Blogs

Rethinking Backdoors: Don’t Burn the House Down to Roast a Pig

Rethinking Backdoors: Don’t Burn the House Down to Roast a Pig

-By Akshata Singh & Nitish Chandan[1] At present, most discussions surrounding the elimination of objectionable content from end-to-end encrypted (E2EE) services approach it as a debate about breaking E2EE technology to allow enforcement agencies access to secure communications. In this post, Akshata Singh and Nitish Chandan of the CyberPeace Foundation argue that there are other ...

RBI guidelines on ‘Enhancing Security of Card Transactions’

RBI guidelines on ‘Enhancing Security of Card Transactions’

As per the RBI Annual report of 2019-20, India saw a massive increase of the number and value of transactions with respect to Credit Cards( 21.1% increase in value), Debit cards(35.6% in value) and Prepaid Payment Instruments i.e. Wallets, Gift cards etc. (increase of 15% in volume). Two major reasons behind this increase in these …

3 things which you can do if someone impersonates you on Facebook

3 things which you can do if someone impersonates you on Facebook

How often does one come across a profile on Facebook that is pretending to be someone else? The answer would probably be ‘daily’. This practice on the platform where someone pretends to be someone else, with an intention, to deceive someone is known as impersonation. Another great aspect covered under “impersonation” on Facebook is that …

The Laws behind Drones in India

The Laws behind Drones in India

One often comes across those beautiful and cinematic aerial shots of sceneries, forests and mountains, which is mostly this footage is captured through drones. Amongst other applications of these Remotely Piloted Aircrafts (RPA) or Unmanned Aircraft System (UAS) such as Geographical Mapping, Agriculture Assistance, Forest and wildlife Assistance and Law Enforcement, Filming and Cinematography are …

Cyber/ Digital Parenting 101

Cyber/ Digital Parenting 101

Parenting‌ ‌is‌ ‌not‌ ‌the‌ ‌same‌ ‌anymore.‌ ‌With‌ ‌technological‌ ‌advancements,‌ ‌parenting‌ ‌has‌ ‌also‌ ‌changed.‌ ‌Children‌ ‌having‌ ‌access‌ ‌to‌ ‌the‌ ‌Internet,‌ ‌cell‌ ‌phones,‌ ‌tablets‌ ‌and‌ ‌other‌ ‌technologies‌ ‌need ‌‌a‌ ‌different‌ ‌kind‌ ‌of‌ ‌parenting,‌ ‌which‌ ‌is‌ ‌digital‌ ‌parenting.‌ ‌Children‌ ‌can‌ ‌now‌ ‌open‌ ‌a‌ ‌social‌ ‌media‌ ‌account‌ ‌and‌ ‌interact‌ ‌with‌ ‌different‌ ‌people.‌ ‌Children‌ ‌are‌ ‌using‌ ‌various‌ ‌applications‌ ‌to‌ ‌study,‌ …

Basic steps to improve cybersecurity in an organization

Basic steps to improve cybersecurity in an organization

Getting Cyber- insurance for one’s organization surely is necessary, if the organization collects customer data and is dependent on certain online resources. However, there are a few things, which as an administrative head or a manager of an organization, one can do to promote a culture of taking information security seriously. Here is a list …

Securing oneself on Telegram

Securing oneself on Telegram

Telegram, the messaging app, isn’t well known for cooperating with the law enforcement agencies in providing any kind of data of any users. Due to this and various other factors, it has become quite popular amongst extremist groups as well. With over 200 million users worldwide, this application has become a “go-to” destination for criminals ...

Securing oneself on Snapchat

Securing oneself on Snapchat

People care about saving their snap scores a lot these days. However, it is equally important to save oneself on Snapchat as well. Snapchat has some great privacy and security features right from the installation, such as identifying the person who took the screenshot of a story or snaps only being visible to friends. While ...

The Story ‘Ban on 59 Apps’ is not over

The Story ‘Ban on 59 Apps’ is not over

On 29th June 2020, Ministry of electronics and information technology issued a press release which essentially blocked public access to a list of 59 apps. This was done as per Section 69A of the Information Technology Act, 2000  read with the relevant provisions of the Information Technology (Procedure and Safeguards for Blocking of Access of ...