Home / Posts tagged "WhatsApp"

WhatsApp

Are You A WhatsApp User? National Payments Corporation of India (NPCI) Has Provided Approval for Additional Six (06) Crore Users Unified Payments Interface (UPI) For WhatsApp

Cyber Secure India
NPCI and WhatsApp to facilitate "WhatsApp Pay" In a media release on 13 April 2022, National Payments Corporation of India (NPCI) has announced an ...
Read More

If you find an interesting coronavirus maps on whatsapp or as an email attachment click with caution as this may be a Cyber Attack

cyber secure india
How hackers are using coronavirus maps to infect your computers. As reported by Cyber Experts, it has been observed that the hackers have resorted ...
Read More

Telangana takes the lead with the establishment of the Center of Excellence in Cybersecurity

National Cyber Security (NCS) Coordinator Lieutenant General Rajesh Pant inaugurated the first Cyber-security Centre of Excellence on 28 January 202...
Read More

If your child is less than 13 years and is a registered user of WhatsApp: Beware the child is violating laws

If your child is less than 13 years and is a registered user of WhatsApp, the child is violating laws. In India alone, “WhatsApp” had reached over ...
Read More

Is it time for a Home-Grown secure messaging & calling app for India: Whatsapp breach reported in India

WhatsApp Breach in India: is it time for a Home-Grown secure messaging & calling apps
WhatsApp Breach in India: is it time for a Home-Grown secure messaging & calling apps In India, we have now changed the outlook towards inter-p...
Read More

Is the Indian Government considering a Ban on Whatsapp End-To-End Encryption Feature: A relook at the provisions of Personal Data Protection Bill?

WhatsApp End-To-End Encryption, is it here to stay of the Government is looking for a Ban. There is no single solution to Privacy or Security. Ther...
Read More

Hackers are using remote-access software to carry out the “Live Clonejack Attack”: You will find your e-wallets and net-banking accounts being drained out

Attackers install Remote Access software for “Live Clonejack Attack” on Smartphone/Devices to take control of e-wallets and net-banking accounts of ...
Read More
Top