3 Easy Ways to Avoid Social Engineering
We always feel that in order to hack any computer, it is necessary that the hacker contact the computer some way. But this is not true. We do not run…
We always feel that in order to hack any computer, it is necessary that the hacker contact the computer some way. But this is not true. We do not run…
सोशल इंजीनियरिंग हमें हमेशा लगता है कि किसी भी कंप्यूटर तो हैक करने के लिए हैकर का उससे किसी तरह से संपर्क करना ज़रूरी है। लेकिन यह सच नहीं है।…
Malaika G. Naidu Passwords. The basis of cyber safety. From entertainment to e-commerce, all our activity online is secured through combinations of letters, numbers and special characters that we put…
Cyber Grooming: The internet can be a fantastic place for children and youngsters to connect with their friends to learn new things and also educate themselves. However, online friends may…
संक्षिप्त परिचय ऐप्पल आईडी हैकिंग क्या है? आपका ऐप्पल आईडी ऐप्पल की दुनिया में आपका पासपोर्ट है, जिसमें केवल एक पासवर्ड के साथ कई शानदार एप्लिकेशन और सेवाओं को अनलॉक…
From the privacy of your personal data stored with Aadhar to your online movie booking. From your child’s Instagram posts to your demat share trading account. From the legality of…
This short comic is designed to help youngsters navigate some of the dangers in cyberspace. The comic is available in 4 languages - English, Hindi, Marathi, and Spanish. Trouble on…
A 15-year-old girl courts a 16-year-old boy through a popular social network. The boy runs away from home to Mumbai only to find out that the girl was, in fact,…
Interesting cases Data collected from a smartwatch worn by a 57-year old Australian murder victim led to the arrest of her daughter-in-law. (Details)Data recorded in Apple’s Health App led to…
This is the guide to the Cyberlaws of Antigua and Barbuda, Australia, Bahamas, Canada, Commonwealth, Council of Europe, GCC countries, Jamaica, Japan, Malaysia, Mauritius, Nigeria, Singapore, Trinidad & Tobago, UK,…
In common language, the term Act is synonymous with the terms legislation, statute, and law. The Constitution of India specifies issues for which only the Central Government can make laws…
Before debating whether artificial intelligence is a threat or just a tool, we need to understand what artificial intelligence is. Is it something of the future or does it already…
Follow these 5 steps to create a super-strong password in 30 seconds: Choose a book. Any book will do.Open any page.Pick the first 4 or 5 words on the page.Simply…
Malaika Naidu Internet of Things, or IoT, refers to a whole network of physical devices around the world that are connected over the internet, capable of collecting and sharing data.…
Malaika G. Naidu Fake News. Sensationalism. Misreporting. In the last couple of years, the digital world has witnessed a growing trend in the amount of false information that is published.…
Follow these 8 quick tips for securing your home WiFi: Use WPA2 security encryption.Change your router password every week.Change your WiFi password every week.Change your SSID to something weird and…
Follow these 11 tips for safe social media usage: Remember that everything you post on a social networking site may be permanent and available to the world FOREVER - photos,…
Follow these 6 quick tips for keeping your passwords safe: Your passwords should be complex and difficult to guess. Ideally, they should be at least 10 characters long and should…
Follow these 12 quick tips for securing your smartphone: Use a strong password instead of a 4 or 6 digit PIN.Ensure that the device automatically locks itself if unused for…
There is no doubt that cybercrime is an ongoing and very real threat. The first thing that comes to mind when most people read cybercrime is financial fraud and data…
Use the same ATM machine for your transactions. You should become familiar with the machine so that you can recognize changes to the machine.Use ATM machines located inside banks rather…
Follow these 12 quick tips for securing your computer Keep your operating system, browsers, and all installed software up-to-date (especially software from Microsoft, Adobe, Oracle and Java).Do NOT use pirated…
Do you use eBanking? If yes then keep these 13 quick tips in mind: 1. Connect to your bank website using a device (laptop, smartphone, tablet, etc.) that has the…
You can love Facebook or you can hate it. But you can't ignore it. And nothing proves it better than these crazy Facebook crimes. Dylan Osborn was sentenced to 10…
Malaika Naidu Torrenting is one of the most popular methods of procuring movies, music, books, games, etc. from the internet. Every day, millions of gigabytes of data are downloaded through…
Malaika Naidu A major hype word and internet trend today is data privacy. Add to this the vulnerability brought in by excess use of social media and the integration of…
Malaika Naidu The most valuable resource today is not oil, water or fresh air – it’s data! An article in The Economist recently outlined just how valuable this resource is…
The relationship between law and technology forms a strong basis for discussion and debate. Both are intertwined, and any discussion would be incomplete without acknowledging the other. Any conversation…
Antony Clement Rubin and Janani Krishnamurthy were until recently unknown names in the field of law. Then they went to town questioning our very understanding of privacy. They filed…
We all know that cybercrime is a reality and it only growing with every passing day. With the deep penetration of smartphones into major markets across the world, we’re…
In 2017, 2 billion data records were compromised, followed by more than 4.5 billion records in just the first half of 2018. With every passing year, and at an…
1. End-point security Endpoint security requires that each computing device on the network comply with certain standards before network access is granted. Endpoints include laptops, desktops computers, smartphones, and other…
While the proponents of "Net Neutrality" bring out their expensive champagne and caviar, yesterday's Telecom Regulatory Authority of India (TRAI) regulations actually make it very easy and cheap for service…
Section 66A of the Information Technology Act (IT Act) was much debated (and hated) primarily because it was seen as being against “freedom of speech” and also because it used…
On 1st August 2011, Asian School of Cyber Laws submitted its recommendations to the Director, Department of Information Technology, Ministry of Communication & Information Technology, Government of India. Vishal Kumar…
The Information Technology (Amendment) Act, 2008 has come into force on 27th October 2009. Nine years after the birth of cyber laws in India, the new improved cyber law regime…
Asian School of Cyber Laws (ASCL) has been associated with and is assisting the Department of Information Technology, Ministry of Communications and Information Technology, Government of India in framing draft…
The ECommerce & Development Report 2003 recently published by the United Nations Conference on Trade and Development has quoted the findings of the Computer Crime and Abuse Report (2001-02) published…
The Indian Information Technology Act, 2000 (hereinafter referred to as "the Act") is one of the most important pieces of legislation in the recent past. This statute reaffirms India’s commitment…
Adjudicating Officers, who will be deciding the fate of multi-crore rupees cyber crime cases, have finally been appointed for all Indian States. Although, the Indian Cyber Law i.e. the Information…