Centre for Internet & Society

115 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Hacker steals 17 million Zomato users’ data, briefly puts it on dark web
by Prasad Krishna published May 20, 2017 — filed under: , , ,
Records of 17 million users were stolen from online restaurant search platform Zomato, the company said in a blog post on Thursday.
Located in Internet Governance / News & Media
Hakon 2016
by Prasad Krishna published Oct 15, 2016 — filed under: ,
Udbhav Tiwari attended attended Hakon 2016, a conference held between September 30 and October 2, 2016 at Indore, Madhya Pradesh, India,on behalf of CIS under the Hewlett Cyber Security Project.
Located in Internet Governance / News & Media
Blog Entry How Long Have Banks Known About The Debit Card Fraud?
by tiwari published Oct 22, 2016 — filed under: , ,
The recent security breach in an Indian payment switch provider, confirmed earlier this week by the National Payments Corporation of India Ltd (NPCIL), has forced domestic banks into damage control mode over the past few days.
Located in Internet Governance / Blog
IEEE-SA InDITA Conference 2018
by Admin published Jul 18, 2018 last modified Aug 01, 2018 11:04 PM — filed under: ,
Gurshabad Grover participated in the IEEE-SA InDITA Conference 2018 organized by IEEE Standards Association held IIIT-Bangalore on July 10 and 11, 2018.
Located in Internet Governance / News & Media
Blog Entry Improving the Processes for Disclosing Security Vulnerabilities to Government Entities in India
by Karan Saini, Pranesh Prakash and Elonnai Hickok published Mar 20, 2019 last modified Apr 01, 2019 12:02 PM — filed under: ,
The aim of this policy brief is to recommend changes pertaining to current legislation, policy and practice to the Government of India regarding external vulnerability reporting and disclosure. The changes we recommend within this brief aim to strengthen the processes around voluntary vulnerability and bug disclosure by third parties.
Located in Internet Governance / Blog
Blog Entry Incident Response Requirements in Indian Law
by Vipul Kharbanda published Dec 28, 2016 last modified Dec 28, 2016 01:19 AM — filed under: , ,
Cyber incidents have serious consequences for societies, nations, and those who are victimised by them. The theft, exploitation, exposure or otherwise damage of private, financial, or other sensitive personal or commercial data and cyber attacks that damage computer systems are capable of causing lasting harm.
Located in Internet Governance / Blog
Blog Entry India is falling down the facial recognition rabbit hole
by Prem Sylvester and Karan Saini published Jul 25, 2019 — filed under: ,
Its use as an effective law enforcement tool is overstated, while the underlying technology is deeply flawed.
Located in Internet Governance / Blog
India needs better cyber police
by Prasad Krishna published May 23, 2014 last modified Jun 04, 2014 07:56 AM — filed under: ,
On Wednesday, one of the largest online shopping and auction portals, eBay, revealed that earlier this year, cybercriminals accessed details of 145 million of its customers.
Located in News & Media
Blog Entry India's National Cyber Security Policy in Review
by Jonathan Diamond published Jul 31, 2013 — filed under: , ,
Earlier this month, the Department of Electronics and Information Technology released India’s first National Cyber Security Policy. Years in the making, the Policy sets high goals for cyber security in India and covers a wide range of topics, from institutional frameworks for emergency response to indigenous capacity building.
Located in Internet Governance / Blog
India-China Tech Forum 2018
by Admin published Dec 26, 2018 — filed under: ,
Arindrajit Basu spoke at the India-China Tech Forum 2018 organised by ORF and Peking University at the Ji Xianlin Centre for India-China Studies, Mumbai on December 11 - 12, 2018. The event functioned as a bi-annual dialogue that fosters co-operation in this space between the two countries.
Located in Internet Governance / News & Media