-
Cyber 360
-
by
Prasad Krishna
—
published
Sep 30, 2015
—
last modified
Oct 14, 2015 02:22 AM
—
filed under:
Cyber Security,
Internet Governance
Synergy Foundation organized the Cyber 360 conference in Bangalore on September 29 and 30, 2015. Sunil Abraham participated in the event.
Located in
Internet Governance
/
News & Media
-
Cyber Appellate Tribunal in Bengaluru
-
by
Prasad Krishna
—
published
May 24, 2012
—
last modified
May 30, 2012 05:47 AM
—
filed under:
Internet Governance
Bengaluru will be home to the southern chapter of the Cyber Appellate Tribunal (CAT), which will reach out to victims of cyber crime, the state government announced at the Cyber Security Summit here on Tuesday.
Located in
News & Media
-
Cyber bullying is a crime, but open to interpretation: Expert
-
by
Prasad Krishna
—
published
Dec 07, 2014
—
filed under:
Internet Governance
The social media attack on a Doordarshan anchor who made a series of gaffes at the recent Goa film festival would qualify as cyber bullying, experts say, but hasten to add there is not much that can be done to prevent such behaviour online, given the humungous size of the virtual universe.
Located in
Internet Governance
/
News & Media
-
Cyber Crime & Privacy
-
by
Merlin Oommen
—
published
Aug 22, 2011
—
last modified
Sep 01, 2011 09:36 AM
—
filed under:
Internet Governance,
Privacy
India is a growing area in the field of active Internet usage with 71 million Internet users.
Located in
Internet Governance
-
Cyber crimes shoot up 52% in India over last year
-
by
Prasad Krishna
—
published
Jul 03, 2014
—
last modified
Jul 03, 2014 10:14 AM
—
filed under:
Cyber Security,
Internet Governance,
Social Media
There has been a sharp increase in the incidence of cyber crime in the country. The number of cases registered in 2013 under the IT Act has gone up by 52 per cent to 4,192 as against 2,761 in the previous year.
Located in
News & Media
-
Cyber criminals hide in the ‘dark web’ to remain anonymous
-
by
Tushar Kaushik
—
published
May 02, 2019
—
filed under:
Internet Governance
An increasing number of cyber criminals are using the dark web — the encrypted part of the internet that cannot be tracked — to shop for software that helps them remain anonymous while carrying out their crimes.
Located in
Internet Governance
/
News & Media
-
Cyber Dialogue Conference 2014
-
by
Prasad Krishna
—
published
Mar 27, 2014
—
last modified
Apr 08, 2014 05:09 AM
—
filed under:
Freedom of Speech and Expression,
Cyber Security,
Internet Governance,
Privacy
The Cyber Dialogue conference, presented by the Canada Centre for Global Security Studies at the Munk School of Global Affairs, University of Toronto, will convene an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated public plenary conversations and working groups around cyberspace security and governance.
Located in
News & Media
-
Cyber experts say 'playground open' for influencing elections
-
by
Admin
—
published
May 03, 2018
—
filed under:
Internet Governance,
Privacy
Cyber experts said that under the provisions provided by 43 (A) of Indian IT Act, two types of data collection are completely legal: first, the data shared by the user in the public domain and secondly, the data published by the social platforms, like Facebook.
Located in
Internet Governance
/
News & Media
-
Cyber experts suggest using open source software to protect privacy
-
by
Prasad Krishna
—
published
Jun 22, 2013
—
last modified
Jul 03, 2013 04:32 AM
—
filed under:
Internet Governance,
Privacy
Big Brother is watching. With the Central Monitoring System (CMS) at home and PRISM from the US, millions of users worldwide have become vulnerable to online surveillance by state agencies without even realizing it. No surprise, several cyber security experts feel that building one's own personal firewall is a good way of fortifying online privacy.
Located in
News & Media
-
Cyber law experts asks why CERT-In removed advisory warning about WhatsApp vulnerability
-
by
Megha Mandavia
—
published
Nov 15, 2019
—
filed under:
Internet Governance,
Privacy
On the missing web page note, CERT-In had provided a detailed explanation of the vulnerability, which could be exploited by an attacker by making a decoy voice call to a target.
Located in
Internet Governance
/
News & Media