enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Information Technology Act, 2000 - Wikipedia

    en.wikipedia.org/wiki/Information_Technology_Act...

    The law applies to the whole of India. If a crime involves a computer or network located in India, persons of other nationalities can also be indicted under the law. [2] The Act provides a legal framework for electronic governance by giving recognition to electronic records and digital signatures. It also defines cyber crimes and prescribes ...

  3. National Critical Information Infrastructure Protection Centre

    en.wikipedia.org/wiki/National_Critical...

    Protect and deliver advice that aims to reduce the vulnerabilities of critical information infrastructure, against cyber terrorism, cyber warfare and other threats. Identification of all critical information infrastructure elements for approval by the appropriate Government for notifying the same.

  4. Cyber-security regulation - Wikipedia

    en.wikipedia.org/wiki/Cyber-security_regulation

    A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control ...

  5. India probing iPhone hacking complaints by opposition ... - AOL

    www.aol.com/news/india-probing-iphone-hacking...

    India's cyber security agency is investigating complaints of mobile phone hacking by senior opposition politicians who reported receiving warning messages from Apple, Information Technology ...

  6. Why Apple risks facing India’s scrutiny after ‘hacking ...

    www.aol.com/news/why-apple-risks-facing-india...

    For premium support please call: 800-290-4726 more ways to reach us

  7. Phone hacking - Wikipedia

    en.wikipedia.org/wiki/Phone_hacking

    Phone hacking is the practice of exploring a mobile device, often using computer exploits to analyze everything from the lowest memory and CPU levels up to the highest file system and process levels. Modern open source tooling has become fairly sophisticated to be able to "hook" into individual functions within any running app on an unlocked ...

  8. International cybercrime - Wikipedia

    en.wikipedia.org/wiki/International_Cybercrime

    Illegal Access: “Hacking” is one of the major forms of offenses that refers to unlawful access to a computer system.. Data Espionage: Offenders can intercept communications between users (such as e-mails) by targeting communication infrastructure such as fixed lines or wireless, and any Internet service (e.g., e-mail servers, chat or VoIP communications).

  9. Data breaches in India - Wikipedia

    en.wikipedia.org/wiki/Data_breaches_in_India

    Data breach incidences in India were the second highest globally in 2018, according to a report by digital security firm Gemalto. [ 1 ] [ 2 ] With over 690 million internet subscribers [ 3 ] and growing, India has increasingly seen a rise in data breaches both in the private and public sector.