<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>NewsVoir</title>
    <link>http://newsvoir.com</link>
    <description>Latest news from NewsVoir</description>
    <item>
      <title><![CDATA[Rs. 5 Lakh Crore Erosion, 5.8M IT Careers at Crossroads: EC-Council&apos;s Jay Bavisi Urges AI Workforce Shift at India AI Summit 2026
]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The India &ndash; AI Impact Summit 2026, hosted by the Government of India under the India AI Mission at Bharat Mandapam in New Delhi, marked a defining global inflection point that framed the transition from AI aspiration to measurable national and enterprise outcomes. Anchored in the principles of People, Planet, and Progress, the Summit outlined a future where artificial intelligence advances humanity, enables inclusive economic expansion, and strengthens long-term sustainability.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:300px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/34725_eccouncil200226.jpeg" style="width: 300px; height: 400px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Jay Bavisi speaks at the India AI Impact Summit 2026, calling on India&rsquo;s IT industry to lead the national AI workforce transformation</span></span></strong></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The Summit marked a pivotal global moment in AI&rsquo;s evolution, drawing more than 300,000 attendees within its first three days and bringing together some of the most influential voices shaping the global AI economy, including Jensen Huang of Nvidia, Sundar Pichai of Google, Bill Gates, Sam Altman, and other technology leaders driving frontier innovation. It arrived at a moment of unprecedented reckoning for the global technology services industry, reflecting a broader shift from experimentation to measurable implementation.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Held amid heightened unprecedented reckoning for the global technology services industry. In the days leading up to the event, AI-driven disruption fears triggered a sharp selloff across major IT services firms. <a href="https://timesofindia.indiatimes.com/business/india-business/opportunity-in-disguise-it-stocks-meltdown-on-ai-scare-overdone-every-time-theres-been-a-tech-shift/articleshow/128455360.cms">India&rsquo;s Nifty IT index </a>plunged nearly 19 percent over eight trading sessions, wiping out approximately Rs. 4.8 to Rs. 5 lakh crore in combined market capitalisation, marking one of the steepest sectoral corrections in recent years. Top Indian IT companies suffered sharp double-digit declines, with one industry giant briefly falling below the Rs. 10 lakh crore market cap threshold for the first time since December 2020, while several others hit fresh 52-week lows. The carnage was not limited to India: overseas-listed shares of leading firms plunged nearly 10 percent in a single New York trading session, as global investors reassessed the long-term viability of the labour-intensive outsourcing model that has powered the sector for decades.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The stakes could not be higher. <a href="https://nasscom.in/knowledge-center/publications/technology-sector-india-strategic-review-2025">India&rsquo;s IT-BPM </a>&nbsp;industry remains one of the country&rsquo;s most significant economic pillars , generating approximately $283 billion in revenue in FY2025, contributing over 7 percent to national GDP, and directly employing nearly 5.8 million professionals. As AI reshapes enterprise operating models worldwide, the need to reskill and realign this workforce has become a strategic priority. Leading IT companies recorded significant declines, with several stocks hitting multi-month or 52-week lows as investors reassessed the long-term implications of AI on traditional outsourcing and services models. The correction was not limited to India, as IT services companies listed overseas also experienced notable declines, reflecting broader global uncertainty around the future of labour-intensive service delivery in the AI era.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Yet within this disruption lies what may be the most consequential workforce opportunity of the decade. The same AI technologies dismantling traditional service delivery models are simultaneously creating massive new demand for professionals who can deploy, secure, and govern AI systems at enterprise scale. The question confronting India&rsquo;s $283 billion IT sector is not whether AI will transform its business but whether the nation can retool its 5.8 million-strong technology workforce fast enough to lead that transformation rather than be consumed by it. This is precisely the challenge that Jay Bavisi, Founder and CEO of EC-Council, addressed head-on at the Summit.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Bavisi, creator of the world-renowned Certified Ethical Hacker (CEH) credential and a global leader in applied cybersecurity education &ndash; shifted the focus from experimentation to execution maturity, emphasizing that AI&rsquo;s future will be determined not by how fast it advances, but by how responsibly it is built, governed, and secured.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Addressing the panel &ldquo;Responsible AI at Scale: Governance, Integrity &amp; Cyber Readiness,&rdquo; Bavisi emphasized that as AI becomes embedded across financial systems, healthcare infrastructure, manufacturing ecosystems, digital governance platforms, and national security frameworks, disciplined workforce capability becomes the decisive factor in responsible scale.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In his broader remarks on the Summit and India&rsquo;s AI trajectory, Bavisi emphasized both the scale of the event and the magnitude of the opportunity.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&ldquo;This is an amazing summit that has been organized in India, the AI Impact Summit. I have not seen a summit of this size. The number of people, the number of thinkers who are here from all across the world &ndash; it is a very successful event and a dialogue that is extremely important in a world that is being transformed by AI,&rdquo; </em>he said.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Bavisi</strong> emphasized that artificial intelligence carries transformative potential, but only if managed with structural discipline. <em>&ldquo;AI has the potential to cause mayhem if it is not implemented properly,&rdquo; </em>he stated. <em>&ldquo;When AI becomes embedded into systems, responsibility becomes critical.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">He framed India&rsquo;s opportunity not merely as participation in AI growth, but as leadership through capability.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&ldquo;India has a phenomenal opportunity to be a supplier of talent to the world. Indian professionals are known globally for their technical ability. In the world of AI right now, it is time to wake up and serve professionals to the world who are able to adopt, govern, and defend,&rdquo; </em><strong>Bavisi</strong> said.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&ldquo;The fact that India is taking leadership in AI is a phenomenal step in the right direction,&rdquo; </em>he added. <em>&ldquo;India is one of the very few countries with professionals who are proficient in language models, and technology at scale. This is a moment for India.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Under Bavisi&rsquo;s leadership, EC-Council has expanded its global AI footprint through structured, role-based capability development aligned to real-world enterprise needs. <a href="https://www.eccouncil.org/ai-courses/" target="_blank" title="https://www.eccouncil.org/ai-courses/">The Enterprise AI Credential Suite </a>and the modernization of Certified CISO v4 represent the largest expansion in the organization&rsquo;s 25-year history, built for one clear reality: AI is scaling faster than the workforce trained to run, secure, and govern it.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Structured around EC-Council&rsquo;s proprietary Adopt. Defend. Govern. (ADG) framework for AI, the suite includes Artificial Intelligence Essentials (AI|E), Certified AI Program Manager (C|AIPM), Certified Offensive AI Security Professional (C|OASP), and Certified Responsible AI Governance &amp; Ethics Professional (C|RAGE). Together with Certified CISO v4, these credentials form a unified workforce architecture designed to support AI deployment, governance oversight, security resilience, and executive leadership at enterprise scale.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The strength of that architecture was reflected in the engagement following Bavisi&rsquo;s session. The discussion room reached capacity, with standing-room-only attendance and sustained interaction well beyond the scheduled time. Many attendees identified themselves as CEHs, reinforcing the credential&rsquo;s long-standing global recognition even within a summit dominated by frontier AI technologies.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Bavisi emphasized that leadership in artificial intelligence will not be defined solely by technological speed, but by execution maturity.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&ldquo;We often measure progress in numbers,&rdquo; </em><strong>Bavisi</strong> said. <em>&ldquo;But the larger impact lies in shaping professionals who go on to defend companies, governments, and communities. Workforce development is not transactional. It is generational.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About EC-Council</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">EC-Council is the creator of the Certified Ethical Hacker (CEH) program and a leader in cybersecurity education. Founded in 2001, EC-Council&rsquo;s mission is to provide high-quality training and certifications for cybersecurity professionals to keep organizations safe from cyber threats. EC-Council offers over 200 certifications and degrees in various cybersecurity domains, including forensics, security analysis, threat intelligence, and information security.  </span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">    </span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">An ISO/IEC 17024 accredited organization, EC-Council has certified over 350,000 professionals worldwide, with clients ranging from government agencies to Fortune 100 companies. EC-Council is the gold standard in cybersecurity certification, trusted by the U.S. Department of Defense, the Army, Navy, Air Force, and leading global corporations.   </span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=34725' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=34725</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_EC-LOGO.png</clientLogo>
      <pubDate>Fri, 20 Feb 2026 14:41:47 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[CoinSwitch Releases India&apos;s First Comprehensive VDA Handbook for Police and LEAs]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>CoinSwitch</strong>, India&rsquo;s largest crypto trading platform, today announced the launch of Virtual Digital Assets Decoded, the country&rsquo;s first comprehensive handbook designed to help Indian law enforcement agencies, cybercrime units, and policymakers to navigate through the rapidly evolving VDA ecosystem.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">With crypto adoption accelerating across India, police and cybercrime units are increasingly facing complex cases involving digital assets. Recognizing this urgent need, CoinSwitch has developed the handbook to simplify VDA concepts and provide practical guidance for on-ground investigations. The handbook will be distributed across key police stations and cybersecurity units nationwide, ensuring frontline officials have direct access to the tools and insights they need.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Commenting on the launch,<strong> Mr. Ashish Singhal, Co-founder &amp; CEO of CoinSwitch</strong>, said, &quot;<em>India has emerged as a global leader in grassroots-level crypto adoption, ranking first in the Global Crypto Adoption Index for the third consecutive year in 2025. With this growth comes a responsibility for service providers to safeguard consumer interests and foster a safer, more inclusive crypto ecosystem. This handbook is our contribution to that mission</em>.&quot;</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Mr. Sukant Dukhande, Senior Director, Legal at CoinSwitch</strong>, added, &quot;<em>Crypto is a rapidly evolving global asset class, bringing inherent complexity. This handbook is designed to assist police officials, policymakers, and regulatory bodies by providing practical insights, case studies, and best practices to enhance coordination and support informed, effective decision-making</em>.&quot;</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">This launch builds on CoinSwitch&rsquo;s ongoing efforts to support law enforcement and regulatory engagement in India. The company has conducted over 35 workshops and training programs on blockchain tracing and crypto fraud investigations. It has also established advisory partnerships to help shape balanced and effective crypto regulation. Looking ahead, CoinSwitch plans to expand these initiatives. The goal is to create a sustained ecosystem of knowledge.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">To facilitate collaboration, law enforcement agencies can submit official requests via <a href="https://coinswitch.co/" rel=" nofollow sponsored">nodaldesk@coinswitch.co</a>. Virtual Digital Assets Decoded complements these efforts, offering actionable insights to support investigations, improve coordination, and enhance decision-making in India&rsquo;s fast-growing crypto ecosystem.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Link to full report: <a href="https://coinswitch.co/switch/crypto/vda-handbook-for-police-law-enforcement-agencies/" rel=" nofollow sponsored">coinswitch.co/switch/crypto/vda-handbook-for-police-law-enforcement-agencies</a></span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=34010' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=34010</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_CoinswitchLogo.png</clientLogo>
      <pubDate>Thu, 04 Dec 2025 15:29:30 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Wibmo Unveils Trident AI, An AI-Powered Solution for Unprecedented Digital Payments Security ]]></title>
      <description><![CDATA[<p>
	<strong>Wibmo</strong>, a PayU company, today unveiled <strong>Trident AI, an</strong> <strong>AI-powered fraud detection platform </strong>at the Global Fintech Fest (GFF) 2025. The launch of the new Trident AI platform demonstrates Wibmo&rsquo;s commitment to building innovative, adaptive, scalable, and data-driven fraud prevention tools that help financial institutions and customers stay one step ahead of sophisticated frauds threats. &nbsp;</p>

