Skip to main content

Posts

Electronic Evidence in the Blockchain Era

  “Absence of evidence is not evidence of absence- Carl Sagan” With the developing years, unanticipated innovation has occurred and with developing innovation fraudsters are discovering advanced approaches to carry out criminal acts with new strategies and using the cloak of anonymity. With the rising cyber-crimes across the globe, digital forensics and digital evidence have become the need of great importance. Any place you go, you leave footprints is a well-founded fact in the world of cyberspace commonly known as ‘digital footprints' as timestamps, metadata and so forth which is very important to serve the principle of natural justice. We use digital evidence such as CCTV footage or any online transaction history detail, etc. all these are highly valuable in a criminal investigation and can at as a piece of deciding evidence in the court of law. But ever thought of risks involved in it via managing these evidence though physical medium says hard disks and ever imagined what
Recent posts

Need for Anti-Spam Laws in India: Comparative Analysis

  Introduction Spam is unsolicited, usually commercial messages (such as e-mails, text messages, or internet postings) sent to a large number of recipients or posted in a large number of places. The spamming activity is usually considered to cause a lot of nuisance and mental annoyance. Spamming is carried out with the help of an electronic mechanism to send unsolicited messages and advertisements. It can also be termed “An unsolicited e-mail” from which the sender attempts to gain an advantage. "India is the seventh biggest spammer in the world 7.8 billion spam e-mails sent in past 24 hours". It’s high time that India has to come up with its legislation to curb the activity.  The author will also argue the need for anti-spam legislation in India with a comparative analysis of various other jurisdictions. Why is it a concern? The term spam emerged due to the spread of unsolicited commercial messages in the internet space. The main challenge is that it has varied charact

Click Bait Attacks

  Cyber Attacks are of various types like Malware, Sextortion, Phishing, Password breaches etc. Click Bait Attacks are one of such attacks which can lead to cyber threats. Meaning of Click Bait Attacks In Click Bait Attack, the user is lead or lured to click a link with exciting offers or promotions or impossibly possible advantages. So, when the users switched to different pages from what they are using currently, these pages ask users to input their personal data’s so that they can install viruses in users’ devices just by clicking them that can be highly damaging and malicious. With these attacks, the attackers or criminals can get access to users’ personal data that was kept safe in the device.  Few examples of Click Bait Attacks or how they lure the user are: How to Win 1 crore Rs in just 5 mins. Click and win Latest iPhone. Forward this message to 20 groups and win something etc. These are some messages through which the majority of the people are attracted to click on them and t

The need of Intellectual Property Protection For Indigenous Cultures & Art Forms

  For a long time, India has been called a melting pot of different cultures and traditions, a venerated designation in its character as the largest functioning democracy in the world with the longest written constitution. Indigenous culture, tribal communities their traditions and culture persisting centuries of war and colonization have been part of the country’s long history. However, at the age of growing awareness and expanding cyber market spaces, what protections do these antique and sacred cultures have will require to keep themselves alive raised the biggest question. The Current state of IPR and Traditional knowledge In a current time where development in technology has been occurring at breakneck speeds, mechanisms for the exploitation of such indigenous genetic knowledge, art forms and folklore have also widened their scope, mainly in the areas of Information Technology and bioscience. An example of such exploitations is the results of Biopiracy, which is the practice of e

Rise of Information Technology: A Fall of Democracy

  Information Technology has advanced leaps and bounds, to an extent that it has been a part and parcel of day-to-day life. Social media is one of the digital platforms which has seeped into everyone’s life with no exception. Facebook tops among the social media users where 2.85 billion users are active in a month around the globe. There is an upsurge in the breach of user’s personal data harvested through social media platforms in furtherance of political, financial or personal interest. Manipulation of voter’s choices by the political parties as well as external entities is a new trend in democratic countries.  Democracy –A cladded autocracy!  Today’s democratic leaders are envisioned to focus on ‘ individual utility ’ rather than working for the majority. Plato one of the early philosophers opined that those who are good at winning elections are the ones to dominate the democratic institutions and this seems to be true in today’s democracy. The Constitution of democratic countries

Usage of Toolkit in Cyber Crimes

  A toolkit is a tool or route for committing crimes. In many circumstances, cybercriminals utilise toolkits including malware assaults. In this situation, search engines are infected. Toolkits also support cybercriminals through automation of procedures like the building of websites. The XRumer, ZeuS, and UMaxSoft Doorway Generator are some examples of toolkits. Toolkits should concern organisations as keywords for websites may be produced. This puts firms whose data are available on their websites at risk. Spam spreading toolkits are also utilised. It was used to disseminate it via Twitter, for example. By implementing the latest updates on their software, organisations should safeguard themselves. Another approach of defending an organisation against fraud is to avoid supplying information without confirming the provenance of an application. Moreover, companies should watch out so that unsecured email messages, infected software and other harmful actions are not answered. The worldw

How Cyber Hygiene is equivalent to Personal Hygiene?

  Personal hygiene is necessary for the human body same so cyber hygiene. It is a cyber security practice to keep your software and hardware safe and protected from any kind of cyber-attack. Cyber hygiene is also an essential part to safeguard our systems from any kind of breach or malware attacks. The main objective behind cyber hygiene is to organize and prevent the system’s sensitive data from any kind of attack or theft. Why is Cyber Hygiene Important? Firstly, it is our duty to maintain our system and keep it in good working condition by protecting it from external viruses and secondly, like our health is in our hands, similarly, we can secure our computers and it is possible for us to prevent cybercrime causing by security breaches. Installing malware, or recovering personal data by creating a habit centred around cyber hygiene & considered as best practice. Nowadays, many big companies have hired cyber security professionals to prevent their system’s data from breach, but a