You are here: Home
114 items matching your search terms.
Filter the results.
Item type

New items since

Sort by relevance · date (newest first) · alphabetically
Hacker steals 17 million Zomato users’ data, briefly puts it on dark web
by Prasad Krishna published May 20, 2017 — filed under: , , ,
Records of 17 million users were stolen from online restaurant search platform Zomato, the company said in a blog post on Thursday.
Located in Internet Governance / News & Media
Experts stress on need for enhanced security
by Prasad Krishna published May 19, 2017 last modified May 20, 2017 06:13 AM — filed under: , ,
With more and more people falling prey to phishing scams, experts believe that lack of adequate security features in online payment systems will only increase the number of such cases in the coming days. While admitting that the rise in such crimes would be hard to stop or control, cyber security consultants also blame the lack of preparedness before taking the digital economy route as a cause for such problems.
Located in Internet Governance / News & Media
What’s Hard To Digest About The Zomato Hacking
by Prasad Krishna published May 19, 2017 — filed under: , ,
Yet another day, yet another major security breach. But, this time it’s not a presidential candidate in the U.S. or the U.K.’s National Health Service. Instead. it’s Zomato, the popular Indian online food delivery and restaurant search service.
Located in Internet Governance / News & Media
Hack exposes Zomato's weak protection of customer data, say Cyber experts
by Prasad Krishna published May 19, 2017 — filed under: , ,
Online restaurant aggregator says it will beef up security after 17 million user details were stolen.
Located in Internet Governance / News & Media
IT companies in Bengaluru on high alert over WannaCry ransomware
by Prasad Krishna published May 19, 2017 last modified May 19, 2017 09:05 AM — filed under: , ,
In the wake of the ransomware attack triggered by WannaCry virus, IT firms in Bengaluru are racing against time to updating their security systems. At some firms, employees have been asked to stay away from work for a few hours, while many other companies have declared holiday for a day or two for their employees.
Located in Internet Governance / News & Media
Dr. Madan M. Oberoi - Digital Forensics and Cyber Investigations (Delhi, April 07)
by Saikat Datta published Apr 04, 2017 last modified Apr 04, 2017 12:06 PM — filed under: , , ,
We are proud to announce that Dr. Madan M. Oberoi will be the speaker at the inaugural #[email protected]_india event at the Delhi office. These events, held on the first Friday of each month, will facilitate open and in-depth discussion and learning on topics crucial to our understanding of internet and society. The event will comprise of the speaker's presentation followed by an open discussion. If you are joining us, please RSVP at the soonest as we have only limited space in our office.
Located in Internet Governance / Events
Blog Entry 50p and Digital Payments Masterclass Learning - CIS
by Udbhav Tiwari published Feb 15, 2017 last modified Jun 15, 2017 12:29 PM — filed under: , , , , ,
Sunil Abraham, Saikat Dutta and Udbhav Tiwari from the CIS team attended 50p on the 24 and 25 of January 2017 in Bangalore, India. We had the following learnings from the event, which will shape our work in the digital finance and payments space in the future.
Located in Internet Governance
Don't dive headlong into money-making schemes on the internet
by Prasad Krishna published Feb 07, 2017 — filed under: ,
If you do fall victim to fraud, file your complaint at RBI's Sachet web site.
Located in Internet Governance / News & Media
Blog Entry Mapping of Sections in India’s MLAT Agreements
by Leilah Elmokadem and Saumyaa Naidu published Dec 31, 2016 — filed under: , , , , ,
This set of infographics by Leilah Elmokadem and Saumyaa Naidu maps out and compares the various sections that exist in the 39 MLATs (mutual legal assistance treaty) between India and other countries. An MLAT is an agreement between two or more countries, drafted for the purpose of gathering and exchanging information in an effort to enforce public or criminal laws.
Located in Internet Governance / Blog
Blog Entry Incident Response Requirements in Indian Law
by Vipul Kharbanda published Dec 28, 2016 last modified Dec 28, 2016 01:19 AM — filed under: , ,
Cyber incidents have serious consequences for societies, nations, and those who are victimised by them. The theft, exploitation, exposure or otherwise damage of private, financial, or other sensitive personal or commercial data and cyber attacks that damage computer systems are capable of causing lasting harm.
Located in Internet Governance / Blog