A Phishy Story
Phishing sounds similar to fishing. Fishes are to the volume of internet users today much like fishermen are to phishers. Zillions of fishes falling prey […]
Phishing sounds similar to fishing. Fishes are to the volume of internet users today much like fishermen are to phishers. Zillions of fishes falling prey […]
Some days back I was greeted by a Google Safe browsing warning when I tried visiting a ‘known’ site. As I was sure it was […]
Finally, we have our first conviction under the IT Act 2000 in India. After more than a 100 cases being lodged, and about half of […]
from NII Consulting The IT Act 2000 is a large repository of fine print fraught with judicial jargon and varying legal implications. To quote from […]
by Chetan Gupta, NII Consulting Well, last week was abuzz with activity when we had to recover data from a corrupt Linux hard disk. Thought […]
by K. K. Mookhey, NII Consulting e4 It’s late at night, and the phone rings. This had better be a world-changing revolution. But it’s something […]