Car Software: Rethinking Software Architecture and provisions of Over-The-Air software updates solution

Cyber Secure India
For a long time now, the engine of a car was the epicentre of innovations and R & D. The advent of the digital era today has made manufactures...
Read More

The Virtual SIM: The Pros and Cons and its New Headache for Cyber Experts and Security Agencies

Cyber Secure India
From the technology standpoint, the deployment is very simple as well. It seems likely that eSIMs are the way the mobile device industry is moving. ...
Read More

Cyber Safety in the COVID 19 Pandemic era for Parents and Students

cyber secure india
The interaction of the Child with the Parent or Guardians is now a need that is more than ever. This is the time for parents and guardians to have a...
Read More

Arogya Setu App with new feature: Can help institutions, offices and companies, through API to be integrated into their own systems and check for real-time Covid-19 infection status of their subscribers or employees

cyber secure india
This API will acts as a bridge for two applications to be able to talk to each other and exchange information. The Aarogya Setu App, has been in us...
Read More

COVID-19 brings new Cyber-Security threats to Students Online: Curbing Cyber Threats in Online Learning

cyber secure india
Cyber Secure India, proposes to suggest some basic actions that need to be adhered to ensure a safe experience both for students and parents while ad...
Read More

Are we ready for the Taidoor RAT Cyber Attack proliferation into Indian Cyber Space?

Are we read for the Taidoor RAT Cyber Attack proliferation into Indian Cyber Space?
Are we read for the Taidoor RAT Cyber Attack proliferation into Indian Cyber Space? The ‘Taidoor’ virus has been dominant on the Global Cyber Space...
Read More

Cyber Security Proposal for the New Indian Railway Automatic Train Protection (ATP) Systems

Cyber Security Proposal for the New Indian Railway Automatic Train Protection (ATP) Systems
Cyber Security Proposal for the New Indian Railway Automatic Train Protection (ATP) Systems The so called Cyber Cold War has been raging globally...
Read More

Its easy to fall prey to ‘Wangiri’ or the ‘One Ring and Drop’ form of Cyber Attack: 5 (five) Action Point to Protect against the Scam

Cyber Secure India
‘Wangiri’ or the ‘One Ring and Drop’ form of Cyber Attack on the rise. "Wangiri" is Japanese for "one ring and drop" is the new form of Cyber Scam,...
Read More

Is there a SNAKE under the hood of Honda: EKANS Malware is a targeted Industrial Control Systems (ICS) Ransomware

Cyber Secure India
Honda Motors under Cyber Attack. In a delayed communication on 09 June 2020, the Japanese Automobile Giant, Honda Motor Company Headquarters, pass ...
Read More

NPCI (National Payments Corporation of India) Issues Denial of claims that Private Details of 73 Lakh Indians stands exposed in CSC BHIM Data Leak or Breach: A Critical Analysis

Cyber Secure India
NPCI (National Payments Corporation of India) Issues Denial of claims that Private Details of 73 Lakh Indians stands exposed in CSC BHIM Data Leak or...
Read More

Cyberbullying in India: present provisions under the law and the need for a fresh look to make Cyberbullying more deterrent under the law

Cyber Secure India
[Image: Hana Kimura courtesy Instagram (image used with no prejudice)] On 24 May 2020, the Internet world woke to one of the worst news of the year...
Read More

The Renewed Aviation Experience Post CORONA Lockdown: What is expected from the Passengers, Government and the IT and ICT Enablers

cyber secure india
The Aviation Industry is back in action, but more needs to be done from the IT and ICT perspective for profitability and security. Aviation has be...
Read More

The post-COVID-19 pandemic Cyber Security Evangelism: why the virus is an opportunity to initiate and sustain Cyber Security measures

cyber secure india
It is also obvious that Individuals and Enterprises have been more vulnerable, as the workforce and individuals have been working from home through d...
Read More

The Lesson We Are Learning From Zoom: Are we able to do away with it and cling to an alternative

cyber secure india
The popular app Zoom offers the simplest path to videoconferencing. The app has been put to extensive uses during this period when the world is under...
Read More

Are you paying an EMI for a loan taken and planning to take the benefit of the three-month moratorium announced by the Reserve Bank of India – Beware! Deferring of EMIs doesn’t need OTP sharing

cyber secure india
Phishers use RBI loan leeway to defraud customers. Since the advent of the COVID-19 threat, nations have resorted to a complete ‘Lockdown’ and have...
Read More

Google at the rescue again to assist the fight against COVID-19: What is the help extended or can be taken from Google

Cyber Secure India
Indian government officially launches its coronavirus tracking app, Google will also help in its contribution for the fight against COVID-19 Pandemic...
Read More

Is there a need to also constitute a Cyber Response Team apart from the eleven Empowered Groups under the Disaster Management Act Constituted to address the COVID -19 Pandemic?

