A Beginner’s Guide to Space Transition Theory

Pallavi SinghLaw1 Comment

Space Transition Theory explains the nature & behaviour leading to commission of cyber crime with time, space and circumstances as catalysts.

The nature of cyber crimes evolves rapidly in line with technological developments. To understand why cyber crimes happen, various cyber criminology theories have attempted to explain this. These theories seek to diagnose the minuscule reason leading to the occurrence of … Read More

Rijksmuseum Twenthe v. Simon C Dickinson Ltd.

The Cyber Blog IndiaCase Summary

Application for amending claims in a case involving fraudulent transfer of funds due to spoofed emails

Rijksmuseum Twenthe v. Simon C Dickinson Ltd. In the High Court of Justice, Business and Property Courts of England and Wales, Commercial Court (QBD) Case CL-2019-000002 Before Judge Pelling Decided on January 30, 2020 Relevancy of the Case: Application for … Read More

How to secure your Twitter account?

Vidhi JainCyber Security

In my previous articles of this series, I have discussed security settings on WhatsApp, Facebook, Instagram, Snapchat, and LinkedIn. This article is a step-by-step guide to securing your Twitter account. With over 300 million monthly active users, the platform remains … Read More

Pawan Kumar Sharma v. State of M.P.

TannviCase Summary

Bail application in a VYAPAM scam case

Pawan Kumar Sharma v. State of M.P. In the High Court of Madhya Pradesh MCRC 1406/2015 Before Chief Justice A.M. Khanwilkar and Justice Alok Aradhe Decided on March 04, 2015 Relevancy of the Case: Bail application in a VYAPAM scam … Read More

How to secure your Snapchat account?

Vidhi JainCyber Security

How to secure your Snapchat account

In my previous articles in this series, I have discussed how to secure Facebook, WhatsApp, and Instagram accounts. This article will talk about various security and privacy settings on Snapchat. The platform has around 265 million daily active users worldwide. … Read More

How to secure your WhatsApp account?

Vidhi JainCyber Security

How to secure your WhatsApp account

In my last article, I elaborated on various steps that you can take to secure your Facebook account. The focus now shifts to WhatsApp, a common name in every household. There are over 2 billion WhatsApp users globally. WhatsApp is … Read More

A Beginner’s Guide to Ransomware

Srushti IyerCyber Security

In the last decade or so, cyber attacks have evolved tremendously in their size and impact. I am sure you would have come across the term ‘ransomware’ multiple times in newspapers and blog articles. Put simply, ransomware is a type … Read More

What is DigiLocker and how to enable it?

The Cyber Blog IndiaCyber Security, Law

What is DigiLocker and how to enable it?

DigiLocker, as the name suggests, is a digital locker for all your e-documents that are issued by the Indian Government. After you enable it, you won’t have to carry all the paperwork everywhere you go. You’ll just need an internet … Read More