<p>
	&nbsp;</p>

<p>
	RBI&rsquo;s latest annual report shows bank frauds jumped nearly threefold to ₹36,014 crore in FY25. Developed to combat evolving and complex frauds in modern payment ecosystems, Trident AI combines machine learning algorithms, behavioral analytics, and real-time decision-making capabilities to deliver unprecedented protection for financial institutions and customers. The solution adopts a three-tier approach encompassing <strong>real-time fraud detection</strong>, <strong>intelligent investigation</strong>, and <strong>automated response mechanism</strong>.</p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<strong>Merchant Fraud Prevention: </strong>Trident AI eliminates illegitimate merchant onboarding through automated website verification and MCC analysis, reducing manual processing time while ensuring compliance. The platform&#39;s continuous monitoring capabilities detect real-time risk changes, while its proprietary Merchant Trust Score leverages 70+ parameters to deliver precise reliability assessments for informed decision-making.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<strong>Transaction Fraud Detection: </strong>Trident AI delivers sub-100-millisecond transaction evaluation with dynamic risk scoring, enabling real-time blocking of high-risk activities while maintaining seamless processing for legitimate transactions. Advanced fraud ring detection capabilities reduce merchant chargebacks and protect customers, especially in cross-border payment scenarios.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<strong>Customer Fraud Intelligence: </strong>Platform&rsquo;s sophisticated Mule Account Identification and Anomaly Detection modules combat systematic fraud attacks through comprehensive ecosystem analysis. The system detects suspicious user behavior patterns, fraudulent merchant activities, and unusual BIN/bank traffic, effectively mitigating BIN attacks, bot attacks, and identifying coordinated fraud schemes across the payment network.</p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<em>&ldquo;With Trident AI platform, we are not just preventing fraud, we are building an adaptive intelligence layer for the payments ecosystem,&rdquo; </em>said <strong>Shailesh Paul, CEO, Wibmo</strong><em>. &ldquo;Our vision is to empower banks and financial institutions with tools that don&rsquo;t just react to threats, but anticipate and counter them, enabling digital commerce to thrive with confidence and trust.&rdquo;</em></p>

<p>
	&nbsp;</p>

<p>
	<em>&ldquo;With the launch of AI-embedded Trident, Wibmo is taking a significant step towards fortifying India&rsquo;s digital commerce ecosystem, making it safer and more resilient every day&rdquo;, </em>said <strong>Manas Mishra, Chief Product Officer, PayU and Wibmo</strong>. &ldquo;<em>Trident AI has already started demonstrating exceptional results in real-world deployments. A collaboration with PayU achieved 40% enhanced fraud detection precision compared to existing systems. Moreover, during a 10-day evaluation period, the platform successfully identified 2,250 high-risk fraud transactions from over 1.23 million processed transactions.&rdquo;</em></p>

<p>
	&nbsp;</p>

<p>
	Trusted by over 100 banks and fintechs worldwide and evaluating close to 4 billion transactions annually, Wibmo&rsquo;s flagship Trident FRM solution has set gold standard for next-generation fraud risk management. With the integration of Artificial Intelligence (AI) layer, the platform has transformed into a robust platform against fraud threats.</p>

<p>
	&nbsp;</p>

<p>
	<strong>About PayU </strong></p>

<p>
	PayU, India&#39;s leading diversified fintech platform with Prosus as an investor, operates businesses that are regulated by the Reserve Bank of India and offers advanced solutions to meet the digital financial services needs of customers (merchants, banks, and consumers). PayU provides payment gateway solutions to online businesses through its cutting-edge and award-winning technology and has empowered 4.5 lakhs+ businesses, including India&#39;s leading enterprises, e-commerce giants and SMBs. It enables businesses to collect digital payments across 100+ online payment methods such as Credit Cards, Debit Cards, Net Banking, EMIs, pay-later, QR, UPI, Wallets, and more. It&#39;s a preferred partner in the affordability ecosystem, offering the maximum coverage of issuers and easy-to-implement integrations across card-based EMIs, pay-later options and new-age cardless EMIs. PayU offers e-commerce brands best-in-industry success rates while ensuring a seamless checkout experience.</p>

<p>
	&nbsp;</p>

<p>
	Wibmo, a PayU company, is a global full-stack PayTech company and an industry leader in payment security and digital payments in emerging markets. Wibmo provides market leading authentication and risk TSP services to leading banks in India and 30+ countries.</p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=33439' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=33439</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_wibmo_payu_digitalpayments.png</clientLogo>
      <pubDate>Thu, 09 Oct 2025 13:30:45 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Thiruvananthapuram Gets Smarter with TSCCC Boosting Traffic and Safety]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Traffic Safety and City Command Centre (TSCCC) acts a smart traffic nerve centre, using adaptive signals and real-time camera feeds to ease congestion and improve vehicle flow across the city. Serves as a powerful surveillance and policing tool, supplying high-quality video evidence that supports investigation, crime prevention, and rapid incident response.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/32781_madrassecurity0508.JPG" style="width: 500px; height: 336px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Thiruvananthapuram Gets Smarter with TSCCC Boosting Traffic and Safety</span></span></strong></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">As part of the Smart City initiative, Thiruvananthapuram is witnessing a tech-driven transformation in urban traffic management through the Traffic Safety and City Command Centre (TSCCC). Conceived as an integrated command hub, the TSCCC functions as the nerve centre for regulating traffic, ensuring public safety, and enhancing city-wide surveillance.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">After successful installation, extensive field testing and integration, the command centre was formally inaugurated on 6th February 2024 in the presence of Honorable Chief Minister Sri Pinarayi Vijayan, Honorable Minister Sri M.B. Rajesh, Honorable Mayor Smt. Arya Rajendran, Sri Nagaraju Chakilam IPS (IGP &amp; Commissioner of Police), Sri Nidhinraj IPS (Deputy Commissioner of Police), Sri Rahul Krishna Sharma IAS, CEO and other notable dignitaries. The project was fully commissioned and operational sustainability secured via a 5-year Annual Maintenance Contract (AMC) for continuous upkeep and system monitoring.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The utility of the TSCCC extends far beyond traffic management, emerging as a critical asset in law-enforcement and crime prevention. Access to high-quality surveillance footage has significantly enhanced evidence gathering, accelerated probe timelines, and in many cases, proved instrumental in cracking complex cases. In just a short span, police officials have tapped into the system 923 times, procuring video footages to aid major investigations spanning homicides, chain-snatching, robberies, two-wheeler thefts, child abuse cases, accidents, hit-and-run incidents, and missing person reports.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Several advanced technologies work in tandem to make TSCCC a powerful urban management tool in the city. At the heart of the system is the Traffic Control System, deployed across 57 major junctions.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Complementing this is the Intelligent Traffic Management System (ITMS), in operation at 32 high-traffic intersections. The backbone of ITMS includes Automatic Number Plate Recognition (ANPR) cameras for vehicle tracking and Red-Light Violation Detection (RLVD) cameras for enforcing signal discipline. Together, these tools support round-the-clock monitoring and automated violation capture, boosting deterrence against traffic offences.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">A robust network of city-wide CCTV surveillance further strengthens visibility and security. With fixed bullet cameras and high-zoom pan-tilt-zoom (PTZ) cameras positioned at 93 strategic points, the system uses AI-driven analytics to detect no-parking violations, wrong-way driving, unattended objects, overcrowding, and even conduct appearance-based searches. This 360-degree monitoring capability has vastly improved situational awareness for both traffic managers and law enforcement agencies.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The TSCCC project is a highly successful initiative and has been seamlessly integrated for the command control centre providing camera feeds 24*7 for the safety and security of the city of Thiruvanthapuram.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=32781' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=32781</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_8758_l.jpg</clientLogo>
      <pubDate>Tue, 05 Aug 2025 16:39:47 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[EC-Council Commits USD100 Million to Drive the Future of Cybersecurity Innovation ]]></title>
      <description><![CDATA[<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><a href="https://www.eccouncil.org/" rel="nofollow sponsored">EC-Council </a>, a global leader in cybersecurity education and training, and the creators of world-renowned <a href="https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/" rel="nofollow sponsored">Certified Ethical Hacker (CEH) </a>credential, is taking a transformative step to reshape the future of digital security. EC-Council has announced the launch of a $100 million investment to drive the development of next-gen technologies aimed to accelerate cybersecurity breakthroughs and strengthen global digital defense.</span></span></p>