Cyber Secure India
Cyber Response Team apart from the eleven Empowered Groups under the Disaster Management Act during the COVID -19 threat in India. The media is ful...
Read More

China fought the Corona outbreak using Information Technology, Big Data, High-Tech Health Surveillance and Artificial Intelligence to achieve the desired results in record time

Cyber Secure India
How China is using technology to fight coronavirus. Apart from the dedicated Health Workers, Medicines, Medical Equipments and the Enforcement Agen...
Read More

Criminal on-full throttle with Cybercrime on the rise during Coronavirus Pandemic and they are also capitalising on COVID-19 fear

CYBER SECURE INDIA
Since the outbreak of the COVID-19 and the declaration of the same as a global pandemic, the Cyber World has noticed a rise in Cybercrime. Since th...
Read More

If you find an interesting coronavirus maps on whatsapp or as an email attachment click with caution as this may be a Cyber Attack

cyber secure india
How hackers are using coronavirus maps to infect your computers. As reported by Cyber Experts, it has been observed that the hackers have resorted ...
Read More

Zorin OS 15.2 Linux distribution is here, the open source Operating System is now available for download and use

New OS of Linux Kernel Released Linux, computer Operating System (OS) created in the early 1990s by Finnish software engineer Linus Torvalds and th...
Read More

It’s easy as 1,2,3 to avoid being a victim of SIM swap fraud: defend your phone against SIM swap attacks

It’s easy as 1,2,3 to avoid being a victim of SIM swap fraud In a recent news, it was reported by the Primitive founding Partner, Dovey Wan, Zhouji...
Read More

Kali Linux: A new flavor and additional tools as part of release 2020.1

Kali Linux 2020.1 released: New tools, Kali NetHunter rootless, and more. For long the aspect of Advanced Penetration Testing and Security Auditing...
Read More

Cyber Tipline monitoring facility under the aegis of Indian National Crime Records Bureau (NCRB) that provides reporting system for online exploitation of children is now available in India

cyber secure india
Cyber Tipline monitoring facility under the aegis of Indian National Crime Records Bureau (NCRB) that provides reporting system for online exploitati...
Read More

A National Web Portal to search for missing persons record and check police record of vehicle and generate No-objection Certificate (NOC) of the vehicle concerned launched

cyber secure india
A National Web Portal to search for missing persons record and check police record of vehicle and generate No-objection Certificate of the vehicle co...
Read More

Telangana takes the lead with the establishment of the Center of Excellence in Cybersecurity

National Cyber Security (NCS) Coordinator Lieutenant General Rajesh Pant inaugurated the first Cyber-security Centre of Excellence on 28 January 202...
Read More

Amendments to Protection of Children from Sexual Offences Act, 2012 (POCSO Act) and Information Technology Act, 2000 (IT Act) on the way to cater for stringent laws against child abuse and child pornography

Amendments to Protection of Children from Sexual Offences Act, 2012 (POCSO Act) and Information Technology Act, 2000 (IT Act) on the way to cater for...
Read More

Mastercard unveils its new Intelligence and Cyber Centre in Vancouver, Canada

Mastercard unveils its new Intelligence and Cyber Centre in Vancouver, Canada. Amex, Visa and Mastercard are the most popular payment networks...
Read More

If your child is less than 13 years and is a registered user of WhatsApp: Beware the child is violating laws

If your child is less than 13 years and is a registered user of WhatsApp, the child is violating laws. In India alone, “WhatsApp” had reached over ...
Read More

Microsoft Application Inspector is now an Open Source Tool: Check open source components for unwanted features

Microsoft had developed software that could test open source software to provide its customers high-quality software and services. Recognising the in...
Read More

Your next Samsung Smart TV will be even smarter: Introduces a new privacy app called ‘Privacy Choices’ that will allow users to take control of their privacy

