You are here: Home
2975 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Designing a Human Rights Impact Assessment for ICANN’s Policy Development Processes
by Collin Kure, Akriti Bopanna and Austin Ruckstuhl published Oct 03, 2019 last modified Oct 03, 2019 02:43 PM — filed under: ,
As co-chairs of Cross Community Working Party on Human Rights (CCWP-HR) at International Corporation of Names and Numbers (ICANN), Akriti Bopanna and Collin Kurre executed a Human Rights Impact Assessment for ICANN's processes. It was the first time such an experiment was conducted, and unique because of being a multi-stakeholder attempt.
Located in Internet Governance / Blog
Blog Entry DesiSec: Cybersecurity and Civil Society in India
by Laird Brown published Jun 20, 2015 last modified Jun 29, 2015 04:25 PM — filed under: , , , , , , , , ,
As part of its project on mapping cyber security actors in South Asia and South East Asia, the Centre for Internet & Society conducted a series of interviews with cyber security actors. The interviews were compiled and edited into one documentary. The film produced by Purba Sarkar, edited by Aaron Joseph, and directed by Oxblood Ruffin features Malavika Jayaram, Nitin Pai, Namita Malhotra, Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad.
Located in Internet Governance / Blog
DesiSec: Episode 1 - Film Release and Screening
by Purba Sarkar published Nov 28, 2013 last modified Dec 17, 2013 08:13 AM — filed under: , , , , , , ,
The Centre for Internet and Society is pleased to to announce the release of the first documentary film on cybersecurity in India - DesiSec. We hope you can join us for a special screening of the first episode of DesiSec, on 11th December, at CIS!
Located in Internet Governance
Despite apex court order, IOC proceeds with Aadhaar-linked DBT
by Prasad Krishna published Jan 06, 2014 last modified Jan 31, 2014 06:50 AM — filed under: , ,
Once DBT starts, there is no other method to avail of subsidy: IOC official.
Located in News & Media
Despite SC order, thousands booked under scrapped Sec 66A of IT Act
by Prasad Krishna published Sep 07, 2016 — filed under: ,
College student Danish Mohammed’s arrest this March under the scrapped Section 66A of the Information Technology Act for allegedly sharing a morphed picture of RSS chief Mohan Bhagwat wasn’t an exception.
Located in Internet Governance / News & Media
Details emerge on government blockade of websites
by Prasad Krishna published Aug 28, 2012 — filed under: , , , , ,
Facebook pages, Twitter handles among 300 unique web addresses blocked by ISPs.
Located in News & Media
Details of 135 million Aadhaar card holders may have leaked, claims CIS report
by Prasad Krishna published May 02, 2017 last modified May 20, 2017 08:42 AM — filed under: , ,
The disclosure came as part of a CIS report titled ‘Information Security Practices of Aadhaar (or lack thereof): A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information’.
Located in Internet Governance / News & Media
Developer releases WannaCry key-recovery tool for Windows XP
by Prasad Krishna published May 20, 2017 last modified Jun 07, 2017 01:02 AM — filed under:
However, a cyber security expert working with the Centre for Internet and Society, Udbhav Tiwari working on vulnerabilities such as these, said as most ATMs in the country especially of the public-sector banks run on outdated operating systems, or are not updated regularly, they can be easily compromised. Unfortunately, however, a new variant of the program is already in the wild.
Located in Internet Governance / News & Media
Blog Entry Developer team fixed vulnerabilities in Honorable PM's app and API
by Pranesh Prakash published Dec 04, 2016 — filed under: , , , , , , ,
The official app of Narendra Modi, the Indian Prime Minister, was found to contain a security flaw in 2015 that exposed millions of people's personal data. A few days ago a very similar flaw was reported again. This post by Bhavyanshu Parasher, who found the flaw and sought to get it fixed last year, explains the technical details behind the security vulnerability.
Located in Internet Governance / Blog
Developing location-based services
by Prasad Krishna published Feb 28, 2012 — filed under:
For mapping enthusiasts, geeks and neogeographers in Bangalore, here's something to look forward to. Cartonama, a workshop that offers intensive hands-on training on tools to build and manage location data for location-based services, will be held in the city on March 2 and 3.
Located in News & Media