Blog

GREEN COMPUTING: WHAT IS THE SIGNIFICANCE IN 21st CENTURY?

Green Computing: An Overview The Application of ‘Green Computing’ refers to the adoption of a sustainable business landscape in designing, manufacture, use and disposal of various resources related to Information Technology (IT). Green computing is essentially an environmentally friendly use of IT technology to lessen the burden on the planet. Practice’s promoting green computing include …

Prioritize security – 2122 Password game

There is a security epidemic! Why? Because of a lack of encryption. Plaintext passwords are not only highly vulnerable to password hacks, but they also open the door for other cybercrimes such as data breaches. Studies have shown that most people tend to use passwords that are simple and easily guessable. Unfortunately, this increases the …

Prometheus Ransomware

Ransomware attacks are on a global increase. It is a particularly nasty computer malware that encrypts your important files and renders them inaccessible unless you pay a ransom to the hacker for the key to decrypt the files. It attacks the master boot record and blocks victims from accessing their operating system. The malware typically …

Future of Crypto and Cyber Casinos

Technology is on the cusp of revolutionizing some of the most fundamental parts of everyday life. After all, the world began with barter and then proceeded to cash and checks before we got to this exciting concept known as cryptocurrency. And it seems that almost every week we hear about a new digital currency hitting …

Twitter War over New I.T Rules Compliance

With a growing global presence, social media platforms are under immense pressure to comply with local laws. Failure to do so could attract liabilities from lawsuits, fines and even imprisonment of companies or individuals associated with the platform in the respective country. The recent flip-flop about granting intermediary status to Twitter by the Indian government …

The Joker Malware

Android was notoriously famous for potentially being open to various malwares and viruses due to its inherent nature of being open source and allowing to install applications from external sources i.e. which are often not verified by the google play store. However, on certain instances the malwares have been known to creep in through various …

THE UNTOLD STORY OF ‘BOIS LOCKER ROOM’

An analysis of controversy around the offences, under POCSO, IPC and IT Act, made out in ‘Bois Locker Room’ incident. Introduction ‘Bois Locker Room’, an Instagram group which shook everyone’s conscience to their cores, the group which held up a mirror to our faces and made us face the sad reality we live have built …

#incident_report : The Air India and SITA PSS Data Leak

On March 19th 2021, Air India released a press report that their Passenger Service System, SITA PSS( a multinational information technology company providing IT and telecommunication services to the air transport industry), have fallen victim to a sophisticated cyber-attack. Further news reports also revealed that Air India wasn’t the only Passenger Airlines that was affected …

#Incident_Report: The Colonial Pipeline Incident

United States of America, one of the pioneers of Innovation and drivers of the industry of Cyber Security, recently fell into the hole of helplessness due to a Cyber Attack on one of the nation’s largest Gas Pipeline operators, Colonial Pipeline. According to several news reports operations of Colonial Pipelines were halted due to a …

Mapping Regulations for UAVs in India – Unmanned Aircraft Services Rules 2021

The Ministry of Civil Aviation released the Unmanned Aircraft Services Rules (UAS Rules) 2021 earlier last month. At the outset, it aims to regulate the production, trade and ownership of UAS. These have been released in consultation with stakeholders and comments from the public on the draft UAS Rules released in 2020. This is the …

Indian Judiciary Embracing Technology for the Future

The Supreme court of India recently launched a tool named ‘SUPACE’, which is based on the concepts of machine learning and artificial intelligence. The present blog will take one through the highlights of this new tool and will throw some light on how the supreme court is going to use it and essentially pave a …

Cybercriminals using online gaming to target kids

New Delhi: The increased use of online gaming has brought with it a slew of challenges and risks that include exposure of children to inappropriate content, cyberbullying, sexual exploitation, addiction, gambling and toxic peers, warned a new report on Thursday. The global gaming industry is expected to grow in the next few years, and the …

A guide against the menace of ‘blackmail through video calls’

