Cyber crime or crime in virtual world may be defined as illegale use of computers and internet, in order to steal a person's internet id, bypass network servers or disrupt operations with malevolent programs. All these activities are termed as cyber crime.These crime's are punishable by law. City of joy Kolkata gets its first cyber crime lab. When India is ready to celebrate its 65th Independence day. The day which symbolize victory of India, which India gained after lots of struggle.
The Ministry of Home Affairs (MHA) on Friday asked its official to avoid using social networking websites like Orkut and Facebook in the office.
The MHA has released a circulation in this regard and asked its official to restrain from surfing social networking sites during the office hour due to security reasons.
The U.S. government will work to develop an "unrivaled" cybersecurity workforce and broaden the nation's pool of skilled cyberworkers under a draft cybersecurity education plan released Friday by a U.S. agency.
The goal of the National Initiative for Cybersecurity Education (NICE) plan, released by the U.S. National Institute of Standards and Technology (NIST), is to improve U.S. cybersecurity by focusing on education, the agency said.
BANGALORE, INDIA: HP announced today the addition of two Indian organizations, Amrita Vishwa Vidyapeetham University and Learning Links Foundation, to its global HP Catalyst Initiative.
Under the initiative, Amrita Vishwa Vidyapeetham University would join the Measuring Learning consortium, while Learning Links Foundation, the newly-formed STEM-preneur consortium, will explore novel ways to combine science, technology, engineering and mathematics (STEM) education with the skills and passion of entrepreneurship, stated a press release.
VLC Player by VideoLAN is no doubt one of the best and most popular media player available on Windows, Mac & Linux systems. Being open source software, the source code of VLC player is available to everyone. It’s however being reported that few fraud companies are abusing the source code and distributing the software infected with malware. These fraud companies tweak the source code and inject their own malware in the player and then make it available for download through various sources.