Cyberwarfare: GK, General Studies and Current Affairs

National Conference on Cyber Crime Investigation and Cyber Forensics hosted in New Delhi

The Central Bureau of Investigation (CBI) hosted the 1st National Conference on Cyber Crime Investigation and Cyber Forensics which will be organized at the CBI Headquarters in New Delhi, India. The conference was inaugurated by the CBI Director Rishi Kumar Shukla. What has happened? A two-day national conference on Cyber Crime Investigation and Cyber Forensics ..

New Delhi hosts 12th India Security Summit

On 29th August 2019, the 12th India Security Summit (ISS) was held in New Delhi on the theme “Towards New National Cyber Security Strategy”. During the conference, the various issues discussed such as protection of critical national infrastructure, emerging cyber threats: Incidents, Challenges and Response. The Government of India (GoI) has taken various measures to ..

Brad Smith authors book “Tools and Weapons: The Promise and The Peril of Digital Age”

The book “Tools and Weapons: The Promise and The Peril of the Digital Age” has been co-authored by Microsoft President Brad Smith & Carol Ann Browne, and will release on September 11. The book will provide a behind-the-scene look at the multinational technology company and tell some of the biggest stories to hit the tech ..

Twitter handle @CyberDost launched by Union Government to spread awareness about cyber crimes

The Union Ministry of Home Affairs has launched a Twitter account to spread awareness about cyber crimes and normal precautions to be taken. The Twitter handles – @CyberDost – is aimed at enhancing people’s basic knowledge about cyber crimes and precautions to be taken for prevention.

GravityRAT

GravityRAT, a malware allegedly designed by Pakistani hackers, has recently been updated further and equipped with anti-malware evasion capabilities. RAT malware: The RAT was first detected by Indian Computer Emergency Response Team, CERT-In, on various computers in 2017. It is designed to infiltrate computers and steal the data of users, and relay the stolen data ..