A group of scamsters have raised havoc, in Ranchi, by taking advantage of innocent people and extorting money from them by threatening to Leak certain videos and images which violate their bodily privacy. The present blog will explain how to understand the modus operandi of these scamsters and be aware of any such incidents so …

#incident_report: The Microsoft Exchange Hack

A blog post by the corporate vice president of Microsoft revealed that Microsoft’s popular email exchange software Microsoft Exchange, which is used by many private and governmental organizations and departments, has been affected by an alleged state-sponsored cyber attack from China. The present blog will take one through the whole incident and what exactly happened. …

Highlights of the New Information technology Rules 2021( for Digital Media)

Ministry of Electronics and Information Technology (MEITy) recently released a new set of rules for Intermediaries and Digital Content Providers by exercising their powers under sub-section (1), clauses (z) and (zg) of sub-section (2) of section 87 of the Information Technology Act, 2000 (21 of 2000). These new rules are named as Information Technology (Intermediary …

How do Whatsapp, Telegram and Signal Share Data with Third Parties?

After a massive outrage from the general public and the platform’s users, against Whatsapp’s new updated policy, the popular messaging platform decided to delay their decision of implementation of new policies. A lot of this outrage was also caused due to some misconceptions which were appealing to a larger audience and bought in a greater ...

Over the Counter Stalkerware Turns Your Phone Against You. How Can You Stay Safe?

Priya (name changed), 16, first approached the eProtect Foundation (an NGO for cyber crime prevention) on the verge of a mental breakdown. She told the support team that her phone had been bugged for two months by her ex-boyfriend. Her ex wanted to find out if she was talking to any other men post the …

Contribute and Compete on a Global Scale: Your Global CyberPeace Challenge 2.0 Invitation

Think you have innovative cybersecurity skills and ideas to contribute on a global scale? You’re invited to throw your hat into the ring during the Global CyberPeace Challenge – a competition that encourages innovators from around the world to promote peace in cyberspace by solving crucial techno-social issues. Organized by the CyberPeace Foundation and supported by SANS, this virtual …

Security tips for your iPhone

The fundamental difference between an Apple and an Android Device, besides the hardware components, is Apple’s Proprietary iOS i.e. their mobile operating system, which is only available for Apple devices. Unlike Android, the source code of Apple’s mobile-based operating system is not available to the developers outside of apple to build separate User interfaces and ...

Rethinking Backdoors: Don’t Burn the House Down to Roast a Pig

-By Akshata Singh & Nitish Chandan[1] At present, most discussions surrounding the elimination of objectionable content from end-to-end encrypted (E2EE) services approach it as a debate about breaking E2EE technology to allow enforcement agencies access to secure communications. In this post, Akshata Singh and Nitish Chandan of the CyberPeace Foundation argue that there are other ...

RBI guidelines on ‘Enhancing Security of Card Transactions’

As per the RBI Annual report of 2019-20, India saw a massive increase of the number and value of transactions with respect to Credit Cards( 21.1% increase in value), Debit cards(35.6% in value) and Prepaid Payment Instruments i.e. Wallets, Gift cards etc. (increase of 15% in volume). Two major reasons behind this increase in these …

3 things which you can do if someone impersonates you on Facebook

How often does one come across a profile on Facebook that is pretending to be someone else? The answer would probably be ‘daily’. This practice on the platform where someone pretends to be someone else, with an intention, to deceive someone is known as impersonation. Another great aspect covered under “impersonation” on Facebook is that …

The Laws behind Drones in India

One often comes across those beautiful and cinematic aerial shots of sceneries, forests and mountains, which is mostly this footage is captured through drones. Amongst other applications of these Remotely Piloted Aircrafts (RPA) or Unmanned Aircraft System (UAS) such as Geographical Mapping, Agriculture Assistance, Forest and wildlife Assistance and Law Enforcement, Filming and Cinematography are …

