A Beginner’s Guide to Space Transition Theory

Pallavi SinghLaw

Space Transition Theory explains the nature & behaviour leading to commission of cyber crime with time, space and circumstances as catalysts.

The nature of cyber crimes evolves rapidly in line with technological developments. To understand why cyber crimes happen, various cyber criminology theories have attempted to explain this. These theories seek to diagnose the minuscule reason leading to the occurrence of … Read More

डिजिटल इंडिया मिथक: इन्कॉग्निटो मोड

यश जैनCyber Security

डिजिटल इंडिया मिथक इन्कॉग्निटो मोड

मुझे उम्मीद है की इंटरनेट चलाते हुए आप गोपनीयता और सुरक्षा के लिए कदम उठाते हैं। हमें ये बात भी ध्यान रखना चाहिए कि इंटरनेट पर पूरी तरह से छुपना (या गुमनाम रहना) संभव नहीं है। अधिकांश इंटरनेट यूजर मानते … Read More

Rizwan v. Commissioner of Police

Gitanjali SadanCase Summary

Legal recognition of electronic records under Section 4 of the Information Technology Act, 2000

Rizwan @ Tippu Sattar Pathan v. Commissioner of Police In the High Court of Bombay Cri. WP 2080/2014 Before Justice A.S. Oka and Justice A.S. Chandurkar Decided on July 22, 2014 Relevancy of the case: Legal recognition of electronic records … Read More

What Is Cyber Exhaust? How To Reduce It?

Arpan SinhaCyber Security

  Everything that goes online, voluntarily or involuntarily, has some value and thus becomes a fair game for data mining. You wouldn’t even know, but the information about what you just shared on Facebook, or what answer you just upvoted … Read More

Digital India Myths: Facebook

Raj PagariyaCyber Security

Facebook

This post is the third in the series about the myths people in India have about Computers, Mobiles, the Internet and Cyber Space. Here are some common theories about Facebook in India. With over 120 million users on Facebook, India … Read More

Prevention and Control of Cyber Terrorism

Abhay Singh SengarCyber Security, Law

Cyber Terrorism

Terrorism is continually changing. While at the surface, it remains “the calculated use of unlawful violence or threat of unlawful violence to inculcate fear.” In the wake of the recent computer attacks, a new breed of terrorism is on the … Read More

Everyday Mistakes We Make Online

Raj PagariyaCyber Security

When it comes to cyber security, attackers exploit the vulnerable areas of a target. The Cyber Blog India short-listed some mistakes we make on a daily basis. Downloading third-party apps:  Several people download paid apps from third-party app stores and … Read More