Expressing grave concern about the growing threat of cyber terrorism in his opening statement at the meeting of Chief Ministers on National Counter Terrorism Centre (NCTC) held on May 5, 2012, Union Home Minister P. Chidambaram stated:
Google, the leading search engine giant acquired Quickoffice, a company best known for its mobile productivity suite for Android and iOS. Google plans to bring Quickoffice’s “powerful technology” to its own Apps product suite. Quickoffice allows its users to create and edit Microsoft Word, Excel and PowerPoint documents on their mobile devices. The company says its software is currently installed on over 300 million devices in more than 180 countries.
The financial details of the acquisition were not disclosed by either Google or Quickoffice.
Already struggling social networking site Facebook India and search engine Google India with Indian lawsuit to check and remove objectionable material from their web pages, got another notice from Delhi High Court. Based on a public interest litigation filed by K.N.Govindacharya, the Delhi High Court issued notice to the central government, social networking site Facebook India and Google India. Govindacharya, a right-wing Hindu activist in his PIL sought the recovery of taxes, which he alleges haven't come through as a result of the Indian operations of both Facebook and Google.
Expressing grave concern about the growing threat of cyber terrorism in his opening statement at the meeting of Chief Ministers on National Counter Terrorism Centre (NCTC) held on May 5, 2012, Union Home Minister P. Chidambaram stated:
Anup Girdhar, CEO of Sedulity Groups, says, "Getting networks, Web applications, Servers etc. tested by Cyber Security Professional is the only best utilitarian way for companies to establish the level of security of their networks & systems. With the ever-increasing risk of external attacks to websites, IT outsourcing and the adoption of new technologies including virtualization and cloud computing, organizations have to firstly, identify Cyber Threats and secondly, put control measures in place to defend themselves from all these Cyber Attacks."