How to secure your Snapchat account?

Vidhi JainCyber Security

How to secure your Snapchat account

In my previous articles in this series, I have discussed how to secure Facebook, WhatsApp, and Instagram accounts. This article will talk about various security and privacy settings on Snapchat. The platform has around 265 million daily active users worldwide. … Read More

Will online dating amount to sexual consent?

Gitanjali SadanLaw

Will online dating amount to sexual consent

Online dating apps like Tinder, Happn, Aisle, and Bumble have revolutionised dating in India. Users interact through these apps with other individuals they have never met before, based on their likes and dislikes over text messages and calls. This initial … Read More

What is DigiLocker and how to enable it?

The Cyber Blog IndiaCyber Security, Law

What is DigiLocker and how to enable it?

DigiLocker, as the name suggests, is a digital locker for all your e-documents that are issued by the Indian Government. After you enable it, you won’t have to carry all the paperwork everywhere you go. You’ll just need an internet … Read More

Digital India Myths: Incognito Mode

Raj PagariyaCyber Security

Although you take steps to improve your privacy and security while browsing the web, it’s not possible to be totally anonymous on the Internet. Majority of the Internet users feel that using Incognito Mode or Private Browsing mode on their … Read More

Everyday Mistakes We Make Online

Raj PagariyaCyber Security

When it comes to cyber security, attackers exploit the vulnerable areas of a target. The Cyber Blog India short listed some mistakes we make on daily basis. Downloading third-party apps:  Several people download paid apps from third-party app stores and … Read More

Replace OTPs with USB Security key

Arpan SinhaCyber Security

Two factor authentication provides an extra layer of security to your account. It provides a method of combining two different kinds of login approaches to add some extra security, but that’s not enough. 2FA is stronger than password based authentication, … Read More