SlideShare a Scribd company logo
1 of 63
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
RETHINKING CORPORATE
SECURITY – POST SNOWDEN
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
A PRESENTATION
BY
PAVAN DUGGAL
ADVOCATE, SUPREME COURT
OF INDIA
PRESIDENT, CYBERLAWS.NET
PRESIDENT, CYBERLAW ASIA
HEAD, PAVAN DUGGAL
ASSOCIATES
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
SNOWDEN REVELATIONS
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
SNOWDEN REVELATIONS ON
BHARATIYA JANTA PARTY (BJP)
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
CENTRAL MONITORING SYSTEM
(CMS) & NETRA PROJECT
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
ONLINE MONITORING,
INTERCEPTION, BLOCKING &
SURVEILLANCE
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
BLADABINDI VIRUS
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
SUPERMAN
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
STUXNET VIRUS
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
I LOVE YOU VIRUS
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
VODAFONE INTERCEPTION
DISCLOSURE REPORT
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
PMO INDIA TWITTER HANDLE
– REPRESENTING A NEW KIND
OF CYBER THREAT
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
HEARTBLEED
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
LINKEDIN HACKING
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
INDIA’S NATIONAL CYBER
SECURITY POLICY 2013
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
BRING YOUR OWN DEVICE (BYOD)
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
INTERNET OF THINGS AND
CYBERLAW- JAN 2014
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
ONLINE FAKE RECRUITMENT
SCAMS
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
IMPORTANT CASES
Agricultural equipment manufacturing
company data theft case
Offensive emails to company matter
Phone defects blog case
Twitter rumour defamation case
Arif Azim Case
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
IMPORTANT CASES
 Twitter fake handles used against company case
 True Caller and CEO phone number compromise
case
 Calls for fake interviews on social media case
 Gurgaon call centre spy camera girl termination case
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
CYBER BULLYING GALORE
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
GURUJI.COM SEARCH ENGINE –
CRIMINAL ACTION
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
NIRMALJIT SINGH NARULA
Vs. INDIJOBS AT
HUBPAGES.COM & ORS
© of images belongs to the
respective copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
MUZAFFARNAGAR
COMMUNAL RIOTS
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
15TH AUGUST, 2012-
BANGALORE MASS
MIGRATIONS
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
DR. L. PRAKASH- INDIA’S FIRST
LIFE TIMER CYBER CRIMINAL
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
BAAZEE.COM CASE
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
MOBILE APPS– TODAY’S
REALITY
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
CYBERCRIME AS A SERVICE
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
PRIVACY
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
DATA PRIVACY AND
CORPORATES- WAKE UP TIME
Data privacy concerns are already sky rocketing
that is why data privacy will continue to be an
important issue.
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
MALWARE & CYBER
SECURITY
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
CONCLUSION
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
SOCIAL MEDIA & SECURITY
CHALLENGES
 well-known Socialbot malware, called the “Koobface”
virus, is specifically created to target social network
platforms. © of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
SOCIAL MEDIA & SECURITY
CHALLENGES
 Social media and smartphones exposing
'millions' to cybercrime, says study : AAP
September 06, 2012 1:02PM
 LinkedIn was recently hacked, and users’
passwords stolen and leaked on the Internet. The
company, through its blog, confirmed the event,
declaring that more than six million passwords
were compromised.
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
SOCIAL MEDIA & CYBER
CRIMES
 Social media is today becoming the fulcrum
focus point for cyber criminals and cyber
terrorists.
 More and more cyber criminal tendencies are
continuing to emerge in social media.
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
SOCIAL MEDIA & SECURITY
CHALLENGES
 Social media and smartphones exposing
'millions' to cybercrime, says study : AAP
September 06, 2012 1:02PM
 LinkedIn was recently hacked, and users’
passwords stolen and leaked on the Internet. The
company, through its blog, confirmed the event,
declaring that more than six million passwords
were compromised.
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
CYBER LAW IN INDIA
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
CYBERCRIMES DEFINED UNDER
THE IT ACT, 2000
 Section 65- Tampering with computer source
documents
 Section 66- Computer related offences
 Section 66A- Punishment for sending offensive
messages through communication
service, etc.
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
CYBERCRIMES DEFINED UNDER
THE IT ACT, 2000
 Section 66B- Punishment for dishonestly receiving
stolen computer resource or
communication device.
 Section 66C- Punishment for identity theft
 Section 66D- Punishment for cheating by
personation by using computer
resource
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
CYBERCRIMES DEFINED UNDER
THE IT ACT, 2000
 Section 66E- Punishment for violation of
privacy
 Section 66F- Punishment for cyber terrorism
 Section 67- Punishment for publishing or
transmitting obscene material in
electronic form
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
CYBERCRIMES DEFINED UNDER
THE IT ACT, 2000
 Section 67A- Punishment for publishing or transmitting of
material containing sexually explicit act, etc.,
in electronic form
 Section 67B- Punishment for publishing or transmitting of
material depicting children in sexually explicit
act, etc., in electronic form
 Section 67C- Preservation and retention of information by
intermediaries
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
CYBERCRIMES DEFINED UNDER
THE IT ACT, 2000
 Section 68- Power of the Controller to give directions
 Section 69- Power to issue directions for interception
or monitoring or decryption of any
information through any computer
resource
 Section 69A- Power to issue directions for blocking for
public access of any information through
any computer resource
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
CYBERCRIMES DEFINED UNDER
THE IT ACT, 2000