<p>&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td><img alt="" src="https://www.newsvoir.com/images/article/image1/31810_eccouncil2804.JPG" style="width: 500px; height: 259px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;"><strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">EC-Council Commits $100 Million to Drive the Future of Cybersecurity Innovation</span></span></strong>&nbsp;</p>

<p>&nbsp;</p>

<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The investment coupled with EC-Council&rsquo;s platform support, will boost the next generation of cybersecurity innovation which will redefine the cybersecurity paradigm worldwide. Strategic deployment of the investment will prioritize companies with high growth potential, and which demonstrate exceptional technical innovation, problem-solving capabilities, and tangible impact in strengthening Cybersecurity Defense.</span></span></p>

<p>&nbsp;</p>

<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Companies led by EC-Council certified cybersecurity professionals or those that employ EC-Council certified cybersecurity professionals in key technical and leadership roles will be given priority, aligning with EC-Council&rsquo;s commitment to expertise-driven cybersecurity innovation.</span></span></p>

<p>&nbsp;</p>

<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&ldquo;Our industry stands at a pivotal moment, requiring visionary leadership to counteract an ever-evolving cyber threat landscape,&rdquo;</em> said <strong>Jay Bavisi, Group President, EC-Council</strong>. <em>&ldquo;This initiative is designed to provide not just financial backing but also mentorship, strategic guidance, and global exposure to help these companies create effective security solutions. As a globally trusted cybersecurity brand, we are investing in the future by equipping those who are committed to driving impactful change.&rdquo;</em></span></span></p>

<p>&nbsp;</p>

<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">This initiative builds on EC-Council&rsquo;s two-decade legacy of shaping the global cybersecurity workforce through education, training, and innovation. Its industry-relevant programs; such as Certified Ethical Hacker (CEH), Certified Network Defender (CND), Certified Chief Information Security Officer (CCISO), and Computer Hacking Forensic Investigator (CHFI) have become gold standards in the field. Supporting this commitment to continuous learning is EC-Council Learning, the World&#39;s Largest Online Cybersecurity Course Library, which offers professionals and institutions access to thousands of curated resources that evolve with the threat landscape.</span></span></p>

<p>&nbsp;</p>

<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Further product innovations include CEH powered with AI capabilities, CPENT AI an advanced offensive security program featuring real-time AI-driven test environments and The Hackerverse CTF, EC-Council&rsquo;s immersive cyber range platform that simulates real-world attack scenarios to prepare professionals for live threats.</span></span></p>

<p>&nbsp;</p>

<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The goal of EC-Council&rsquo;s $100 million investment is to ensure that companies in the cybersecurity space with strong technical capabilities and market potential can access capital and resources to accelerate their growth. Companies from any region are encouraged to apply, as EC-Council is committed to creating a global ecosystem of cybersecurity innovation.</span></span></p>

<p>&nbsp;</p>

<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">With cyberattacks becoming increasingly sophisticated, businesses, governments, and individuals face growing risks. EC-Council&rsquo;s investment initiative is designed to ensure the companies with best-in-class products, service offerings and capabilities have the resources and platform to reach the users and enterprises who could benefit the most from their solutions.</span></span></p>

<p>&nbsp;</p>

<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Bavisi</strong> further highlighted the importance of empowering emerging companies, stating: <em>&ldquo;Innovation is not limited to large global corporations or major tech hubs. With the power of today&rsquo;s technology, infrastructure and AI, some of the most disruptive cybersecurity solutions are emerging in recent times by highly specialized companies, with the potential to transform the sector and lead to new business models. Our goal is to ensure these companies have the support they need to thrive, regardless of their size or location.&rdquo;</em></span></span></p>

<p>&nbsp;</p>

<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">For more information on how to apply, visit EC-Council&rsquo;s official website: <a href="http://www.eccouncil.org/supporting-cybersecurity-initiatives" rel="nofollow sponsored">www.eccouncil.org/supporting-cybersecurity-initiatives</a></span></span></p>

<p>&nbsp;</p>

<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About EC-Council</strong></span></span></p>

<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">EC-Council is the creator of the world-renowned Certified Ethical Hacker (CEH) program and a leader in cybersecurity education. Founded in 2001, EC-Council&rsquo;s mission is to provide high-quality training and certifications for cybersecurity professionals to keep organizations safe from cyber threats. EC-Council offers over 200 certifications and degrees in various cybersecurity domains, including forensics, security analysis, threat intelligence, and information security.</span></span></p>

<p>&nbsp;</p>

<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">An ISO/IEC 17024 accredited organization, EC-Council has certified over 350,000 professionals worldwide, with clients ranging from government agencies to Fortune 100 companies. EC-Council is the gold standard in cybersecurity certification, trusted by the U.S. Department of Defense, the Army, Navy, Air Force, and leading global corporations.&nbsp;</span></span></p>

