Image
  • Home
  • Blog
  • Case Summaries
  • Services
    • Workshops
  • About
    • About Us
    • Objectives
    • Our Achievements
    • My Cyber Crime Story
    • Team

Technology. Law. Policy. You

For all things cyber

How to set up Google Authenticator for Facebook and Gmail

Nitish ChandanJanuary 31, 2015Cyber Security

Today you can find more threats online than you’d ever find in the real world, and the most common yet daunting one’s the fear of getting your Facebook account hacked. Two-factor authentication is one of the best things you can … Read More

Bypassing biometrics using fingerprint – just a photo away

Nitish ChandanDecember 29, 2014Cyber Security

Bypassing Biometrics using Fingerprints After claiming to have broken the Apple touch ID back in 2013, Chaos Computer Club (CCC) has come back with yet another video upload on YouTube. The video simply talks about using pictures of fingerprints, to … Read More

  • Page 5 of 5
  • ←
  • 1
  • ...
  • 3
  • 4
  • 5

Our recent posts

  • When what appears to be Cyber Squatting is not exactly Cyber Squatting
  • Analysing Smart Contracts on the Contours of Conventional Elements of a Contract
  • Runway Rewired: The Tech-Twist Revolution
  • Can NATO’s HEIST Project save the Internet?
  • Your Data, Your Rules: Understanding your rights under the draft DPDP Rules, 2025

Reach out to us for assistance!

Email: [email protected]
WhatsApp: +91 9340337396

In case of an offence against a woman/girl, for the sake of comfort, the victim/survivor may put forth a special request to get in touch with a female team member to assist her.

Guest Post Guidelines are available here. 

  • Home
  • Blog
  • Case Summaries
  • Services
    • Workshops
  • About
    • About Us
    • Objectives
    • Our Achievements
    • My Cyber Crime Story
    • Team