 Section 69B- Power to authorise to monitor and collect
traffic data or information through any
computer resource for cyber security
 Section 70- Protected system
 Section 70A- National nodal agency
 Section 70B- Indian Computer Emergency Response
Team to serve as a national agency for
incident response
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
CYBERCRIMES DEFINED UNDER
THE IT ACT, 2000
 Section 71- Penalty for misrepresentation
 Section 72- Breach of confidentiality and
privacy
 Section 72A- Punishment for disclosure of
information in breach of lawful
contract
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
INTERMEDIARY
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
INTERMEDIARY
"Intermediary" with respect to any particular electronic
records, means any person who on behalf of another
person receives, stores or transmits that record or provides
any service with respect to that record and includes
telecom service providers, network service providers,
internet service providers, web hosting service providers,
search engines, online payment sites, online-auction sites,
online market places and cyber cafes.
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
INTERMEDIARIES AND DUE
DILIGENCE UNDER THE IT ACT, 2000
 Intermediaries are required to do due
diligence under the terms of the amended
Information Technology Act, 2000.
 This due diligence must be done to ensure
compliance with the relevant parameters of
the amended Information Technology Act,
2000.
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
11TH APRIL, 2011 – A HISTORICAL DAY
FOR THE INFORMATION TECHNOLOGY
ACT, 2000
 The Government of India using its wide powers given under the
Information Technology Act, 2000, has notified the Information
Technology Rules, 2011 including the following:
 The Information Technology (Electronic Service
Delivery) Rules, 2011
 The Information Technology (Reasonable Security
Practices And Procedures And Sensitive Personal Data
Or Information) Rules, 2011
 The Information Technology (Intermediaries
Guidelines) Rules, 2011
 The Information Technology (Guidelines for Cyber
Cafe) Rules, 2011
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
SENSITIVE PERSONAL DATA OR
INFORMATION
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
LIABILITIES OF INTERMEDIARIES AND
THE INDIAN CYBERLAW
 Liability of intermediaries has been specifically now provided
under Section 79 of the amended Information Technology Act,
2000.
 “Google v/s Vishakha” case before the Hon'ble Supreme
Court of India.
 The emphasis on exercise of due diligence by intermediaries is an
important aspect. However, enforceability and implementation
of the Information Technology Act, 2000 has always been a
challenge.
 Most of the companies in India comply with the
Information Technology Act, 2000 in breach rather than in
observance.
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
LIABILITIES OF INTERMEDIARIES
AND THE INDIAN CYBERLAW
There could have exposure to legal consequences,
both civil and criminal, for the company and its top
management.
Civil liability-damages by way of compensation
upto 50 million INR per contravention
Criminal Consequences - The top management
could also be exposed to criminal consequences
ranging from imprisonment of 3 years to life
imprisonment and fine from 1 Lakh INR to 10
Lakhs INR.
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
LIABILITIES OF INTERMEDIARIES
AND THE INDIAN CYBERLAW –
CRIMINAL CONSEQUENCES
© of images belongs to the respective
copyright holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
NEED FOR DUE DILIGENCE
Every legal entity is thus required to do due
diligence under the terms of the amended
Information Technology Act, 2000.
This due diligence must be done to ensure
compliance with the relevant parameters of
the amended Information Technology Act,
2000.
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
NEED FOR DUE DILIGENCE
 Reasonable Prudence ensues compliance
with the requirements of law, that being
Indian Cyberlaws, IT Act, IT Rules,
notifications, bye-laws and circulars made
thereunder.
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
COMPLIANCES AND THE
INDIAN CYBERLAW
© belongs to the respective copyright
holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
COMPLIANCES BY PAVAN
DUGGAL ASSOCIATES
Pavan Duggal Associates -role in helping
companies ensure compliances with the
Indian Cyberlaw and rules thereunder.
Pavan Duggal Associates assist all
intermediaries to ensure documented
due diligence under the Information
Technology Act, 2000.
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
PAVAN DUGGAL ASSOCIATES,
ADVOCATES, SUPREME COURT OF
INDIA
© belongs to the respective copyright
holders
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
PAVAN DUGGAL ASSOCIATES
COMPLIANCE FRAMEWORK – FOR
COMPLIANCE, EVALUATION AND
CERTIFICATION
 Asia Pacific Legal 500 says about Pavan Duggal
Associates
“Cyberlaw specialist Pavan Duggal Associates
Advocates is the first port of call for many in
terms of cases involving data theft, usually
companies that have experienced theft of
confidential or commercially sensitive
information by former employees.”
“Pavan Duggal Associates Advocates provides
niche expertise in cyber law.”
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
Indian Cyberlaw has created the appropriate legal
framework for promoting e-commerce in the
country as was giving legality to electronic format.
The said lead framework has provided for various
enabling provisions that provide for electronic
authentication and cyber security related issues.
All legal entities have a duty to ensure that its
business operations needs to comply with the
parameters of Information Technology Act, 2000
as also rules and regulations made thereunder.
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
CONCLUSION
All in all, Cyberlaw and Cybercrime today
represent important fascinating aspects of
our lives. Cyberlaw and cybercrime
jurisprudence is not just limited to lawyers; it
is of relevance to every user of the electronic
and digital ecosystem as also mobile
ecosystem.
Ignorance of law is no excuse in the eyes of
law
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
Only in compliance,
compliance and compliance
with the Indian Cyberlaw lies
the way for Nirvana for any
entity dealing with the digital
and mobile ecosystem.
PresentedatClubHackInfosecKeynoteeventinBangaloreon8thAug2014
A PRESENTATION
BY
PAVAN DUGGAL
ADVOCATE, SUPREME COURT OF
INDIA
PRESIDENT, CYBERLAWS.NET
PRESIDENT, CYBERLAW ASIA
HEAD, PAVAN DUGGAL ASSOCIATES
pavan@pavanduggal.com
pavanduggal@yahoo.com