<p>&nbsp;</p>

<p><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">For more information, visit: <a href="http://www.eccouncil.org/" rel="nofollow sponsored" target="_blank">www.eccouncil.org</a>.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=31810' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=31810</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_EC-LOGO.png</clientLogo>
      <pubDate>Mon, 28 Apr 2025 16:51:00 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Data Safeguard Launches ID-PRIVACY, India&apos;s First and Only Comprehensive Privacy Management Suite]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In a landmark step towards empowering India&rsquo;s digital trust ecosystem, <strong>Data Safeguard India</strong> Private Limited (Data Safeguard) today announced the launch of its upgraded flagship platform, ID-PRIVACY&mdash; India&rsquo;s first and only enterprise-grade, comprehensive AI-powered data privacy management suite built specifically for compliance with the Digital Personal Data Protection Act (DPDPA) 2023.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:267px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/31707_Safeguard1504.jpeg" style="width: 267px; height: 400px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Mr. Sudhir Sahu, Founder &amp; CEO, Data Safeguard</span></span></strong></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">ID-PRIVACY is a comprehensive privacy suite designed in India, for India, that goes beyond compliance to enable organizations to embed privacy by design and scale trust. The platform leverages the company&rsquo;s proprietary adaptive CCE&reg; AI Engine to automate compliance and anticipate regulatory changes&mdash;giving organizations a future-proof edge.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Commenting on the launch, <strong>Mr. Sudhir Sahu, Founder &amp; CEO, Data Safeguard</strong> said, &ldquo;<em>With the DPDPA becoming a cornerstone of India&rsquo;s digital trust economy, we aim to be the No. 1 privacy platform in India within the first year of DPDPA rule formalization. ID-PRIVACY is more than a product. It&rsquo;s a privacy movement, built by India, for India, to protect the digital rights of 1.4 billion people</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">ID-PRIVACY offers a comprehensive, AI-native, zero-code platform built from the ground up to address the complexities of today&rsquo;s privacy landscape. Unlike retrofitted global solutions, it is purposefully designed to align with India&rsquo;s DPDPA, as well as international regulations like GDPR, HIPAA, and more.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Mr. Lee Nocon, Co-Founder &amp; CTO, Data Safeguard</strong> added, &ldquo;<em>Privacy tech must evolve faster than cyber threats and regulatory change. ID-PRIVACY is powered by our adaptive AI, which not only automates compliance but anticipates future requirements&mdash;ensuring our customers stay ahead with zero disruption</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Built for Bharat. Built to Scale</strong>. ID-PRIVACY features:</span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Localized consent and purpose management in line with DPDPA Sections 5, 7, and 8</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Real-time breach response automation for timely data principal notifications</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Automated DPIAs, audit logs, and impact assessments</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Full data localization compliance with seamless hybrid-cloud integration</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Rapid deployment in 2 weeks with ROI in 4 weeks</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Unmatched Platform, Unparalleled Reach.</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">ID-PRIVACY is the first unified privacy suite that seamlessly integrates:</span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Consent, Preference and Cookie Lifecycle Management</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Data Discovery, Mapping, Classification and Redaction</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Data Principal Rights Automation (DPAR)</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Risk Monitoring &amp; Breach Notification</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Third-Party &amp; Cross-Border Data Governance</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">AI-powered Privacy Copilot for CXOs &amp; DPOs</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">More than a compliance tool, ID-PRIVACY acts as a catalyst for ethical governance, digital citizenship, and responsible innovation in the world&rsquo;s largest democracy. By equipping enterprises with the tools to navigate evolving privacy regulations with precision and integrity, ID-PRIVACY can help build a resilient, trustworthy foundation for sustainable digital transformation.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Data Safeguard India Pvt. Ltd.</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Data Safeguard India Pvt. Ltd. is India&rsquo;s leading Privacy-Tech company, driving the country&rsquo;s digital privacy transformation through its AI-first platform, ID-PRIVACY. With a dedicated R&amp;D centre in Bhubaneswar and operational presence across Bengaluru, Delhi, Mumbai, and Pune, the company is deeply embedded in India&rsquo;s privacy ecosystem. Recognized as a Top 50 Disruptor by CNBC in 2024 &amp; 2025, winner of the Best DPDPA Compliance Platform by the India Tech Awards, and Best Universal Consent Management Platform by Concur Consent Manager, Data Safeguard is committed to empowering ethical AI, data dignity, and future-ready governance.&nbsp;</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=31707' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=31707</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_datasafelogo.JPG</clientLogo>
      <pubDate>Tue, 15 Apr 2025 17:55:41 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Odyssey Technologies Launches First-of-its-kind Global Solutions for Secure Digital Communication]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><a href="https://www.odysseytec.com/" rel="nofollow sponsored">Odyssey Technologies</a> Limited (ODYSSEY | 530175 | INE213B01019), a Chennai based listed company specializing in information security products and services for close to three decades has just released two software products. These products, styled xorkeesign mail and xorkeesign Spot address a very critical and global problem faced today and could potentially help 200 million email users and over a billion smart phone users.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/31560_odyssy2803.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Odyssey Technologies Launches First-of-its-kind Global Solutions for Secure Digital Communication</span></span></strong></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Sometime in the last couple of years, a new term entered the popular imagination and took hold there. The term is called &lsquo;Digital Arrest&rsquo;. Though not a legitimate legal term this seems to have taken firm roots in the public consciousness.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">While digital arrest scams have caused significant damage, there are other kinds of digital frauds that have been on the rise as well. We have identity thefts, digital blackmail and extortion, ransomware attacks and all of them have been on the rise. In spite of security advisories and software vendors issuing security patches to their software at an increased pace these attacks are not abating. The problem is also global in nature and even the U.S citizens are given only cautions and advisories for their Toll Text and other Scams but no solution.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In his comments, <strong>Mr. B. Robert Raja, Chairman and Managing Director, Odyssey Technologies</strong> said, &ldquo;<em>It only shows that whatever is the root cause of these problems is, it is not being addressed by any of these measures. Odyssey, with its experience in providing security software for sensitive financial segments came to the finding that most of these problems can be traced to a single root cause, which is asymmetry of digital identity. The hackers and other bad guys know who their victims are but the victims are sadly ignorant</em>.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>The products Odyssey releases today address this problem directly. By providing a way for senders to authenticate their mails, SMS and other messages, the hackers cannot wear their convenient masks anymore and the victims now have the power.</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>The situation is not unlike when we were in the midst of the pandemic when all and sundry measures like social distance and wearing masks and sanitizing hands were suggested and enforced but in the end it was a vaccine that eliminated the threat completely. It is the equivalent of a software vaccine we are releasing today</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">xorkeesign Mail is a browser or mail client extension software that provides for senders to digitally sign their mails and for verifiers to verify the signatures. Odyssey offers the verification functionality absolutely free so that the entire emailing population can arm themselves against mail based phishing attacks and other scams. If the users maintain the hygiene of not acting on a mail unless the signature on that is verified, they will remain provably safe.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">xorkeesign Spot, a mobile app brings the same signature feature to SMS and other messages. While there is S/MIME and other server protocols for protecting emails, there is not even any attempted protection of the short messages. Odyssey scores a global first in allowing message senders to digitally sign their messages and the recipients to verify them.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">xorkeesign Spot also can be used to ask a user to prove his identity. This can happen when two users engage in a voice or video call or even in a personal meeting. While images of ID Cards, voices and even video can be easily faked, xorkeesign offers an identity that is based on cryptography and cannot be faked even by an AI.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Odyssey has also made additions to its AltaSigna Enterprise software for large organizations to distribute millions of digitally signed mails and SMS to their customers and prospects. Verification for the customers is already free.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The identity recognized by xorkeesign is digital certificate based either directly or attested by a digital certificate holder for other people in his organization thus making it economically viable for even enterprises that want to empower thousands of their employees. The organizations can also attest extended and context-specific attributes of their employees &ndash; A doctor&rsquo;s specialization can be attested by the hospital, a lawyer&rsquo;s by his law firm and a researcher&rsquo;s by his university. The subjects can also determine the attributes they need to reveal or hide depending on the need. This would also make the xorkeesign Spot app the answer to the problem of social media in ascertaining the users&rsquo; age without accessing any of his other private data</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">We expect between them xorkeesign mail and xorkeesign Spot will let the target user base of 200 million email users and over a billion mobile users to stay secure from scams of any kind. We also hope that as this usage increases, the scam statistics for the country will move towards zero.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Availability</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">xorkeesign Mail and xorkeesign Spot are now available for businesses and individuals. For verification both are absolutely free for use and signers pay a subscription.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">To learn more or request a demonstration, visit <a href="http://www.odysseytec.com/xorkeesignmail" rel="nofollow sponsored">www.odysseytec.com/xorkeesignmail</a></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Odyssey Technologies Limited</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Odyssey Technologies Limited is an information security company headquartered in Chennai, India, with experience in developing security solutions for businesses and individuals. The company specializes in authentication frameworks and digital signature solutions that ensure trust and integrity in digital interactions.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In recent years, Odyssey has sought to expand the scope of public key usage well beyond traditional PKI by building a more comprehensive and inclusive framework styled xorkeeTM. Built on this framework, Odyssey&#39;s current solutions go beyond traditional digital signature applications. xorkeeTM has also pioneered its plug-and-play architecture for DSC tokens even on mobile phones for the first time ever. Its product portfolio includes document signing software, transaction authentication solutions, and government-to-citizen (G2C) extensions for services like tax filing, GST, EPFO, etc. Odyssey also offers xorkeeauth, a password and OTP-free, simple public key-based authentication that is usable for everything from web logins to large transactions worth millions of rupees. This aligns with the Reserve Bank of India&#39;s push for OTP-free and better authentication systems.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Odyssey focuses on practical, reliable solutions that seamlessly work with existing systems to address the evolving demands of industries and public services. Through its innovative approach, Odyssey enables organizations to secure digital interactions, build trust, and enhance operational efficiency.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=31560' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=31560</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_odyssylogo.JPG</clientLogo>
      <pubDate>Mon, 31 Mar 2025 12:22:57 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Unified Voice Communication Conducts Cybersecurity Workshop; Announces Partnership with VTF University, USA]]></title>
      <description><![CDATA[<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The workshop activities covered various types of cyber-attacks such as spyware, viruses, ransomware, and worms as well as &ldquo;cyber hygiene&rdquo; and cyber security measures to protect digital assets</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The Chennai-based <a href="https://unifiedvoice.in/services/" rel="nofollow sponsored">Unified Voice Communication</a>, a leading Voice over IP (VoIP) service provider in India and Philippines, recently organised a one-day workshop on cybersecurity. This initiative aimed to equip IT networking and infrastructure management professionals with the latest knowledge and tools to counter evolving cybersecurity threats.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" border="0" cellpadding="1" cellspacing="1" style="width: 450px;">
	<tbody>
		<tr>
			<td>
				<img alt="https://www.newsvoir.com/images/article/image1/30952_UVC_image.jpg" src="https://www.newsvoir.com/images/article/image1/30952_UVC_image.jpg" style="width: 450px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Unified Voice Communication Conducts Cybersecurity Workshop; Announces Partnership with VTF University, USA</span></span></strong></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The workshop witnessed enthusiastic participation from IT professionals such as IT heads, system administrators, network engineers, and infrastructure management experts across IT and ITES sectors in the city. The sessions were led by two eminent cybersecurity experts: Mr. Tarun Malhotra, Lead Auditor in Cybersecurity, and Mr. Dheeraj Sharma, Cybersecurity Specialist.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The topics covered included: The workshop covered various types of cyber-attacks such as spyware, viruses, ransomware, and worms known as malware; phishing, spoofing, backdoor trojan, password attacks, IoT attacks, and cryptojacking. Participants were sensitised to use strong passwords, update software, exercise caution before clicking on links from unknown sources, enable multi-factor authentication, and other &ldquo;<strong>cyber hygiene</strong>&rdquo; measures.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">During the event, Unified Voice Communication announced a significant partnership with VTF University, USA&mdash;a nonprofit organisation dedicated to advancing cybersecurity education globally. Under this collaboration, Unified Voice Communication has been appointed as the program&rsquo;s representative and subject matter expert in India. This partnership will enable the delivery of specialized certification programs, workshops, and interactive training sessions in cybersecurity, further enhancing professional education for Indian IT professionals.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Speaking at the event, Mr. Krishnan Nagarajan, Director, said that taking strong cybersecurity measures provide a wide range of benefits for organisations such as: protection of sensitive data, prevention of financial loss, business continuity, enhanced reputation, rapid incident response, increased customer trust, and compliance with regulations.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">He also pointed out that cyberattacks have grown increasingly sophisticated. However, human error remains the leading cause of damage to digital assets. It requires the right knowledge and tools to prevent cyberattacks.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Mr. Krishnan Nagarajan</strong> added that cybersecurity is a shared responsibility among internet service providers (ISPs), system administrators, and end users. &ldquo;<em>Hence, as a leading ISP committed to fostering a safe digital environment for our clients, we organised this workshop to share insights into the latest cybersecurity threats and trends. And to provide hands-on experience for the participants in configuring firewalls, setting access controls, and ensuring compliance with security standards such as HIPAA and SOC2</em>.&rdquo;</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">On the strategic collaboration with VTF University, he noted&nbsp;&ldquo;<em>We are proud to collaborate with VTF University to deliver cutting-edge cybersecurity education and training. Participants will earn 1 Continuing Professional Education (CPE) credit for every 50 minutes spent in Unified Voice Communication-led sessions, helping professionals maintain their skills and credentials</em>.&rdquo;</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">For more details, please visit: <a href="http://www.unifiedvoice.in/" rel="nofollow sponsored">www.unifiedvoice.in</a></span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Unified Voice Communication</strong><br />
	Unified Voice Communication, headquartered in Chennai, offers a comprehensive range of telecom services, including: VoIP solutions, Free unlimited calls, Business SMS, and Virtual receptionists. As a Tier 1 service provider with over 20 years of expertise and a team of 100+ professionals, the company has a strong presence in the Indian cities of Chennai, Bengaluru, Pune, Hyderabad, Noida, Mumbai, Pune, Ahmedabad, besides Manila and Delaware. Its offerings include inbuilt call analytics, single routing plans, and SIP termination protocols, ensuring seamless and efficient communication solutions.</span></span></p>

