Introduction “We have seen the havoc played by unscrupulous internet predatory sites such as the ‘Blue Whale’. It is upto us to empower our children so that they develop the maturity to say no to such exploitative and inhuman tendencies … Continue reading Legally Challenging the Blue Whale Challenge
With a giant leap of technology, the concept of cyberspace emerged, demarcated by its virtual boundaries. These virtual boundaries are being penetrated through spying programmes like GhostNet, Trojan, logic-bombs or other associated malwares, shaping the concept of Cyber Espionage. Various … Continue reading Deepening Roots of State-Sponsored Cyber Espionage
A friend was pissed off recently because he was informed by others of unusual posts from his Facebook account. He had been offline for sometime only to be called back with abnormal activity happening on his wall. A rant from … Continue reading Beware of the Hacker!
“Yesterday only, I received a call on my mobile device from an unknown number. The anonymous caller presented himself as some bank officer who was in immediate need of my ATM card number and CVV. After politely informing him that … Continue reading Reporting a cyber crime in India with just an e-mail