Centre for Internet & Society

2987 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Cyber 360
by Prasad Krishna published Sep 30, 2015 last modified Oct 14, 2015 02:22 AM — filed under: ,
Synergy Foundation organized the Cyber 360 conference in Bangalore on September 29 and 30, 2015. Sunil Abraham participated in the event.
Located in Internet Governance / News & Media
Cyber Appellate Tribunal in Bengaluru
by Prasad Krishna published May 24, 2012 last modified May 30, 2012 05:47 AM — filed under:
Bengaluru will be home to the southern chapter of the Cyber Appellate Tribunal (CAT), which will reach out to victims of cyber crime, the state government announced at the Cyber Security Summit here on Tuesday.
Located in News & Media
Blog Entry Cyber bullying is a crime, but open to interpretation: Expert
by Prasad Krishna published Dec 07, 2014 — filed under:
The social media attack on a Doordarshan anchor who made a series of gaffes at the recent Goa film festival would qualify as cyber bullying, experts say, but hasten to add there is not much that can be done to prevent such behaviour online, given the humungous size of the virtual universe.
Located in Internet Governance / News & Media
Cyber Crime & Privacy
by Merlin Oommen published Aug 22, 2011 last modified Sep 01, 2011 09:36 AM — filed under: ,
India is a growing area in the field of active Internet usage with 71 million Internet users.
Located in Internet Governance
Cyber crimes shoot up 52% in India over last year
by Prasad Krishna published Jul 03, 2014 last modified Jul 03, 2014 10:14 AM — filed under: , ,
There has been a sharp increase in the incidence of cyber crime in the country. The number of cases registered in 2013 under the IT Act has gone up by 52 per cent to 4,192 as against 2,761 in the previous year.
Located in News & Media
Cyber criminals hide in the ‘dark web’ to remain anonymous
by Tushar Kaushik published May 02, 2019 — filed under:
An increasing number of cyber criminals are using the dark web — the encrypted part of the internet that cannot be tracked — to shop for software that helps them remain anonymous while carrying out their crimes.
Located in Internet Governance / News & Media
Cyber Dialogue Conference 2014
by Prasad Krishna published Mar 27, 2014 last modified Apr 08, 2014 05:09 AM — filed under: , , ,
The Cyber Dialogue conference, presented by the Canada Centre for Global Security Studies at the Munk School of Global Affairs, University of Toronto, will convene an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated public plenary conversations and working groups around cyberspace security and governance.
Located in News & Media
Cyber experts say 'playground open' for influencing elections
by Admin published May 03, 2018 — filed under: ,
Cyber experts said that under the provisions provided by 43 (A) of Indian IT Act, two types of data collection are completely legal: first, the data shared by the user in the public domain and secondly, the data published by the social platforms, like Facebook.
Located in Internet Governance / News & Media
Cyber experts suggest using open source software to protect privacy
by Prasad Krishna published Jun 22, 2013 last modified Jul 03, 2013 04:32 AM — filed under: ,
Big Brother is watching. With the Central Monitoring System (CMS) at home and PRISM from the US, millions of users worldwide have become vulnerable to online surveillance by state agencies without even realizing it. No surprise, several cyber security experts feel that building one's own personal firewall is a good way of fortifying online privacy.
Located in News & Media
Cyber law experts asks why CERT-In removed advisory warning about WhatsApp vulnerability
by Megha Mandavia published Nov 15, 2019 — filed under: ,
On the missing web page note, CERT-In had provided a detailed explanation of the vulnerability, which could be exploited by an attacker by making a decoy voice call to a target.
Located in Internet Governance / News & Media