Best Practices to Protect your Mobile Phone

Malaika Naidu We all know that cybercrime is a reality and it only growing with every passing day. With the deep penetration of smartphones into major markets across the world, we’re becoming walking-talking targets with high vulnerabilities. Interestingly, we all buy anti-viruses for our laptops and computers immediately after purchasing the device, yet we go…

Cyber Law: The Need for a Dedicated Field of Law

Malaika Naidu WHAT IS CYBER LAW? To be able to answer that question we must first understand the meaning of Law. Simply put, law encompasses the rules of conduct, that have been approved by the government, enforced over a certain territory, and must be obeyed by all persons within that territory. Violation of these rules will lead to…

The Importance of Cyber Law

Malaika Naidu In the simplest words, Cyber Law is any law that concerns cyberspace. This includes everything related to computers, software, data storage devices, cloud storage and even electronic devices such as ATM machines, biometric devices, health trackers and so on. That explanation alone is quite indicative of why today’s digital world needs strict cyber…

Cyber Crime Trends in 2019

Malaika Naidu In 2017, 2 billion data records were compromised, followed by more than 4.5 billion records in just the first half of 2018. With every passing year, and at an accelerated pace since 2010, cybercriminals are using more advanced and scalable tools to breach privacy. And they are clearly getting results! In the last…

Basic Steps to Protect Yourself Online (Part – 1)

Malaika Naidu There is no doubt that cybercrime is an ongoing and a very real threat. The first thing that comes to mind when most people read cybercrime is financial fraud and data leaks. However, cybercrime is constantly evolving and growing like a beast that seems untameable. Every time we think we have seen the…

Introduction to ASCL Courses

Malaika Naidu Asian School of Cyber Laws is an organisation that strives to make education easily accessible and efficiently delivered. Our journey began in 1999, even before the Information Technology Act (2000) came into effect. Bringing together the fields of Information Technology and Law, our courses are carefully crafted to serve members of the legal…

The 9 sides of cyber security

Endpoint security — Network Security — Application Security — Incident Response — Regulatory Compliance — Data Protection — Training — Testing — Contingency Planning 1. End-point security Endpoint security requires that each computing device on the network comply with certain standards before network access is granted. Endpoints include laptops, desktops computers, smart phones, and other communication devices, tablets, specialized equipment such as bar code readers, point of sale (POS) terminals etc….

22 Essential Skills for a Cyber Crime Investigator

We live in a world where everything seems to be getting hacked — Airplanes, ATM machines, Baby monitors, Biometric devices, Bitcoin wallets, Cars, CCTV cameras, Drones, Gaming consoles, Health trackers, Medical devices, Power plants, Self-aiming rifles, Ships, Smart-watches, Smartphones & more. The increasing global cost of cybercrime ($100 billion+ a year) has led to a massive surge…

Cyber Education- the Road Less Known

I’m not a techie, nor a lawyer and yet here I am in a field that takes on both these mammoths. I’ve been here a long time; India’s had her cyber law in place since the year 2000. So, it’s deeply disappointing to see the confusion in students and professionals alike about the various aspects…