appealing to a larger audience and bought in a greater ...

Contribute and Compete on a Global Scale: Your Global CyberPeace Challenge 2.0 Invitation

Think you have innovative cybersecurity skills and ideas to contribute on a global scale? You’re invited to throw your hat into the ring during the Global CyberPeace Challenge – a competition that encourages innovators from around the world to promote peace in cyberspace by solving crucial techno-social issues. Organized by the CyberPeace Foundation and supported by SANS, this virtual …

Security tips for your iPhone

The fundamental difference between an Apple and an Android Device, besides the hardware components, is Apple’s Proprietary iOS i.e. their mobile operating system, which is only available for Apple devices. Unlike Android, the source code of Apple’s mobile-based operating system is not available to the developers outside of apple to build separate User interfaces and ...

Rethinking Backdoors: Don’t Burn the House Down to Roast a Pig

Rethinking Backdoors: Don’t Burn the House Down to Roast a Pig

-By Akshata Singh & Nitish Chandan[1] At present, most discussions surrounding the elimination of objectionable content from end-to-end encrypted (E2EE) services approach it as a debate about breaking E2EE technology to allow enforcement agencies access to secure communications. In this post, Akshata Singh and Nitish Chandan of the CyberPeace Foundation argue that there are other ...