Blog Archives

Forensic Audit: Preventing the Abuse of Insolvency Code

The significance of forensic audit has gained paramount importance as the corporate debtors are moving for restructuring and bidding themselves for stressed assets. The concern has gained momentum particularly after the Essar Steel & Bhushan Steel has undergone Insolvency process … Continue reading

More Galleries | 1 Comment

SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases

“We have broken SHA-1 in practice,” and “SHAttered attack” can be used to compromise anything that relies on SHA-1, says a group of researchers from the CWI Research centres in Amsterdam and Google. The information available on https://shattered.io/  also enables … Continue reading

More Galleries | 1 Comment

Restriction on WhatsApp Group in J&K- An Another Failed Attempt To Regulate The Internet

The philosophy of Prof. Lawrence Lessing regarding the control of internet through its code and ‘the declaration of independence of cyberspace’ by John Perry Barlaw are in interlocked stage. The movement of the governance of internet is slowly and slowly … Continue reading

More Galleries | Leave a comment

How To Become A Cyber Lawyer

With the evaluation of e-governance and society moving towards digitization, the Information Technology has penetrated in every sphere of life and the profession of law, being no exception, is immensely impacted by it. The proliferation comprises of e-Business, Digital Communication, … Continue reading

More Galleries | 18 Comments

PREPARING FOR CISSP EXAM

Neeraj Aarora CISSP, CISA, CFCE, FCMA, CFE   Clearing CISSP exam in first attempt made me a winner in eyes of everyone…. my friends and other acquaintances on various social media sites like face book, LinkedIn and whatsApp started applauding … Continue reading

More Galleries | 6 Comments