Blog

Blog

Anonymity Through Blind Signature Cryptosystem

Father of online anonymity David Chaum has brought in the revolutionary change in cryptography by introducing the concept of Blind signature. Among many of his notable contribution such as digi cash, new digital signature, anonymous communication, trust worthy voting system the ground concept lingers around maintaining the anonymity. Blind signature is that very concept which

Denial of Service Attack (DoS)

What is Denial of Service (DoS) attack? DoS is an attack that prevents legitimate users from accessing a particular resource making that resource unavailable. The resource can be a website, your own computer, email, database or any other information that you as a user are authorized to access. In DoS attacks on websites, that attacker

CLOUD FORENSIC AND CHALLENGES

CLOUD FORENSIC AND CHALLENGE Major companies and also traditional vendors are using cloud services since cloud services provide broader horizon of services to the clients. As cloud services is becoming more widespread is involvement in crime is likely to increase. Over the time, the use of digital evidence in criminal and civil matters will continue

AN INSIDE OF CYBER/ONLINE BULLYING

  by Arfiya Siddique “Replace cyber-bullying with cyber-believing. Let us build each other up instead of bringing others down. BELIEVE & BUILD” ― Janna Cachola Cyberbullying or Online Bullying is the use of technology to harass, threaten, embarrass  a target person by another individual or a group by the use of internet and digital devices.

Cyber Defamation

What is Cyber Defamation ? Defamation means damaging one’s reputation. When this is done on cyber space it is known as Cyber Defamation. Cyber defamation involves the use of cyber space to defame an individual, organization or entity, via emails, websites, messaging or broadcasting services etc. What are the threats ? The exposure, reach and

CLOUD FORENSICS AND IT’s CHALLENGES

CLOUD FORENSICS AND IT’s CHALLENGES Major companies and also traditional vendors are using cloud services since cloud services provide broader horizon of services to the clients. Cloud computing offers diverse benefits such as scalability, flexibility and readily available services. Flexibility benefit refers to the ability of using the computer resources you need when you need

Understanding Open Source Intelligence

Understanding Open Source  Intelligence OSINT is accessing  the information  which is available in public by applying different  search techniques.OSINT is nothing but simply a research which is carried out by specialized website, software solution and creative search query. In order to carry out crime investigation  applying right search approach to gather information available in public

Voyeurism

What is Voyeurism ? Voyeurism is the act of spying on people engaged in acts that are usually considered to be private in nature. People like to record and share some moments of their lives via technology. Unfortunately, a new form of cybercrime has emerged wherein hidden cameras capture the private moments of people’s lives

IT Act still needs to be observed

IT Act still needs to be observed

The Information Technology Act, 2000 is so far, the most effective act which deals with cybercrime and electronics in India. The Act 2000 comprise of 94 section, divided among 13 chapters and 4 schedule. The very Act applies to whole India and also to the citizens of other countries who found guilty in cybercrime which