Blogs

#Incident_Report: The Colonial Pipeline Incident

#Incident_Report: The Colonial Pipeline Incident

United States of America, one of the pioneers of Innovation and drivers of the industry of Cyber Security, recently fell into the hole of helplessness due to a Cyber Attack on one of the nation’s largest Gas Pipeline operators, Colonial Pipeline. According to several news reports operations of Colonial Pipelines were halted due to a …

Indian Judiciary Embracing Technology for the Future

Indian Judiciary Embracing Technology for the Future

The Supreme court of India recently launched a tool named ‘SUPACE’, which is based on the concepts of machine learning and artificial intelligence. The present blog will take one through the highlights of this new tool and will throw some light on how the supreme court is going to use it and essentially pave a …

Cybercriminals using online gaming to target kids

Cybercriminals using online gaming to target kids

New Delhi: The increased use of online gaming has brought with it a slew of challenges and risks that include exposure of children to inappropriate content, cyberbullying, sexual exploitation, addiction, gambling and toxic peers, warned a new report on Thursday. The global gaming industry is expected to grow in the next few years, and the …

A guide against the menace of ‘blackmail through video calls’

A guide against the menace of ‘blackmail through video calls’

A group of scamsters have raised havoc, in Ranchi, by taking advantage of innocent people and extorting money from them by threatening to Leak certain videos and images which violate their bodily privacy. The present blog will explain how to understand the modus operandi of these scamsters and be aware of any such incidents so …

#incident_report: The Microsoft Exchange Hack

#incident_report: The Microsoft Exchange Hack

A blog post by the corporate vice president of Microsoft revealed that Microsoft’s popular email exchange software Microsoft Exchange, which is used by many private and governmental organizations and departments, has been affected by an alleged state-sponsored cyber attack from China. The present blog will take one through the whole incident and what exactly happened. …

Highlights of the New Information technology Rules 2021( for Digital Media)

Highlights of the New Information technology Rules 2021( for Digital Media)

Ministry of Electronics and Information Technology (MEITy) recently released a new set of rules for Intermediaries and Digital Content Providers by exercising their powers under sub-section (1), clauses (z) and (zg) of sub-section (2) of section 87 of the Information Technology Act, 2000 (21 of 2000). These new rules are named as Information Technology (Intermediary …

How do Whatsapp, Telegram and Signal Share Data with Third Parties?

How do Whatsapp, Telegram and Signal Share Data with Third Parties?

After a massive outrage from the general public and the platform’s users, against Whatsapp’s new updated policy, the popular messaging platform decided to delay their decision of implementation of new policies. A lot of this outrage was also caused due to some misconceptions which were appealing to a larger audience and bought in a greater ...

Contribute and Compete on a Global Scale: Your Global CyberPeace Challenge 2.0 Invitation

Think you have innovative cybersecurity skills and ideas to contribute on a global scale? You’re invited to throw your hat into the ring during the Global CyberPeace Challenge – a competition that encourages innovators from around the world to promote peace in cyberspace by solving crucial techno-social issues. Organized by the CyberPeace Foundation and supported by SANS, this virtual …