Samsung announces 'Privacy Choices' app for its Smart TVs. Many Smart TV owners and consultants of Security have voiced the concern with regard to ...
Read More

Formjacking: How Indian Users are falling victim to this new form of Cyber Attack in the present day Digital Payment Era

Formjacking: How Indian Users are falling victim to this new form of Cyber Attack in the present day Digital Payment Era. India is presently among ...
Read More

India establishes a Seven (7) pronged scheme to fight cyber crime with the inauguration of Indian Cyber Crime Coordination Centre (I4C) and launching of the National Cyber Crime Reporting Portal

India establishes a Seven (7) pronged scheme to fight cyber crime with the inauguration of Indian Cyber Crime Coordination Centre (I4C) and launching...
Read More

5G Technology to power not only Smartphones but Tabs, Laptops, connecting Machine-to-Machine and Internet of Things (IoT) devices

5G Technology to power not only Smartphones but Tabs, Laptops, connecting Machine-to-Machine and Internet of Things (IoT) devices. The advent of th...
Read More

U.S. Passes Legislation to Control the Sale of Cyber Tools Abroad: It is time that India certify and promulgate its own indigenous Cyber Tools

It is time that India certify and promulgate its own indigenous Cyber Tools. The U.S. has reported to have passed a new legislation that will requ...
Read More

The Cyber Consequences of Killing Iranian General Qassim Suleimani: When Two Bulls Fight The Grass Suffers; is India also under threat of Cyber Attack proliferation

When Two Bulls Fight The Grass Suffers, is India also under threat of Cyber Attack proliferation. The Pentagon, USA, confirmed on 02 January 2020, ...
Read More

Government of India MEA establishes “New, Emerging and Strategic Technologies” (NEST) Division: an entity to manage India’s technology policy, coordinate domestic stakeholders, technology dealings with external agencies & promulgate national security aspects

The Government of India has announced the setting up of the “New, Emerging and Strategic Technologies” (NEST) Division under the MEA on Wednesda...
Read More

Indian Government Approves Huawei to Participate in 5G Trials and did not gone the US way: Security is still a Concern

Indian Government Approves Huawei to Participate in 5G Trials and not gone the US way: Security is still a Concern. In a recent announcement by the...
Read More

Be Cyber Secure in year 2020: New Technology Trends that will dominate year 2020

We at CYBER SECURE INDIA evaluate the top Ten (10) Technology Trends and also contemplate the envisaged Security Measures that will dominate the year...
Read More

From 01 January 2020 SBI customers will require an OTP to perform Cash Withdrawals above Rs 10,000 at SBI ATMs: National Financial Switch (NFS) Infrastructure and Design being inadequate, may allow other ATMs to still dispense cash without OTP

State Bank of India (SBI) customer are advised to carry their mobile/smartphone, for cash withdrawal at ATMs, as they will receive an OTP on the Regi...
Read More

Why “Free” public Wi-Fi should be used with caution? Can be a new playground for cyber criminals

We at CYBER SECURE INDIA evaluate the risks of using public WiFi and suggest strategies to use the free service while being secure and not being a vi...
Read More

Andhra Pradesh Assembly unanimously passes DISHA Act-2019: Its Highlights and how Information Technology can facilitate its Correct Implementation

The Andhra Pradesh Disha Bill, 2019 (Andhra Pradesh Criminal Law (Amendment) Act 2019). The Andhra Pradesh (AP) State Government has brought in a ...
Read More

Andhra Pradesh Chief Minister Shri Jaganmohan Reddy moots ‘three capital cities’ idea: Evaluating ‘Digitally Viable’ of this Concept

The Andhra Proposal suggests Amaravati as the Legislative Capital, Visakhapatnam as the Executive Capital and Kurnool as the Judicial Capitals. Ch...
Read More

Is it time for a Home-Grown secure messaging & calling app for India: Whatsapp breach reported in India

WhatsApp Breach in India: is it time for a Home-Grown secure messaging & calling apps
WhatsApp Breach in India: is it time for a Home-Grown secure messaging & calling apps In India, we have now changed the outlook towards inter-p...
Read More

10 Point Formula that will help you avoid being a victim of Cyber Crime

10 Point Formula from CYBER SECURE INDIA, that will help your against being a victim of cyber crime. India has reported 3.13 lakh Cyber Security in...
Read More

The Citizenship (Amendment) Bill, 2016: A challenge for implementation form a Digital Perspective

The Implementation of The Citizenship (Amendment) Bill, 2016, is a Digital Challenge, and requires a robust, foolproof and secure IT system and infra...
Read More

The Need for India to have an Indigenous Operating System for PCs and Smart Phones as also Hardware- China to phase out Foreign Hardware and Software by year 2022

Should India also tow-the-line to ensure its Digital Sovereignty, like the Chinese Ban on Foreign Hardware and Software by year 2020. In a recent a...
Read More

Is the Indian Government considering a Ban on Whatsapp End-To-End Encryption Feature: A relook at the provisions of Personal Data Protection Bill?

