An online threat known as cryptojacking, or malicious crypto mining, sneaks onto a computer or mobile device and uses its resources to ‘mine’ cryptocurrencies, which are virtual monies.
Establishing a trustworthy relationship with a minor in a virtual setting in order to conduct a sexual integrity offense is known as cyber grooming.
To help customers get rid of botnet infections and other malware from their computers, MicroWorld (Microworld Infosol) has developed a Bot Removal Tool in collaboration with Cyber Swachhta Kendra, which is part of the Indian Computer Emergency Response Team (CERT-In), Ministry of Electronics and IT.
A citizen-centric project of the Indian Department of Telecommunications (DoT), the Sanchar Saathi app tries to empower mobile users, improve their security, and increase public knowledge of government programs. It is accessible as a web portal as well as a mobile app.
According to Press Information Bureau information generated by users for the purpose of defining offenses as well as information produced by Artificial Intelligence (“AI”) tools or other technologies is subject to the IT Act and its regulations.
Keep login information completely private and avoid scribbling it down on any paper, document, or gadget. Never give out your account information, login credentials, OTP, or personal information to others. Inform the bank about any unusual calls.
AI is used by automated hacking to find new vulnerabilities quicker than human hackers. Phishing attacks use artificial intelligence (AI) to create fake emails and identify potential victims. Patterns are prepared by AI for brute-force password cracking.
Under the Commissions for Protection of Child Rights (CPCR) Act, 2005, the National Commission for Protection of Child Rights (NCPCR) takes complaints about any violation of children’s rights using the online Complaint Management System, Ebaalnidan.
A form of malicious software known as spyware is placed on a computer system without the user’s knowledge. The device is compromised, private data and internet usage data are stolen, and the information is then sent to advertising, data companies, or outside users.
South Africa is particularly susceptible to cybercrime, according to the Interpol African Cyber threat Assessment Report for 2024.