More Related Content

Similar to Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore

e-Commerce Academy - Winning Consumer Market from Online to Offline in Mobile...
e-Commerce Academy - Winning Consumer Market from Online to Offline in Mobile...e-Commerce Academy - Winning Consumer Market from Online to Offline in Mobile...
e-Commerce Academy - Winning Consumer Market from Online to Offline in Mobile...Adams Company Limited
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...CSIRO National AI Centre
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Benjamin Ang
 
INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...
INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...
INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...apidays
 
SFScon22 - Attaullah Buriro - Behavioral Biometrics-based identity verificati...
SFScon22 - Attaullah Buriro - Behavioral Biometrics-based identity verificati...SFScon22 - Attaullah Buriro - Behavioral Biometrics-based identity verificati...
SFScon22 - Attaullah Buriro - Behavioral Biometrics-based identity verificati...South Tyrol Free Software Conference
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268xosap
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In IndiaIRJET Journal
 
Internet of Things: The Next Bubble? a talk by Sce Pike, CXO, Citizen, Inc.
Internet of Things: The Next Bubble? a talk by Sce Pike, CXO, Citizen, Inc.Internet of Things: The Next Bubble? a talk by Sce Pike, CXO, Citizen, Inc.
Internet of Things: The Next Bubble? a talk by Sce Pike, CXO, Citizen, Inc.Citizen, Inc.
 
