Skip to main content

Posts

The Growing Threat: Cyberwarfare in the Shadows of Indo-Pak Tensions

  ‘Hillary can’t dance anymore’. The recent Indo-Pak aggression sparked a widespread discussion about the ‘Dance of The Hillary’ malware and the adversary's attempt at cyber warfare.   Understanding Cyberwarfare Cyberwarfare can be an effort undertaken by an enemy state using cyberspace to attack vital computer systems and disrupt information systems, networks, and online working in that state. Cyberwarfare is a new type of war that bolsters the position of the forward participant in the race of cyberspace and technology. Cyberwarfare has become the latest trend while fighting wars, as almost everything is present and dependent on the internet. Regardless of how physically strong a person may be, everyone is vulnerable on the internet—whether it's their data, financial information, or any other digital asset that could become a target for Cyber Extortion. As soon as the tussle between India and Pakistan began on May 8th, speculations about a cyberattack being launche...
Recent posts

New Frontiers of AI and Copyright Law: A Case Study of ANI VS Open AI

  Whenever these two words—copyright law and AI—are heard together, the very first corollary drawn is with respect to the challenge of harmonizing the former with the latter. Copyright law is, by effect, applicable to works of an author, but nowhere is AI mentioned as an author, so to give AI the cloak of an author and AI's work the protection of Copyright Law was the very first question for consideration. With the advancement of AI, such challenges have been identified that call for a significant overhaul in the current laws of Copyright and laws governing AI. While this challenge of harmony between work generated by Artificial Intelligence and Copyright Law is being attended to, a new challenge has come up calling for attention.   The Legal Battle In the backdrop of advancement, AI has used copyrighted content to train itself without the author's permission. ANI, Asian News International, a prominent news agency that has a big role in providing multi-media news to va...

Debunking AI: The Emerging Threat of Deepfake Cybercrimes

  Understanding AI and Deepfakes In 1997, a Video Rewrite Program was published. It generated new videos of people mouthing words they didn't originally say by matching phonemes from audio tracks with mouth images from existing footage. [1] This marked the first recognized occurrence of a deepfake. Deepfakes, which are artificial audio, photo, or video manipulations, are a significant concern due to their heavy reliance on machine learning, thereby establishing a strong link between AI and deepfakes. These manipulations can convincingly impersonate individuals, making it difficult to discern the fake from the real. AI and Deepfakes Powered Cybercrimes The resulting cybercrimes are huge and disturbing because AI-created deepfakes involve manipulating cyberinfrastructure through cyber means in cyberspace. 1.  Phishing Scams Phishing is the most common way of duping a person out of his money, and deepfakes have become increasingly unstoppable. Fraud in China used dee...

India's Cybersecurity Landscape: New Rules, Rising Threats, and Government Response

The recent interaction of the newly reappointed Union IT Minister with journalists has sparked significant interest within the IT Industry and among privacy enthusiasts. Ashwini Vaishnaw announced on June 15 that the MEITY will soon release the rules under the Digital Personal Data Protection (DPDP) Act, a development of immense significance for India's cybersecurity landscape. [1] 's Acts. It holds immense significance for the country, especially with the increasing number of internet users.  Of 2023 for public consultation. The rules hold immense significance for a country like India, with 751.5 million internet users at the commencement of 2024 [2] . With the continuous surge in internet usage across India, the volume of personal data shared online is also on the rise. This occurs either voluntarily, such as an individual providing personal information to a social media platform to access its services, or involuntarily, as a consequence of falling victim to a cybercrime inci...

International Data Transfers under GDPR

One goal of the General Data Protection Regulation (GDPR) is to facilitate the free movement of personal data among member states under shared data protection principles. However, the Regulation also acknowledges that transferring personal data to non-member countries demands special attention. Chapter V of GDPR specifically talks about the transfers of personal data to third countries only when:- The third country must ensure an adequate level of protection for personal data as determined by the European Commission. If such protection is not in place, the data controller or processor must provide appropriate safeguards, ensuring enforceable rights and effective legal remedies for data subjects. Alternatively, if neither adequate protection nor appropriate safeguards are present, the transfer of personal data must fall within one of the specific derogations outlined in the Regulation. To better understand the concept of International Data Transfer, we first need to understand what the ...