UN Cybercrime Convention — 5 steps to make it workToday is a historic day where all countries have come together to adopt a mile stone treaty pertaining to cybercrime. This treaty aims at…4d ago4d ago
Government Consultants, expectationsChanakya’s Arthashashtra, gives a lot of importance for Kings to have trusted and knowledgeable people surrounding them to get expert…Sep 41Sep 41
New Impactful TRAI GuidelinesOn 20th August, TRAI has released a new guideline directing telecom service providers to plug loopholes exploited by cybercriminals. Some…Aug 20Aug 20
Exploiting iMessage — Transnational CybercrimeA campaign exploiting iMessage’s visibility vulnerability was launched recently, targeting iPhone users across India. Some of the…Jul 9Jul 9
How to recover hacked social media accounts?Off-late, there has been a steep rise in number of hacking incidents for WhatsApp, Facebook and Instagram. Indian Government has created…Mar 103Mar 103
Advanced APK Investigation | Android MalwareCyber criminals have started moving towards android malwares to steal OTPs, user information etc. When a victim reports such APK, it needs…Oct 10, 2023Oct 10, 2023
Always Leave Office on Time — APJ Abdul Kalam || An investigation on the QuoteLast week I had an intellectual discussion with my friend who said, Shri Abdul Kalam has said, Leave your office on time. A simple…Aug 31, 2023Aug 31, 2023
New Age Transaction Monitoring Signals for Banks || Rented AccountsDigital Transactions in India is seeing a phenomenal growth. As per latest data from NPCI about UPI Transaction, total value of UPI based…Aug 17, 2023Aug 17, 2023
No Logs Investigation / Incident Response — IPDR to rescueFundamental principle any quality hacking attempt is to not leave any traces in the environment. For such situations, IR or root cause…Jun 4, 20231Jun 4, 20231