Blogs

How do Whatsapp, Telegram and Signal Share Data with Third Parties?

How do Whatsapp, Telegram and Signal Share Data with Third Parties?

After a massive outrage from the general public and the platform’s users, against Whatsapp’s new updated policy, the popular messaging platform decided to delay their decision of implementation of new policies. A lot of this outrage was also caused due to some misconceptions which were appealing to a larger audience and bought in a greater ...

Contribute and Compete on a Global Scale: Your Global CyberPeace Challenge 2.0 Invitation

Think you have innovative cybersecurity skills and ideas to contribute on a global scale? You’re invited to throw your hat into the ring during the Global CyberPeace Challenge – a competition that encourages innovators from around the world to promote peace in cyberspace by solving crucial techno-social issues. Organized by the CyberPeace Foundation and supported by SANS, this virtual …

Security tips for your iPhone

The fundamental difference between an Apple and an Android Device, besides the hardware components, is Apple’s Proprietary iOS i.e. their mobile operating system, which is only available for Apple devices. Unlike Android, the source code of Apple’s mobile-based operating system is not available to the developers outside of apple to build separate User interfaces and ...

Rethinking Backdoors: Don’t Burn the House Down to Roast a Pig

Rethinking Backdoors: Don’t Burn the House Down to Roast a Pig

-By Akshata Singh & Nitish Chandan[1] At present, most discussions surrounding the elimination of objectionable content from end-to-end encrypted (E2EE) services approach it as a debate about breaking E2EE technology to allow enforcement agencies access to secure communications. In this post, Akshata Singh and Nitish Chandan of the CyberPeace Foundation argue that there are other ...

RBI guidelines on ‘Enhancing Security of Card Transactions’

RBI guidelines on ‘Enhancing Security of Card Transactions’

As per the RBI Annual report of 2019-20, India saw a massive increase of the number and value of transactions with respect to Credit Cards( 21.1% increase in value), Debit cards(35.6% in value) and Prepaid Payment Instruments i.e. Wallets, Gift cards etc. (increase of 15% in volume). Two major reasons behind this increase in these …

3 things which you can do if someone impersonates you on Facebook

3 things which you can do if someone impersonates you on Facebook

How often does one come across a profile on Facebook that is pretending to be someone else? The answer would probably be ‘daily’. This practice on the platform where someone pretends to be someone else, with an intention, to deceive someone is known as impersonation. Another great aspect covered under “impersonation” on Facebook is that …

The Laws behind Drones in India

The Laws behind Drones in India

One often comes across those beautiful and cinematic aerial shots of sceneries, forests and mountains, which is mostly this footage is captured through drones. Amongst other applications of these Remotely Piloted Aircrafts (RPA) or Unmanned Aircraft System (UAS) such as Geographical Mapping, Agriculture Assistance, Forest and wildlife Assistance and Law Enforcement, Filming and Cinematography are …

Cyber/ Digital Parenting 101

Cyber/ Digital Parenting 101

Parenting‌ ‌is‌ ‌not‌ ‌the‌ ‌same‌ ‌anymore.‌ ‌With‌ ‌technological‌ ‌advancements,‌ ‌parenting‌ ‌has‌ ‌also‌ ‌changed.‌ ‌Children‌ ‌having‌ ‌access‌ ‌to‌ ‌the‌ ‌Internet,‌ ‌cell‌ ‌phones,‌ ‌tablets‌ ‌and‌ ‌other‌ ‌technologies‌ ‌need ‌‌a‌ ‌different‌ ‌kind‌ ‌of‌ ‌parenting,‌ ‌which‌ ‌is‌ ‌digital‌ ‌parenting.‌ ‌Children‌ ‌can‌ ‌now‌ ‌open‌ ‌a‌ ‌social‌ ‌media‌ ‌account‌ ‌and‌ ‌interact‌ ‌with‌ ‌different‌ ‌people.‌ ‌Children‌ ‌are‌ ‌using‌ ‌various‌ ‌applications‌ ‌to‌ ‌study,‌ …

Basic steps to improve cybersecurity in an organization

Basic steps to improve cybersecurity in an organization

Getting Cyber- insurance for one’s organization surely is necessary, if the organization collects customer data and is dependent on certain online resources. However, there are a few things, which as an administrative head or a manager of an organization, one can do to promote a culture of taking information security seriously. Here is a list …