You are here: Home
114 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Don't dive headlong into money-making schemes on the internet
by Prasad Krishna published Feb 07, 2017 — filed under: ,
If you do fall victim to fraud, file your complaint at RBI's Sachet web site.
Located in Internet Governance / News & Media
WWW: The Hackers’ Haven
by Prasad Krishna published Feb 05, 2015 — filed under: ,
In an increasingly connected world, it pays to be careful when sharing personal information
Located in Internet Governance / News & Media
Blog Entry Developer team fixed vulnerabilities in Honorable PM's app and API
by Pranesh Prakash published Dec 04, 2016 — filed under: , , , , , , ,
The official app of Narendra Modi, the Indian Prime Minister, was found to contain a security flaw in 2015 that exposed millions of people's personal data. A few days ago a very similar flaw was reported again. This post by Bhavyanshu Parasher, who found the flaw and sought to get it fixed last year, explains the technical details behind the security vulnerability.
Located in Internet Governance / Blog
Blog Entry International Cooperation in Cybercrime: The Budapest Convention
by Vipul Kharbanda published Apr 29, 2019 — filed under: , , , , ,
In today’s increasingly digitized world where an increasing volume of information is being stored in the digital format, access to data generated by digital technologies and on digital platforms is important in solving crimes online and offline.
Located in Internet Governance / Blog
The thrill of saving India from cybercrime
by Prasad Krishna published Nov 21, 2016 — filed under: , ,
Geeks seize the chance to help the government, defence forces and banks draw up fences against tech crimes.
Located in Internet Governance / News & Media
Blog Entry Incident Response Requirements in Indian Law
by Vipul Kharbanda published Dec 28, 2016 last modified Dec 28, 2016 01:19 AM — filed under: , ,
Cyber incidents have serious consequences for societies, nations, and those who are victimised by them. The theft, exploitation, exposure or otherwise damage of private, financial, or other sensitive personal or commercial data and cyber attacks that damage computer systems are capable of causing lasting harm.
Located in Internet Governance / Blog
Blog Entry Mapping of Sections in India’s MLAT Agreements
by Leilah Elmokadem and Saumyaa Naidu published Dec 31, 2016 — filed under: , , , , ,
This set of infographics by Leilah Elmokadem and Saumyaa Naidu maps out and compares the various sections that exist in the 39 MLATs (mutual legal assistance treaty) between India and other countries. An MLAT is an agreement between two or more countries, drafted for the purpose of gathering and exchanging information in an effort to enforce public or criminal laws.
Located in Internet Governance / Blog
Blog Entry CIS Cybersecurity Series (Part 14) – Menaka Guruswamy
by Purba Sarkar published Jun 04, 2014 last modified Jul 21, 2014 10:39 AM — filed under: , ,
CIS interviews Menaka Guruswamy, lawyer at the Supreme Court of India, as part of the Cybersecurity Series.
Located in Internet Governance
Cyber 360
by Prasad Krishna published Sep 30, 2015 last modified Oct 14, 2015 02:22 AM — filed under: ,
Synergy Foundation organized the Cyber 360 conference in Bangalore on September 29 and 30, 2015. Sunil Abraham participated in the event.
Located in Internet Governance / News & Media
Cyber Security Policy Research
by Prasad Krishna published Oct 16, 2015 last modified Oct 16, 2015 04:47 PM — filed under: , ,
Tim Maurer will give a presentation on cybersecurity policy research at the Centre for Internet & Society's New Delhi office on October 18, 2015, from 2 p.m. to 5 p.m. Geetha Hariharan and Sunil Abraham will participate in this event.
Located in Internet Governance / Events