WhatsApp End-To-End Encryption, is it here to stay of the Government is looking for a Ban. There is no single solution to Privacy or Security. Ther...
Read More

The Booming Industry of ‘Cybercrime as a Service’ amidst the present severe Indian Economy slowdown

India's Booming "Cybercrime as a Service" Industry India’s dream of achieving a over USD 5 Trillion economy by the year 2024-25 seems implausible a...
Read More

The Union Cabinet of India approves the proposed Personal Data Protection Bill: Have we settled down for Data Localisation rather than Data Sovereignty

India's Personal Data Protection Bill 2018 will be implemented soon There are reports on 04 December 2019, in the media that the Union Cabinet of I...
Read More

India’s One Nation One Ration Card Scheme: An IT enabler for the Hungry Stomach

One Nation One Ration Card to be effective nationwide from June 2020 The Government of India, has again announced that the “One Nation One Ration C...
Read More

Government of India requests its Citizen to provide Feedback and Comments on National Cyber Security Strategy Year 2020

INDIA NATIONAL CYBER SECURITY STRATEGY 2020 Government of India had first come out with a National Cyber Security Policy in the year 2013. The poli...
Read More

Vishing Attack on Mobile Phone Users: The quicker and easy way to execute a financial theft in India on Smartphone Users

A Vishing Attack is much easier on a Smartphone user and can be an easy victim of financial fraud Many Indians today, perceive that their Smart Pho...
Read More

The FASTag Project in India: A long way to go with many Cyber and Physical threats to plug

Cyber Secure India evaluates the Advantages and Threats to the FASTag Project On 01 December 2019, India will migrate to the Electronic Toll Collec...
Read More

Hackers are using remote-access software to carry out the “Live Clonejack Attack”: You will find your e-wallets and net-banking accounts being drained out

Attackers install Remote Access software for “Live Clonejack Attack” on Smartphone/Devices to take control of e-wallets and net-banking accounts of ...
Read More

It is no more just Jamtara, the Government of India will need to look at curtailing the spread of e-crime corridor to safeguard its citizens from Fiscal Fraud

Spread of e-crime corridor beyond Jamtara, a Parliament Question Most of us at some point of time, may have received calls from fraudsters with ca...
Read More

After a Delay of Two Years the Cyber Crime Data of 2017 has been published by National Crime Records Bureau of India: A jump of 77 percent from previous year

NCRB Cyber Crime Report 2017 shows an increase of 77 percent in reported offences
NCRB Cyber Crime Report 2017 shows an increase of 77 percent in reported offences The Cyber Crime Cases in India On 21 October 2019, the National C...
Read More

The Small Devil can result in an unwarranted Juice Jacking Attack on your Smart Phone: Avoid the USB Charging Hubs at Public Places for Charging

laptop usb to a public charging hub
The Small Devil can result in an unwarranted Juice Jacking Attack on your Smart Phone: Avoid the USB Charging Hubs at Public Places for Charging Th...
Read More

India’s Fresh Call against Global Cyberspace Terrorism

India’s concern against cyber terrorism and use of technology for terrorism was again voiced by the External Affairs Minister of India, Dr Subrahmanya...
Read More

Security Vulnerability on your Android Phone: Opens Door to Privilege Escalation Attack

Security Vulnerability on your Android Phone: Opens Door to Privilege Escalation Attack
It is time to update your Android device, with the newly released Android patch provided in the last week of October 2019. It is during the same time ...
Read More

Doxxing and Swatting: India’s New Cyber Attack Vector and the Opening of a New Front

Doxxing and Swatting: India’s New Cyber Attack Vector and the Opening of a New Front
Introduction In the last week of October 2019, all the news media had carried the news pertaining online sale of over 1.3 million Indian credit and de...
Read More