<p>
	&nbsp;</p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=30952' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=30952</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_unified-logo.jpg</clientLogo>
      <pubDate>Thu, 30 Jan 2025 12:33:50 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[EC-Council Unleashes AI-Powered Ethical Hackers on Cybercrime]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>EC-Council</strong>, a world leader in cybersecurity certification, education, training, today announced the launch of Certified Ethical Hacker CEH v13 with AI-powered capabilities, a first-of-its-kind certification in cybersecurity. Long recognized as the #1 ethical hacking certification in the world, the new and improved groundbreaking program integrates artificial intelligence (AI) learning into ethical hacking practices, giving professionals advanced skills and tools to battle global cybercriminals.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:450px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/29634_EC.jpg" style="width: 450px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><strong><span style="font-family:arial,helvetica,sans-serif;">The new CEH v13 now with the AI Edge</span></strong></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">CEH v13 provides in-depth training by integrating AI into all five phases of ethical hacking, from reconnaissance and scanning to gaining access, maintaining access, and covering tracks to help bridge the AI Chasm. Through the course, learners will be equipped to leverage AI to enhance their hacking techniques, hack AI systems to automate their ethical hacking tasks while driving up to 40% efficiency in cyber defense and doubling their productivity.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">&ldquo;<em>AI has already begun to radically transform the cybersecurity landscape</em>,&rdquo; said <strong>Jay Bavisi, Group President of EC-Council</strong>. &ldquo;<em>The launch of CEH v13 represents a major leap forward in cybersecurity education, with AI taking center stage in the curriculum. As AI tools for both attackers and defenders continue to proliferate, building AI skills is already becoming a key factor for employers looking to hire and retain cybersecurity talent</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Inspired by the findings of EC-Council&rsquo;s <a href="https://www.eccouncil.org/cybersecurity-exchange/whitepaper/eccouncil-ceh-cybersecurity-threat-report-ai-report/">2024 CEH Threat Report</a>, the CEH v13 program is designed to leverage a unique four-phase learning framework based on the principles of Learn, Certify, Engage, and Compete, offering current and prospective cybersecurity professionals comprehensive knowledge of AI in cybersecurity through courses and hands-on learning experiences. The program includes 221 labs, attack vectors, hacking tools, a lab environment which simulates real-time environment and a Capture the Flag global hacking competition which will run all year long. The year-long competition allows individuals to continually sharpen their skills as needed while keeping them prepared to operate and defend in an increasingly complex cyber environment.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">As part of the CEHv13 program, trainees will participate in 40 hours of rigorous training though instructional practice and education, followed by a yearlong, month-to-month competition across various technologies to help learners obtain world class operational skills in ethical hacking.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Course participants will experience more than 550 attack techniques and 4000+ commercial grade security tools.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Key highlights of CEH v13 include:</strong></span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>World&#39;s first ethical hacking program harnessing the power of AI</strong></span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Master AI-driven skills and Learn Hacking AI systems:</strong> Learn to leverage AI for enhanced hacking techniques and how to identify and exploit vulnerabilities in AI systems.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Core domains of Cybersecurity:</strong> CEH strengthen your core domains of cybersecurity with a practical learning approach, which enables CEH to map across 45+ job roles over many industries.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Focus on the OWASP Top 10 AI Attacks: </strong>Gain expertise in mitigating threats like prompt injection, insecure output handling, training data poisoning, and more.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>221 hands-on labs and 4000+ commercial-grade hacking tools:</strong> Develop practical skills in a real-time simulated environment.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Knowledge-Based and Practical Exam:</strong> Validate your skills with both a 4-hour, knowledge-based exam and a 6-hour, fully practical exam as part of the CEH Master program.</span></span></p>
	</li>
</ul>

