Category: Information Security

What is on my mind? Privacy – Suraj Kumar Shrivastava

Am I aware of my privacy? Nowadays, this little word is not clandestine, now and then people, organizations and even the government uses it. But what knowledge do you have of it? It is merely a question that can be googled and explained in a simplistic way, but have...

PEGASUS SPYWARE IN INDIA: ALL YOU NEED TO KNOW BY ABHINAV GUPTA ( PART -2)

Who has NSO Group’s Pegasus Spyware targeted in India? Twenty-two individuals, including human rights activists, scholars, and journalists, have so far confirmed that they were targeted by spyware on the messaging platform WhatsApp. Here’s what the 22 people said about the calls they received from Citizen Lab informing them that...

PEGASUS SPYWARE IN INDIA: ALL YOU NEED TO KNOW By Abhinav Gupta

About Spyware Spyware is nothing but a Software that is malicious or in Cybersecurity terms its a malware that is installed in the end user’s computing devices. In today’s tech era any software is said to be spyware if it is installed without any user’s authorization. Spyware is one...

Candid conversation with Ms.Sneha Rajguru

We had the opportunity of interviewing Ms.Sneha Rajguru who is the founder of WINJA which is a platform to promote and celebrate women in security. Sneha is currently working as a Staff Security Engineer for Byton and has been in the field of Information Security for over 6 years...

Candid Conversation with Professor Nisha TN by Shobhita Jain

Edited by Bishakha Jain We had the opportunity of interviewing Professor Nisha TN. Here are some insights which she shared with us in this value adding conversation!   Shobhita – Starting with the first question, could you tell me about yourself and about your professional achievements? Ma’am – I...

Winja-Null Pune Session!

–By Angelina L. Gokhale and Kaustubh Chavan Symbiosis Centre for Information Technology (SCIT), Pune The Null Pune Chapter hosted the first Winja Session on the 5th of January 2019 inviting women speakers to discuss on the upcoming trends and research in information security. The session received enthusiastic participation from...

Linux Privilege Escalations By Sawan Bhan

~Reviewed by Bishakha Jain WHAT IS PRIVILEGE ESCALATION? Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an OS or application to achieve an higher access to resources that are normally protected from an application or user. The result could lead to unauthorized...

Is there a difference between “Security and Privacy”? by Sawan Bhan

~Reviewed by Bishakha Jain There is a typical faith in Information Security people group that Security and Privacy are connected. However, that they’re sufficiently diverse to constantly mention the distinction. I don’t think the difference should matter much to defenders, and in fact, if you look close enough the distinction...

Is Sarahah the next Cyber Bullying Element? – By Pranshi Gupta

Edited By – Akash Goel A new app named Sarahah is trending among youngsters. Social media experts say the new download allows anonymous feedback among friends. However, of late, it’s been conceivably hazardous and could be utilized for cyberbullying. The application, which has now advanced towards the major cities of...

Information Risk Assessment – Industry perspective with Sunil Bakshi

Edited by – Sristy Changkakoti Safety is a myth, Risk is the reality, Fear is the mind killer. “..Wells Fargo recently paid $185 million in penalties – the highest fine levied by the Consumer Financial Protection Bureau (CFPB)…” “..Volkswagen has been hit with over 30 federal lawsuits and 40%+ decline in stock...