How to get Revenge Porn videos removed?

Nitish ChandanCyber Security, Law9 Comments

revenge porn, social media, TheCBI, cybercrime, pornography, cyberspace

This post about Revenge Porn is based on the queries that we receive from numerous people across the country. And honestly, we did not have a clear answer  about revenge porn removal until we did some digging. First of all, revenge porn is a growing menace on all Social Media platforms and even the websites that serve porn videos. For … Read More

Cyber Bullying is real, but here is what you can do

Nitish ChandanLaw1 Comment

Cyber Bullying is a plague contaminating the entire Indian Social Media space rapidly. School students, Adults, Professionals and even the elderly have been a victim of Cyber Bullying. Sona Mohapatra, a renowned musician in the Indian music fraternity was publicly Cyber Bullied by fans of the actor, Salman Khan for days, after her tweet  about his latest controversy went viral. Personally, … Read More

How to Check if your Child is being Cyber Bullied?

Raj PagariyaLawLeave a Comment

cybercrime, safety, online, cyber, India, child, awareness, parentalcontrol

The use of Internet among people is increasing day by day specially, the younger generation. They are using it for just about everything (studying, shopping, banking, social interaction, finding jobs, earning money) but few use it for committing cyber crime too. Cyber bullying is one of those crimes. What is Cyber Bullying? The use of electronic communication to bully a … Read More

All You Need To Know About Credit Card Fraud

Arpan SinhaCyber Security1 Comment

Do you like to shop often with your credit cards? Or do you swipe your card at fuel stations? If the answer is “yes,” then you might be prone to credit card fraud. Credit card frauds are the scams committed using others’ card in a fraudulent way. It is the case where one’s card is used without their knowledge or authorization to … Read More

UwS: What is it & How does it get on my Computer?

Arpan SinhaCyber SecurityLeave a Comment

UwS (pronounced as “ooze”) is an unwanted software, which according to Google’s defining list of characteristics has the following properties: It deceivingly promises something which it never meets. It tricks the user to install itself, or some other program. It hides its principal motive under some other functions. It unexpectedly modifies the user’s system. It is very difficult to remove. … Read More

Digital India Myths: Online Shopping

Rachiyta JainCyber Security4 Comments

Online shopping is the latest trend these days. With inumerous  e-commerce websites coming up every other day it has become an addiction.  However there are several misconceptions camouflaged behind the comfort and the dangerous place as it still seems to many. To begin with, the most common mis-belief  is that  online shopping helps me “save a lot of time”.  Studies … Read More

Digital India Myths: Antivirus

Raj PagariyaCyber SecurityLeave a Comment

As long as we are connected to the Internet, we are surrounded by viruses. The fact that viruses exist and keep on infecting the computers is that they have not been entirely figured out yet, by anyone. In fact, it is pretty amusing that a lot of people believe in many myths and misconceptions about virus and other types of … Read More

What Is Cyber Exhaust? How To Reduce It?

Arpan SinhaCyber SecurityLeave a Comment

  Every thing that goes online, voluntarily or involuntarily, has some value and thus becomes a fair game for data mining. You wouldn’t even know, but the information about what you just shared on Facebook, or what answer you just upvoted on Quora gets stored on databases which is later used for flooding you with “things you may like.” The motive behind … Read More

Digital India Myths: Long Password = Secure Account

Nitish ChandanCyber Security3 Comments

Where the rest of the world is switching to two and three factor authentications, for a fact most of the Internet users in India are beginning to use passwords sanely. For security both online and offline, only password authentication is turning out to be a failure. After speaking to the masses living in the upcoming digital spaces of India and … Read More

Save Your Sensitive Information From Malicious INSIDERS!

Arpan SinhaCyber SecurityLeave a Comment

A sensitive information is always at a threat from outside hackers, and we’ve employed a number of methods and tools to prevent it. But there are people sitting inside the organization too, who pose a threat to this information. These people are called ‘insiders.’ An insider threat, according to WhatIs, is a malicious hacker who is an employee or officer of a … Read More