DOXXING?

DailyPost 2761 DOXXING? As the world metamorphoses into a fully enabled tech world and the gap between the two worlds gets more and more morphed to one cyber-physical synthesized world, new ways of crimes, new crimes and social aberrations are bound to increase. Doxxing is one of those. What does it entail? In simple terms

DOXXING? Read More »

DAIXIN RANSOMWARE GANG

DailyPost 2760 DAIXIN RANSOMWARE GANG As in the physical world, the cyber world also has gangs. It would be strange if the most popular cybercrime of the day did not have any gangs, i.e., ransomware. Hacking is the new normal has slowly become a truism to the extent that the organisation breached upon has a

DAIXIN RANSOMWARE GANG Read More »

DNS AND CYBER THREATS

DailyPost 2759 DNS AND CYBER THREATS The world of cyber threats literally provides a mirror image of the functioning of the cyber world, usage of tools, expertise and social engineering to create a breach for various motives and preferably get away with it. Uncovering threats and building capabilities to protect against these threats is what

DNS AND CYBER THREATS Read More »

MANUFACTURED ELECTION AGENDAS

DailyPost 2757 MANUFACTURED ELECTION AGENDAS Noam Chomsky long time back wrote a book on Manufacturing Consent: The Political Economy of the Mass Media. Democracies have weird ways of handling themselves and more often than not, in hindsight, it does not turn out to be the right thing. Indian democracy has its own variant; of manufactured

MANUFACTURED ELECTION AGENDAS Read More »

POLL MANIFESTO, WHAT IS?

DailyPost 2756 POLL MANIFESTO, WHAT IS? Why and what is a poll manifesto, the main stakeholders of Indian democracy will not be able to tell, the most important stakeholder the electorate the least. In the democratic – electoral – governance scenario of this country where does it fit in. Does it have any legal mandate,

POLL MANIFESTO, WHAT IS? Read More »

NEW PHISHING CAMPAIGN

DailyPost 2755 NEW PHISHING CAMPAIGN In the fast-moving world of cyber security, not only do we have platform criminality we also have campaigns, and phishing can be one favorite example. The current one pertains to a new phishing campaign targeting at oil and gas with evolved data stealing malware. Phishing is known malaise of the

NEW PHISHING CAMPAIGN Read More »

ASICS

DailyPost 2753 ASICS In a tech enabled world, where life and business run on technology, where a bottleneck or missing an upgrade can make or mar a business, knowledge of it even as users, consumers and informed professionals is a must. The semiconductor shortage of the Covid days is still fresh in our minds; what

ASICS Read More »

OPENESS AND TRANSPARENCY

DailyPost 2752 OPENESS AND TRANSPARENCY We are scared of being transparent. The democratic movement towards transparency or the show of it have no takers. Major stakeholders bask under the cover opaqueness. The name of the game is to take giant strides towards greater opaqueness while indulging in best possible lip service and display of an

OPENESS AND TRANSPARENCY Read More »

Scroll to Top