<p style="margin-left:.5in;">
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">For more information about the Certified Ethical Hacker CEH v13, visit <a href="https://www.eccouncil.org/train-certify/certified-ethical-hacker-ceh/?utm_source=PR&amp;utm_medium=earned&amp;utm_campaign=axiom">www.eccouncil.org/cehv13ai/</a>.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About EC-Council</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">EC-Council invented the Certified Ethical Hacker. Founded in 2001 in response to 9/11, EC-Council&#39;s mission is to provide the training and certifications apprentice and experienced cybersecurity professionals need to keep corporations, government agencies, and others who employ them safe from attack.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Best known for its Certified Ethical Hacker program, EC-Council today offers 200 different pieces of training, certificates, and degrees in everything from Computer Forensic Investigation and Security Analysis to Threat Intelligence and Information Security. An ISO/IEC 17024 Accredited Organization recognized under the U.S. Defense Department Directive 8140/8570 and many other authoritative cybersecurity bodies worldwide, EC-Council has certified over 350,000 professionals across the globe. EC-Council is the gold standard in cybersecurity education and certification, trusted by seven of the Fortune 10, half of the Fortune 100, and the intelligence communities of 150 nations.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">A truly global organization with a driving belief in bringing diversity, equity, and inclusion to the modern cybersecurity workforce, EC-Council maintains 11 offices in the US, the UK, India, Malaysia, Singapore, and Indonesia.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The company can be reached online at <a href="https://www.eccouncil.org/">www.eccouncil.org</a>.</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Press Contact: <a href="mailto:press@eccouncil.org">press@eccouncil.org</a>.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=29634' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=29634</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_EC-LOGO.png</clientLogo>
      <pubDate>Tue, 24 Sep 2024 10:00:38 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Bureau Sets the Standard in Combating Money Mule Fraud at GFF 2024]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The Money Mule Score is a groundbreaking solution developed by <a href="https://www.bureau.id/">Bureau</a>, an all-in-one identity platform for Compliance and Fraud decisions, to combat financial crime by identifying and preventing the misuse of financial systems through money mule accounts&mdash;those used by criminals to launder money or conduct illicit transactions. Utilizing advanced algorithms and comprehensive data analysis, Bureau&rsquo;s Money Mule Score evaluates numerous risk factors, helping financial institutions safeguard their ecosystems from fraudulent activities.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">While this product has already saved $9 million since its inception in April 2024 and has been adopted by 3 of the top Indian banks and several more in the testing phase, the financial capital got to see it in action at their booth during the Global Fintech festival held between 28th and 30th August in Mumbai.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The pressing need for such solutions was evident at the largest global fintech festival held at Mumbai. Prime Minister Narendra Modi, in his address, was quick to point out, &ldquo;No matter what schemes are introduced, cyber fraudsters find a way,&rdquo; underscoring the need to develop technology that can adapt and evolve as fraudsters evolve. In his address, the Governor of the Reserve Bank of India, Shaktikanta Das, also emphasized the critical importance of real-time monitoring and regulatory compliance<strong><em>.&nbsp;</em></strong></span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">These calls-to-action all point to an urgent need for collaboration between all stakeholders, including banks, NBFCs, regulators, authorities, and most importantly tech providers that can stay ahead of evolving sophisticated fraud tactics undertaken by money mule recruiters.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Both the National Payments Corporation of India and the Reserve Bank Innovation Hub took to the stage to announce their upcoming projects aimed at fighting the mule pandemic. The central concern remained reducing the time needed to detect fraud.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">&quot;<em>Most financial institutions today have rule-based engines that create lakhs of alerts for potentially fraudulent transactions. Then a team of analysts sift through them trying to separate the false positives. By the time this process is done, the money has already passed through an entire network of mule accounts. Reducing this time from transaction to detection is the need of the hour, and this can only be done with sophisticated AI technology,</em>&quot; <strong>Rajesh Bansal - CEO, RBiH </strong>during a panel discussion at GFF.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Bureau is one step ahead. Instead of a reactive approach, its technology aims to identify potential mule accounts proactively right at the time of onboarding.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Bureau has maintained its position as the first line of defense for financial institutions against mule activity purely because of its wide range of solutions, deep expertise in the field, and a holistic approach to eradicating money mules from the financial ecosystem.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Initially designed to detect mules during the onboarding process, Bureau&#39;s latest evolution of the Money Mule Score, introduces a more advanced method for detecting mules at onboarding as well as dormant mules.&nbsp;By leveraging link analysis that powers a proprietary <strong>Graph Identity Network</strong>, Bureau&#39;s unique solution now also excels in identifying mule accounts coming out of dormancy. These typically show signs of account takeovers by fraudsters, peddlers who sell their accounts, or the accounts of mule scam victims.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&ldquo;Mules are such an invasive issue in the ecosystem, especially considering the frontline victims are always genuine customers, many of them belonging to the lower strata of the economy.&rdquo; </em>The dangers posed by mules post the account opening stage were highlighted by a spokesperson from a bank in India with $5 billion in deposits while speaking to the Bureau team at GFF.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Having already identified 300k mules across the ecosystem, Bureau has reinforced trust within the community and has helped protect genuine customers from engaging in financial services safely. Bureau&rsquo;s score has a proven record of higher accuracy on True Positives of fraudulent actors, leading to a ~45% reduction in operation costs for its clients because of its ability to bring down the need for enhanced due diligence for account opening purposes.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Bureau&rsquo;s CTO, Sandesh GS</strong>, during a GFF panel discussion, emphasized how, &quot;<em>With technology that passively operates in the background, we verify individuals in milliseconds, enabling seamless transactions. Our platform is able to process signals from over 600 million verified identities without disrupting the user experience.</em>&rdquo;<br />
	&nbsp;</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Bureau remains dedicated to its vision of enabling trust-driven digital interactions while preserving a seamless user experience for genuine customers.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=29417' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=29417</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_Bureau-logo.png</clientLogo>
      <pubDate>Fri, 06 Sep 2024 12:22:38 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[How to Prevent Cybercrime: Advanced Phishing Detection and Prevention Strategies]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Cybercrime refers to criminal offences committed against individuals, businesses, governments, or other organizations using digital technologies, including computers, mobile devices, and the Internet, as a means or target for the commission of the offence. This encompasses a range of criminal activities, including phishing, which is a type of cyber-enabled fraud that involves the use of social engineering tactics, such as fraudulent emails, websites, and other digital platforms, to deceive individuals into divulging sensitive personal data, such as authentication credentials, financial information, or other confidential details. Phishing is a common technique used in cybercrime to gain unauthorized access, use, disclosure, disruption, modification, or destruction of computer systems, networks, or electronic data, ultimately leading to malicious purposes, including identity theft, financial fraud, and other forms of cybercrime.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:276px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/28551_layer7.JPG" style="width: 276px; height: 400px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Jinendra Khobare, Solution Architect, Sensfrx, Secure Layer7</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Phishing is a rapidly growing internet crime, with a reported 65% increase in phishing attacks in 2020 compared to the previous year. To combat phishing, it is essential to employ advanced security measures that combine user education and awareness with technical controls, such as multi-factor authentication and web filtering, to prevent financial losses and protect sensitive user data from being compromised.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">A more targeted and sophisticated form of phishing is spear phishing, which focuses on specific individuals or groups, often because they have access to valuable information or resources. In spear phishing attacks, the attacker typically researches the target&#39;s personal and professional relationships, interests, and online behavior to craft a convincing and personalized message. Once the attacker gains access to the target&#39;s system, they may use the victim&#39;s contact lists to launch further attacks on friends, family, co-workers, and business contacts, creating a ripple effect of compromise and data breaches. By understanding the differences between phishing and spear phishing, individuals and organizations can better prepare themselves to detect and respond to these types of threats. For example, once a victim&rsquo;s social networking account has been compromised, attackers can use the victim&rsquo;s account to communicate with the victim&rsquo;s social network. Attackers do not limit themselves to attacking their target&rsquo;s corporate accounts and will seek to compromise the personal systems of Information Workers knowing that these systems often have remote access to corporate assets.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Anti-Phishing Measures</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">To combat the escalating threat of phishing, various countermeasures have been developed by the Anti-Phishing Working Group (APWG). The Anti-Phishing Working Group (APWG) is a global coalition of industry, law enforcement, and government agencies working together to combat phishing and other forms of cybercrime through information sharing, research, and advocacy. APWG aggregates phishing reports and shares intelligence with its members. Advanced security tools, such as browser extensions and built-in features, aid in detecting phishing attempts.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Internet search engines and web browsers play a crucial role in identifying and mitigating phishing sites. By continuously indexing billions of web pages and allowing users to report suspicious sites, they help protect users from malicious URLs and IP addresses. Users are warned when attempting to access known phishing websites, thanks to integrated and regularly updated blocklists</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Advanced Techniques in Phishing Detection</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Researchers have explored advanced techniques to enhance phishing detection, including the combination of weak classifiers, ensemble-based classifiers, and machine learning algorithms. These approaches have shown promising results, with some studies achieving detection rates of up to 95% as reported by S. Rao and his team in their paper &quot;<strong>Phishing Detection using Machine Learning</strong>&quot; in 2020 and reducing false positives by up to 70% as found by A. K. Singh and his team in their paper &quot;<strong>A Survey on Phishing Detection Techniques</strong>&quot; in 2019.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The effectiveness of anti-phishing tools is evaluated through usability studies done by M. E Whiteman in his paper Evaluating the Effectiveness of Anti-Phishing Tools, which have revealed that these tools can reduce phishing susceptibility by up to 50%. Large-scale online learning has also been employed to identify suspicious URLs, with some systems achieving accuracy rates of up to 90% as reported by Y. Zhang and his team in their paper &quot;<strong>Phishing URL Detection using Online Learning</strong>&quot; in 2020. Moreover, innovative approaches such as DNS-poisoning-based phishing attack detection and multiple classifier combination have been shown to disrupt the phishing ecosystem, forcing attackers to evolve their tactics. The implications of these advancements are significant, with the potential to prevent millions of dollars in losses and protect sensitive user data from being compromised.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>The Functioning of the Phishing Detector in Sensfrx: An Overview</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The phishing detector in Sensfrx serves as an advanced barrier against cyber threats, specifically designed for users with limited technical expertise. It operates in real-time, examining URLs during user interactions and meticulously analyzing their structures and content for potential signs of phishing. The detector&rsquo;s primary advantage is its integration with a machine learning model that continuously learns from a diverse dataset of phishing URLs. This model employs a combination of character-level and word-level CNNs to analyze URLs, utilizing techniques such as text vectorization, embedding, and convolutional neural networks to extract features and detect phishing patterns.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">For users without technical proficiency, this translates into an automated protective mechanism that operates unobtrusively in the background, providing proactive protection without necessitating user intervention. The model&rsquo;s dynamic learning process bolsters user confidence by offering a vigilant guard against phishing attempts. The ease of integration into existing security frameworks makes Sensfrx accessible to users without specialised knowledge, thereby providing a user-friendly interface for enhanced cybersecurity in the rapidly evolving digital world.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The machine learning model&rsquo;s dynamic learning process is a key feature, instilling confidence in users by ensuring that the system remains vigilant against evolving phishing techniques. The model&rsquo;s ability to adapt to new threats and learn from real-world scenarios makes it a robust and reliable companion in the ever-changing landscape of cyber threats.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Notably, the phishing detection mechanism integrated into Sensfrx is designed with user-friendliness in mind. It can be easily incorporated into existing security frameworks, making it accessible to a broad range of users, regardless of their level of cybersecurity expertise. The intuitive user interface provides a seamless experience, empowering users to effectively defend against phishing attacks without requiring specialized knowledge.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Conclusion</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In conclusion, phishing is a multifaceted online threat with diverse tactics and significant implications for user security and data integrity. On the internet, malware hosting websites are more prevalent than phishing websites. Consequently, drive-by download attacks and malware distribution websites may be overlooked in a cybersecurity strategy that concentrates on phishing attack mitigation but leaves out mitigations for higher likelihood threats. Bulgaria, Ukraine, and Indonesia are among the places where there have previously been higher than usual numbers of phishing sites.</span></span></p>