ICCM AU: Exploring the Shift from Content to Context (Keynote 3)
ICCM AU: Exploring the Shift from Content to Context (Keynote 3)ICCM AU: Exploring the Shift from Content to Context (Keynote 3)
ICCM AU: Exploring the Shift from Content to Context (Keynote 3)Antoine RJ Wright
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...IRJET Journal
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Sce Pike
 
ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility Rick Huijbregts
 
Blockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
Blockchain + AI + Big Data Technology Integration for 4th Industrial RevolutionBlockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
Blockchain + AI + Big Data Technology Integration for 4th Industrial RevolutionAlex G. Lee, Ph.D. Esq. CLP
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesBijay Senihang
 
Kondo-ing API Authorization
Kondo-ing API AuthorizationKondo-ing API Authorization
Kondo-ing API AuthorizationNordic APIs
 
The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...Kate Carruthers
 
2014 Social Media Trends for SEO
2014 Social Media Trends for SEO2014 Social Media Trends for SEO
2014 Social Media Trends for SEODevan Brown
 

Similar to Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore (20)

e-Commerce Academy - Winning Consumer Market from Online to Offline in Mobile...
e-Commerce Academy - Winning Consumer Market from Online to Offline in Mobile...e-Commerce Academy - Winning Consumer Market from Online to Offline in Mobile...
e-Commerce Academy - Winning Consumer Market from Online to Offline in Mobile...
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...
INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...
INTERFACE by apidays 2023 - Identifying Business Risks from API Legal Agreeme...
 
SFScon22 - Attaullah Buriro - Behavioral Biometrics-based identity verificati...
SFScon22 - Attaullah Buriro - Behavioral Biometrics-based identity verificati...SFScon22 - Attaullah Buriro - Behavioral Biometrics-based identity verificati...
SFScon22 - Attaullah Buriro - Behavioral Biometrics-based identity verificati...
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Internet of Things: The Next Bubble? a talk by Sce Pike, CXO, Citizen, Inc.
Internet of Things: The Next Bubble? a talk by Sce Pike, CXO, Citizen, Inc.Internet of Things: The Next Bubble? a talk by Sce Pike, CXO, Citizen, Inc.
Internet of Things: The Next Bubble? a talk by Sce Pike, CXO, Citizen, Inc.
 
ICCM AU: Exploring the Shift from Content to Context (Keynote 3)
ICCM AU: Exploring the Shift from Content to Context (Keynote 3)ICCM AU: Exploring the Shift from Content to Context (Keynote 3)
ICCM AU: Exploring the Shift from Content to Context (Keynote 3)
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
2015 indonesia digital landscape
2015 indonesia digital landscape 2015 indonesia digital landscape
2015 indonesia digital landscape
 
ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility ACT Canada - Internet of Everything for Sustainable Mobility
ACT Canada - Internet of Everything for Sustainable Mobility
 
Blockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
Blockchain + AI + Big Data Technology Integration for 4th Industrial RevolutionBlockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
Blockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
Kondo-ing API Authorization
Kondo-ing API AuthorizationKondo-ing API Authorization
Kondo-ing API Authorization
 
Jim Novack in #awe2015 with Talent Swarm. Best practices tips
Jim Novack in #awe2015 with Talent Swarm. Best practices tipsJim Novack in #awe2015 with Talent Swarm. Best practices tips
Jim Novack in #awe2015 with Talent Swarm. Best practices tips
 
The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...
 
2014 Social Media Trends for SEO
2014 Social Media Trends for SEO2014 Social Media Trends for SEO
2014 Social Media Trends for SEO
 

More from ClubHack

India legal 31 october 2014
India legal 31 october 2014India legal 31 october 2014
India legal 31 october 2014ClubHack
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber InsuranceClubHack
 
Summarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatSummarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatClubHack
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleFatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleClubHack
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianClubHack
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...ClubHack
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodClubHack
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalClubHack
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanHybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanClubHack
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyClubHack
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiClubHack
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaContent Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaClubHack
 
XSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiXSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiClubHack
 
Clubhack Magazine Issue February 2012
Clubhack Magazine Issue  February 2012Clubhack Magazine Issue  February 2012
Clubhack Magazine Issue February 2012ClubHack
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack
 
ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack
 
ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack
 
One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)ClubHack
 

More from ClubHack (20)

India legal 31 october 2014
India legal 31 october 2014India legal 31 october 2014
India legal 31 october 2014
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
 
Summarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatSummarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threat
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleFatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep Kamble
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas Kurian
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara Agrawal
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanHybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish Bomisstty
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaContent Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
 
XSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiXSS Shell by Vandan Joshi
XSS Shell by Vandan Joshi
 
Clubhack Magazine Issue February 2012
Clubhack Magazine Issue  February 2012Clubhack Magazine Issue  February 2012
Clubhack Magazine Issue February 2012
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack Magazine – December 2011
ClubHack Magazine – December 2011
 
One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)
 

Recently uploaded

如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notesPRATIKNAYAK31
 

Recently uploaded (20)

如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notes
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 

Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore