Blog Archives

SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases

“We have broken SHA-1 in practice,” and “SHAttered attack” can be used to compromise anything that relies on SHA-1, says a group of researchers from the CWI Research centres in Amsterdam and Google. The information available on https://shattered.io/  also enables … Continue reading

More Galleries | Leave a comment

Restriction on WhatsApp Group in J&K- An Another Failed Attempt To Regulate The Internet

The philosophy of Prof. Lawrence Lessing regarding the control of internet through its code and ‘the declaration of independence of cyberspace’ by John Perry Barlaw are in interlocked stage. The movement of the governance of internet is slowly and slowly … Continue reading

More Galleries | Leave a comment

How To Become A Cyber Lawyer

With the evaluation of e-governance and society moving towards digitization, the Information Technology has penetrated in every sphere of life and the profession of law, being no exception, is immensely impacted by it. The proliferation comprises of e-Business, Digital Communication, … Continue reading

More Galleries | 8 Comments

PREPARING FOR CISSP EXAM

Neeraj Aarora CISSP, CISA, CFCE, FCMA, CFE   Clearing CISSP exam in first attempt made me a winner in eyes of everyone…. my friends and other acquaintances on various social media sites like face book, LinkedIn and whatsApp started applauding … Continue reading

More Galleries | 6 Comments

ONGC 197 CR. FRAUD: HACKER USING APT FOR CYBERHEIST

Introduction International business trade is facing an unprecedented threat of frauds from organized crime, particularly, an intelligent, knowledgeable group of hackers and recent fraud with ONGC is one of the crime involving huge amount of Rs. 197 Cr. Such scams … Continue reading

More Galleries | 2 Comments