Cyber/ Digital Parenting 101

Parenting‌ ‌is‌ ‌not‌ ‌the‌ ‌same‌ ‌anymore.‌ ‌With‌ ‌technological‌ ‌advancements,‌ ‌parenting‌ ‌has‌ ‌also‌ ‌changed.‌ ‌Children‌ ‌having‌ ‌access‌ ‌to‌ ‌the‌ ‌Internet,‌ ‌cell‌ ‌phones,‌ ‌tablets‌ ‌and‌ ‌other‌ ‌technologies‌ ‌need ‌‌a‌ ‌different‌ ‌kind‌ ‌of‌ ‌parenting,‌ ‌which‌ ‌is‌ ‌digital‌ ‌parenting.‌ ‌Children‌ ‌can‌ ‌now‌ ‌open‌ ‌a‌ ‌social‌ ‌media‌ ‌account‌ ‌and‌ ‌interact‌ ‌with‌ ‌different‌ ‌people.‌ ‌Children‌ ‌are‌ ‌using‌ ‌various‌ ‌applications‌ ‌to‌ ‌study,‌ …

Basic steps to improve cybersecurity in an organization

Getting Cyber- insurance for one’s organization surely is necessary, if the organization collects customer data and is dependent on certain online resources. However, there are a few things, which as an administrative head or a manager of an organization, one can do to promote a culture of taking information security seriously. Here is a list …

Securing oneself on Telegram

Telegram, the messaging app, isn’t well known for cooperating with the law enforcement agencies in providing any kind of data of any users. Due to this and various other factors, it has become quite popular amongst extremist groups as well. With over 200 million users worldwide, this application has become a “go-to” destination for criminals ...

Securing oneself on Snapchat

People care about saving their snap scores a lot these days. However, it is equally important to save oneself on Snapchat as well. Snapchat has some great privacy and security features right from the installation, such as identifying the person who took the screenshot of a story or snaps only being visible to friends. While ...

Protecting the mental health of young netizens during a global pandemic

Protecting the mental health of young netizens during a global pandemic As we are practising social distancing norms during the quarantine and the kids have stopped going to schools or having any physical means of communication, it has almost become necessary for them to be on the internet for any kind of work. Be it, ...

The Story ‘Ban on 59 Apps’ is not over

On 29th June 2020, Ministry of electronics and information technology issued a press release which essentially blocked public access to a list of 59 apps. This was done as per Section 69A of the Information Technology Act, 2000  read with the relevant provisions of the Information Technology (Procedure and Safeguards for Blocking of Access of ...

Securing oneself on Instagram

Instagram is one of the most post popular social media platforms in the world right now, with over 155 million users in India! With such a huge user base, it becomes important to consider the importance of an Individual’s privacy and Security on the platform. Here are a few things one can do to enjoy …

Is your phone hacked?

Smartphones have become a part and parcel of our lives. From emails to banking all our activities have gone online. Even after a lot of efforts by Google and Apple, mobile malware is present in the official app stores. Malware includes many different types of threats like viruses, spyware, worms, Trojans, etc. Malware gets often …

Apex Court clears the air on Section 65B, Evidence Act

The onset of technology and its involvement in our personal lives also brings various challenges of the applicability and acceptability of such technology in more traditional and conventional setups. For example, many people find it intriguing that whether an Agreement made over Email will have the same validity as an agreement made on paper and …

Zoom’s Security and Privacy

#CyberPeaceTalks with Vineet Kumar Zoom’s Security and Privacy   Recently Mr. Vineet Kumar, President, Cyber Peace Foundation hosted a webinar #Cyber Peace Talks with Mr. Sameer Raje, General Manager and Head of India, Zoom to discuss various aspects of the new communication standards set up by Zoom Cloud Meetings and various controversies around it.   ...

Online Resilience, Women and Cyber Safety

Rumination through the Digital Shakti Campaign As I write this post after a good couple of months into the Digital Shakti campaign that we launched in collaboration with Facebook and the National Commission for Women, there are some interesting and some worrisome findings through the project. The campaign overall is doing great and we have …