<p>
	&nbsp;</p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Turn on Two-Factor Authentication: Enhance security by enabling two- or multi-factor authentication to reduce phishing vulnerability.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Cybersecurity Software: Choose reputable cybersecurity software for identifying and thwarting phishing attempts.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Workers&rsquo; Education: Decrease the likelihood of falling prey to phishing by providing frequent employee training on safe data handling and recognizing phishing signs.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Take Care When Sending Emails: Be cautious of all received emails, checking for spelling errors, urgent subject lines, corporate information, and verifying trustworthiness and the existence of readily available phishing kits simplifies the process, allowing virtually anyone to launch a phish</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	Article by: <strong>Jinendra Khobare, Solution Architect, Sensfrx</strong>,&nbsp;<a href="https://securelayer7.net/home">Secure&nbsp;Layer7</a>.</p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=28551' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=28551</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_image.png</clientLogo>
      <pubDate>Thu, 06 Jun 2024 16:53:59 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Zupee Joins Forces with Gurugram Cyber Police to Promote Cyber Security Awareness]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In its bid to strengthen the cyber security ecosystem, <strong>Zupee</strong>, India&rsquo;s largest skill-based Ludo platform, has partnered with the Gurugram Cyber Police, for the 11th edition of the Cyber Security Summer Internship Program, called &lsquo;Cyber Warriors&rsquo;. The Gurugram Police Cyber Security Summer Internship Program (GPCSSI 2024) is a flagship event of the Gurugram Police since 2013. The month-long internship starts today, with Zupee as its knowledge partner.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td style="text-align: center;">
				<p>
					<img alt="" src="https://www.newsvoir.com/images/article/image1/28526_zupee0306.JPG" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></p>
			</td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">L<strong>-R Dr. Rakshit Tandon, Mr. Rubaab Sood, ACP Priyanshu Dewan, DCP Siddhant Jain, Charu Maini, Principal DAV School, Sec49 Gurugram</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The event was inaugurated in the esteemed presence of Commissioner of Police, Gurugram, Shri Vikas Kumar Arora, along with Shri Siddhant Jain, DCP - South Gurugram, Shri Priyanshu Dewan, ACP Cyber Crime, Gurugram Police, Mr. Ashwani Rana, Chief of Policy at Zupee and Mr. Rubaab Sood, Associate Director - Policy at Zupee.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">This year witnessed an overwhelming response, with 15,000 applications received and 1,100 interns selected from across India &amp; overseas. Of this, 550 candidates, including working professionals and college goers above 18 years of age, will be trained under the Gurugram Cyber Police Department under the guidance of Cyber Security Expert Dr. Rakshit Tandon. The training is structured to provide young minds with an immersive experience in the field of cyber security, promoting cyber safety and building a network of law-abiding netizens. Post the completion of the program, few selected candidates will gain hands-on experience by working directly with the Gurugram Cyber Police, tackling real-world cybersecurity challenges.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Addressing the gathering, <strong>Commissioner Gurugram Police, Shri Vikas Kumar Arora</strong>,<strong> said</strong><em>, &ldquo;We are always in pursuit of excellence for our Cyber Crime Detection Unit, and we understand the need to actively promote cybersecurity among the public. With the help of the latest technology, we are updating public interface systems and internal police processes, which will enable the department to improve our efficiency, effectiveness and transparency. With this internship, we want to work with engineering and management students and leverage their assistance to enhance the process.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Sharing his thoughts on the collaboration,<strong> Mr. Ashwani Rana, Chief of Policy, Zupee</strong>, mentioned, <em>&quot;At Zupee, we&#39;re deeply committed to fostering a safer online environment and promoting responsible gaming. With our honorable Prime Minister Narendra Modi&#39;s vision of achieving a 1 trillion dollar digital economy, we recognize the pivotal roles that the digital and online gaming sector will play. We believe in the importance of promoting a safe cyber environment to contribute to this monumental growth. Zupee is honored to lead this cyber security training program with Gurugram Cyber Police, a partnership that signifies a significant step towards nurturing a generation of responsible digital nagriks.&quot; </em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Shri Siddhant Jain, DCP-South Gurugram, </strong>expressed<em>, &quot;We are in the 11th edition of the Gurugram Police Cyber Security Summer Internship. Our flagship program began with 22 interns in 2013, and has grown to be a strong force of 1100 bright minds today. This internship stands as a testament to our unwavering commitment to fostering a generation of cyber-aware citizens. The interns represent students all across the nation united by a common goal to become the backbone of India&rsquo;s cybersecurity. We received an overwhelming response with 15,000 applications in a week, which is a clear indication of the growing importance of the program.&quot;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Emphasizing the importance of the internship, <strong>Dr. Rakshit Tandon, Cyber Security Expert</strong>, said, <em>&ldquo;We started this journey in 2013 and today, we have several cybersecurity experts from previous batches engaged with the Armed Forces and other key organizations. All these students, who belonged to different walks of life, interned for the Cyber Warriors program with Gurugram Cyber Police.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The collaboration between Zupee and the Gurugram Cyber Police for the Cyber Warriors Program highlights collective efforts on the part of both the organizations to offer comprehensive training on crucial aspects of cyber safety, while also striving to build a community of well-informed, vigilant digital citizens, paving the way for a more secure and informed digital future.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=28526' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=28526</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_zupee_logo.png</clientLogo>
      <pubDate>Mon, 03 Jun 2024 14:54:09 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Introducing The World&apos;s First AI Call Scanner by Truecaller: The Fastest & Most Accurate AI Voice Scam Detection System
]]></title>
      <description><![CDATA[<p>
	Three seconds! That&rsquo;s how much of your voice an AI voice synthesizer needs to generate a complete clone of your voice. Illegitimate voice cloning and speech synthesis technologies are improving at an incalculable rate of change and are, unfortunately, already commoditized and ubiquitous. This next wave of AI scams will prey on the most vulnerable side of our psyche: the threat of our loved ones in danger.&nbsp;</p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/28490_true2905.JPG" style="margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Introducing The World&rsquo;s First AI Call Scanner by Truecaller</span></span></strong></p>

<p>
	&nbsp;</p>

<p>
	Truecaller, the world&rsquo;s leading global communications platform, is proud to announce the latest salvo in its arsenal of spam and scam fighting abilities: the <strong>AI Call Scanner</strong>. AI Call Scanner is trained to detect and differentiate between human voices and AI-synthesized voices, empowering people to safeguard themselves against potential scams and fraudulent activities.<br />
	&nbsp;</p>

<p>
	The AI Call Scanner is built right into the Truecaller Android app, is part of the Premium subscription and is being rolled out in the US first, followed by India and other top Truecaller markets. The system is designed with simplicity and effectiveness in mind. If a person receives a suspicious call, all they have to do is tap a dedicated button within the Truecaller interface. The caller&rsquo;s voice is recorded and this voice sample is then processed by our advanced AI model, which has been rigorously trained to identify the unique characteristics of human speech and distinguish it from AI-generated voices. All this happens in just a few seconds and we are proud to launch with a high degree of accuracy.</p>

<p>
	&nbsp;</p>

<p>
	<em>&ldquo;The risks of AI voice scams are increasing due to the proliferation of AI voice synthesizers. Our goal was to find an effective and reliable solution before things got out of hand. I am proud to announce that Truecaller is the world&rsquo;s calling app with AI voice detection built in. Truecaller already uses AI in many different ways and this was a logical and much-needed extension of Truecaller&rsquo;s scam fighting abilities,&ldquo; </em>said <strong>Alan Mamedi, CEO and Co-founder at Truecaller</strong><em>.</em></p>

<p>
	&nbsp;</p>

<p>
	While AI Call Scanner is launching on Android first, we are already exploring avenues for further improvement and expansion, including an imminent iOS launch. Our team is actively researching ways to refine the AI model&#39;s accuracy, reduce response times, and adapt to emerging trends in voice synthesis technology. Additionally, we are considering the potential integration of AI Call Scanner with other communication platforms and devices to extend its reach and impact; for example, building a chatbot where people can forward recorded clips for detection.</p>

