This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More
Sunil Saini
-
All About Cyber Hacking
Computer hacking occurs when someone modifies computer hardware or software in a way that changes the manufacturer’s original intent. People who hack computers are known as hackers. Hackers think that…
-
Smartphone Security
Advances in technology now mean that mobile phones can provide the same services and features as desktop or laptop computers. These smartphones offer many new ways to communicate, capture and…
-
Guidelines For Using A Secure Password, Two-Factor Authentication, And Free Antivirus
Choosing the right password can be tough for many people, especially with so many accounts needing one these days. This can make it tricky to remember them all. Perhaps that’s…
-
Cybersecurity Initiatives In India
With the growth of the internet, reliance on computers has rapidly increased. The challenge is to protect critical information infrastructure, such as in civil aviation, railway passenger reservation systems, communication…
-
Some Recent Cyber Security Attacks
The spread of internet among the population is getting deeper day by day. This not only increases the scope of e-governance and e-commerce in the fields of healthcare, banking, power…
-
Investigation Of Cyber Crimes: Introduction To Cyber Forensic
What if someone has to face cyber attack? What next? The next step is to report cyber crime. But if a person comes in contact with cyber forensic principles, then…
-
Introduction To Cyber Space
Internet is one of the most important inventions of the 21st century that has influenced our lives. Today the Internet has crossed every obstacle and changed our way of talking,…
-
Governments Need To Implement Rules And Regulations Against Cyber Fraudsters And Scammers
Cyber fraud and online scams have become one of the fastest growing crimes worldwide. With a rapid increase in the use of digital transactions, e-commerce and social media, criminals are…
-
Major International Agencies And Organizations Against Cyber Crime
Major international agencies and organizations against cyber crime are global institutions, inter-government bodies and cooperative forums that work together to fight digital threats, online crimes and borders to fight internet-based…
-
Cybersecurity Techniques
There are many techniques that are used to protect against cyber attacks. In the next section, we will explore some of the most widely used methods to prevent and manage…
-
Types Of Cyber Crime
There are different types of cyber crime: 1. Cyber stalking: It is the act of stalking, harassing or threatening someone using the internet/computer as a medium. This is often done…
-
Malware And Its Types
Malware means “malicious software” and is designed to gain access to or install malicious software on a computer without the user’s consent. They perform unwanted actions on the host computer…
-
Introduction To Cyber Crime
The Internet was born around the 1960s of the 1980s where its access was limited to only a few scientists, researchers and defence. Internet user base has developed rapidly. Initially,…
-
Cyber Security/Crime
What is cyber crime? criminal activity Using Computer and Internet Break law and harm “Criminal activity done using computer and internet What are the characteristics of cyber crime Unlawful functions.…
-
Cyber Crime / Part -Time Job / Pongi Scheme Scam Through Fraud / Investment
Recently, there are many cyber crimes incidents in banks, in which criminals and fraudsters are resorting to various types of functioning to commit cyber crime through banking channels and payments…
-
General Financial Fraud And Scam
The information and suggestions given in this section are designed to help you become an informed investor and can help you, your family and your community identify general fraud and…
-
What Does Intruder Means
The person who achieves unauthorized access to the computer system or tries to achieve it is called intruder. Types of intruders:- There are three classes of intruders: Mascherder: A person…
-
Cyber Crime Against Women And Children
Technology is being successfully used to support and enhance the ability of personal teaching by making attractive, positive and effective teaching and making teaching more flexible, creative and accessible. Find…