Blue Whale Challenge- What are we missing?

Nitish ChandanLaw

The recent blue whale challenge and the suicide of a 14 year old  is an alarm that just rang across the globe. Like many others, I know for a fact that this will be snoozed as well. For another day they … Read More

Sent an obscene photo on a WhatsApp group?

Nitish ChandanLaw

I’ve been struck with question about obscene content so many times that I feel writing about it is the best solution. I want to analyze this question on two different levels: Moral and Legal. We’ve come across cases where girls … Read More

Download Safe and avoid Ransomware

Nitish ChandanCyber Security

The topic that I’m writing about today is pretty basic yet the reason for most of the incidents that happen online. “Download Safe?”, People often ask me (mock, even at times) that how can you “safely download”. There’s this wide array … Read More

I Surf Secure Websites, Do You??

Rachiyta JainCyber Forensics, Cyber Security

website

Why does a website need a security certificate? Attackers often create malicious sites to gather your information. You should always be cautious while entering your information on any website. Security can be ensured by checking that the website content is … Read More

Everyday Mistakes We Make Online

Raj PagariyaCyber Security

When it comes to cyber security, attackers exploit the vulnerable areas of a target. The Cyber Blog India short-listed some mistakes we make on a daily basis. Downloading third-party apps:  Several people download paid apps from third-party app stores and … Read More

Unlock your Apps with the volume button

Nitish ChandanCyber Security

Who doesn’t like a new method to lock apps? Some tweaking and figiting with your phone is always fun, isn’t it? How about using a touch screen “touch” pattern (Mind you, no drawing of patterns) or a volume button combination pattern … Read More

Bleep: A More Secure Way to Message

Arpan SinhaCyber Security

Have you ever wondered if your text messages might be at risk? Text messages use server-based peer-to-peer messaging techniques, which means that the server’s database stores all your text messages, which can compromise your data and identity. Moreover, along with … Read More