Is Fake News Illegal?

Malaika G. Naidu Fake News. Sensationalism. Misreporting.In the last couple of years, the digital world has witnessed a growing trend in the amount of false information that is published. While the digital world has made the dissemination of news easier and quicker, the concept of fake news is older than the internet. Such news was…

Advantages of Password Vaults

Malaika G. Naidu Passwords. The basis of cyber safety. From entertainment to e-commerce, all our activity online is secured through combinations of letters, numbers and special characters that we put together. Hopefully, at random but mostly in predictable sequences. What started off with ‘alphabets and numbers, at least 6 characters long’, has become ‘alpha-numeric with…

Do You Use Torrents?

Malaika Naidu Torrenting is one of the most popular methods of procuring movies, music, books, games, etc. from the internet. Every day, millions of gigabytes of data are downloaded through torrent engines such as uTorrent. Although the number has reduced with the rise in popularity of streaming websites like Netflix, Amazon Prime, and Hotstar, and…

Hiding Behind Incognito Browsing

Malaika Naidu A major hype word and internet trend today is data privacy. Add to this the vulnerability brought in by excess use of social media and the integration of technology into all aspects of our day to day life. You’ll realise it’s a tricky world online. So, what do you do?“Trust private browsing to…

Safety on Social Media Platforms

Malaika Naidu The most valuable resource today is not oil, water or fresh air – it’s data! An article in The Economist recently outlined just how valuable this resource is to organisations the world over. It’s alarming how data mining can influence people and hence dictate real events. Now answer this, where can one find…

Cyber Law: The Need for a Dedicated Field of Law

Malaika Naidu WHAT IS CYBER LAW? To be able to answer that question we must first understand the meaning of Law. Simply put, law encompasses the rules of conduct, that have been approved by the government, enforced over a certain territory, and must be obeyed by all persons within that territory. Violation of these rules will lead to…

Math Money : A simple introduction to crypto-currencies

Crypto-currencies (bitcoin et al) have caught the attention of Governments, enforcement agencies, geeks and the general public. This document provides a simple introduction to crypto-currencies and briefly introduces terms such as cryptography, hash functions, proof-of-work, digital signatures, mining, merkle root & tree, crypto-currency addresses and wallets. This document is intended for the novice reader and…

The ASCL ecosystem

When you enrol for a premium plus course with Asian School of Cyber Laws (CCI+, CFA+, IPCL+, CT+), you don’t get just a course. You get the super-awesome ASCL experience: 1. Mentor Each plus student is allotted a mentor for guidance through the course. Your mentor is available through email, google hangout and whatsapp. ASCL mentors…

7 steps to building an awesome career in cyber crime control

2014 was the most active year as far as cyber criminals are concerned. The victims were some of the world’s largest banks, retailers, online businesses, entertainment companies, telecom giants, insurance companies, hospitals, oil companies & aerospace companies. And governments, municipalities, tax departments, police departments and super-secret agencies. And countless cars, CCTV cameras & bitcoin wallets….