Disclaimer: The views/opinions/arguments expressed here are solely those of the author and contributors, as named therein, in their private capacity and do not in any way represent the views of any entity of the Indian Government or any private organization(s) they are associated with. The views/opinions/arguments of the contributors are re-produced here with due permission. […]
What you need to know about XKeyScore: NSA’s Mass Surveillance Tool
In this video, we give you a peek into the world’s supreme intelligence gathering tool, XKeyScore. Developed by the NSA, XKeyScore has been widely criticized ever since it’s existence became known through the documents leaked by Edward Snowden in 2013. Watch the video till the end to know why. Uday MittalUday Mittal is […]
7 Ways to Cover Your Device’s Camera
Have you ever wondered that somebody might be watching you through your laptop’s webcam or smartphone’s camera? Or that while your laptop or smartphone stays on, in your bedroom, somebody might be recording your each and every act? Cracking into device cameras has been around ever since they were commercialized. Most of the devices we […]
Hamazing 5: Hackers Who Inspire
Who are hackers? Contrary to the popular belief, hackers are curious souls interested in knowing the mechanics of things around them. With the advent of computers, a new generation of hackers were born. These are the people who willingly burn the midnight oil to grasp the nitty-gritty details of the white box (or whatever color […]
7 Cardinal Sins: Password Edition
On a normal day, an average computer user is required to input password to at least five different places (Windows, e-mail, social media, online banking, e-commerce). More often than not these passwords are same and are hardly changed once set. Passwords are the most abused and vulnerable security technology yet they can’t be replaced. They could […]
Hacking the Internet of Things: How Easy Is It?
One of the buzzword in the tech world these days is the Internet of Things and the idea behind it is that in near future all of our home appliances (among other things) will be connected to the internet and controlled by it. We will be able to set our toasters from our smartphones. Our […]
Safety Tips for Your Mobile Devices
That smartphone in your pocket – or your tablet or laptop – contains significant information about you and your friends and family – contact numbers, photos, location and more. Your mobile devices need to be protected. Take the following security precautions and enjoy the conveniences of technology with peace of mind while you are on […]
Updated: Comments on Draft National Encryption Policy
Imagine, the Government issues a policy which states that you may lock your house but you have to leave the keys outside the house, at all times. The Government appointed officials may then at any time visit your house to see what’s going on inside. You have no choice but to comply. What would your […]
Cyber Security Awareness 2.0
When dealing with Cyber Security, it is often said that people are the weakest links. One vulnerable and gullible employee is all it takes to infiltrate into the company network. However, cyber security managers need to ask themselves this question, are people really the problem here? The challenge for cyber security managers is that they […]
Online Safety Tips for Golden Agers
Recently, I came across a question on Quora wherein a gentleman, claiming to be 80 years of age, had asked for some advice on how to learn server side languages. In fact, he aimed to beat Mark Zuckerberg and Jack Dorsy before he departs for good. Frankly, I was a bit surprised by this because I […]