<p>
	&nbsp;</p>

<p>
	You can read more about this latest feature (and more) on our official <a href="https://tclr.se/4bzyxOo">blog</a> and <a href="https://tclr.se/3V1wVFS">community</a>.</p>

<p>
	&nbsp;</p>

<p>
	Media colleagues can email us at: <a href="mailto:press@truecaller.com">press@truecaller.com</a></p>

<p>
	&nbsp;</p>

<p>
	<strong>About Truecaller</strong></p>

<p>
	We enable safe and relevant conversations between people and make it efficient for businesses to connect with consumers. Fraud and unwanted communication are endemic to digital economies, especially in emerging markets. We are on a mission to build trust in communication. Truecaller is an essential part of everyday communication for over 383 million active users, with more than a billion downloads since launch and close to 50 billion unwanted calls identified and blocked in 2021. Headquartered in Stockholm since 2009, we are a co-founder-led, entrepreneurial company, with a highly experienced management team. Truecaller has been listed on Nasdaq Stockholm since October, 2021. Visit truecaller.com for more information.&nbsp;</p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=28490' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=28490</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_truecallerlogo.JPG</clientLogo>
      <pubDate>Wed, 29 May 2024 17:00:29 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Trustifi Expands its Global Footprint, Signing with CyberDisti to Cover India, the UAE, & Africa]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><a href="https://pr.report/RrcMEyDN">Trustifi</a>, the premier provider of AI- and cloud-based email cyber security solutions, announced the launch of new geofencing capabilities for its expanding customer base in the United Arab Emirates (UAE). This demand has been primarily driven by an exclusive agreement with <a href="https://pr.report/nQAtkEm-">CyberDisti</a>, a major distributor serving the UAE, India, and Africa. This new development extends Trustifi&#39;s geographic base, which already includes an impressive range of countries such as the US, Canada, Australia, New Zealand, Ireland, Germany, Singapore, and Brazil, a geographic list that represents some of the world&#39;s most technologically advanced nations.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">CyberDisti is one of the leading email security distributors in its market. The company has offices in Mumbai, Kerala, Delhi, Bangalore, and Tamil Nadu in India; Kenya in Africa; Dubai in the UAE; and Oman. This distributor now solely offers Trustifi solutions to its network of managed service providers, giving credence to Trustifi&#39;s position as a one-stop resource for email cybersecurity offerings. Trustifi&#39;s comprehensive suite offers both inbound and outbound security encompassing anti-malware and antivirus, data loss protection, AES-256 encryption with tokenization capabilities, automated compliance to a host of global regulations, smart archiving features, an account takeover protection module, and an integrated new platform providing customizable threat simulation capabilities.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Cybersecurity continues to be a major concern in the UAE and its neighboring nations, as threats compound across the globe following the rise of AI-driven malware. For example, an increase in cybersecurity breaches in the UAE has been documented by Dark Reading, which <a href="https://pr.report/KI1bJSyU">reported that 87% of companies</a> in this region have experienced cyber incidents in the past two years from both external and internal actors. And in India, a December cyberattack on an online government platform, the <a href="https://pr.report/LjwmCNE5">e-Nagarpalika portal of Madhya Pradesh</a>, shut down that body&#39;s services and compromised the data of residents across 412 cities, triggering a <a href="https://pr.report/cHqVglF0">massive loss of revenue</a>.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&quot;Cybersecurity issues are only amplifying as AI-based technologies advance, to the point where it&#39;s becoming near impossible for network users to tell viable emails apart from damaging imposter phishing attempts-and many of the largest breaches in recent memory can be traced to a single password compromise. Companies need to be more proactive and take these risks out of their users&#39; hands by leveraging advanced, AI-based, layered security solutions. CyberDisti understands that, and has taken action for their solution providers,&quot;</em> said <strong>Rom Hendler, CEO and co-founder of Trustifi</strong>.<em> &quot;The fact that CyberDisti has entrusted us to be its sole provider of email cybersecurity solutions is evidence of the wide-ranging capability of our products. We&#39;re proud to be able to extend these AI-based protections to CyberDisti&#39;s customers throughout India-one of the most populated regions in the world-in addition to the UAE and Africa.&quot;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Trustifi&#39;s AI-powered solutions provide superior protection compared to traditional security packages. Too many conventional SEG (security email gateway)-based solutions leverage blacklisting and whitelisting of known malicious IP addresses as their main tactic in filtering threats. Such methods are not adequate in this age of clever AI-generated and social engineering attacks, which lure victims to persuasive mock-ups of known vendor web sites in order to commandeer those users&#39; credentials. In addition, Business Email Compromise (BEC) attacks target high-level personnel, hacking their accounts and composing convincing requests to transfer money via wire. Blacklisting techniques simply can&#39;t detect these more sophisticated strategies. Only advanced AI-trained filters that interpret text and identify ill-intentioned keywords can flag such attempts. Trustifi&#39;s next generation solutions utilize these progressive methods.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&quot;Trustifi&#39;s suite incorporates such a powerful range of capabilities, we felt they presented considerable benefits over many less-versatile email cybersecurity options,&quot; </em>said <strong>Jibu John, CEO of CyberDisti.</strong> <em>&quot;Trustifi offers a born-in-the-cloud portfolio, developed specifically to address techniques that have developed since the advent of cutting-edge, AI-based threats. Their solutions leverage the same kinds of AI-driven tools to detect and help administrators remediate these advanced attacks. When we weighed these advantages, Trustifi was the clear choice to be our exclusive email cybersecurity provider.&quot;</em></span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Trustifi was recognized in the 2023 Gartner Market Guide for Email Security* for its Outbound Shield, Inbound Shield, and Account Takeover Protection solution. In addition, Trustifi&#39;s solutions have repeatedly been acknowledged through awards from esteemed sources such as CRN, the American Business Association, ChannelVision magazine, Expert Insights, the Cybersecurity Breakthrough Awards, SourceForge, and the &quot;Globee&quot; Business Awards.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">*Gartner, &quot;Market Guide for Email Security&quot;, Ravisha Chugh, Peter Firstbrook, Franz Hinner, 13 February 2023. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner&#39;s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><a href="https://pr.report/LzV7-6kZ">go.trustifi.com/gartner-email</a></span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Trustifi</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Trustifi is a cybersecurity firm featuring solutions delivered on a software-as-a-service platform including sophisticated AI-driven tools. Trustifi leads the market with the easiest-to-use and deploy email security products providing both inbound and outbound email security from a single vendor. The most valuable asset to any organization, other than its employees, is the data contained in its email, and Trustifi&#39;s key objective is keeping clients&#39; data, reputations, and brands safe from all threats related to email. With Trustifi&#39;s Inbound Shield, Data Loss Prevention, Account Takeover Protection, and Email Encryption, clients are always one step ahead of attackers. <a href="https://pr.report/Ap6DYedx">www.trustifi.com</a>.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Follow Trustifi: <a href="https://pr.report/g0q3jbZi">Twitter</a>, <a href="https://pr.report/2u0sWMOD">LinkedIn</a>, and <a href="https://pr.report/W-H3XuBL">Facebook</a>.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=28408' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=28408</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_trustifi-logo.png</clientLogo>
      <pubDate>Wed, 22 May 2024 11:30:11 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Truecaller & Gurugram Police Collaborate to Enhance Safety in Digital Communication ]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Gurugram Police has joined forces with <strong>Truecaller</strong>, the global Caller ID and Spam Blocking app, to build safety in digital communication, combating cybercrime, and raising cyber safety awareness among citizens. The memorandum of understanding (MoU) was signed in the presence of <strong>Shri</strong> <strong>Siddhant Jain, Deputy Commissioner of Police (Cyber Staff), South Gurugram</strong>. Through proactive measures against evolving fraud and scams in the digital space, this partnership seeks to collectively work towards establishing a safe cyberspace for citizens.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">This collaboration includes CyberWise training sessions led by Truecaller in partnership with Gurugram Police to educate citizens on preventing cyber fraud and reporting online harms. Furthermore, Truecaller has expanded its Government Directory Services in Gurugram, by incorporating verified police contact numbers to combat impersonation fraud.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/28112_Truecaller01.png" style="width: 500px; height: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Verified Numbers of Gurugram Police on the Government Directory Services feature on the Truecaller application</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">This integration will empower users to easily identify verified numbers, thereby reducing the risk of falling victim to impersonation scams. In a bid to promote online safety awareness, Truecaller and Gurugram Police will further extend the initiative across the state and support the Utkrisht Society for Safety, a non-profit initiative by Haryana Police. Truecaller is committed to aiding in fostering safety in communication and combating spam and fraud, thereby contributing to a safer digital ecosystem.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Sharing his thoughts on the partnership, the commissioner of Police, Gurugram, <strong>Shri Siddhant Jain, Deputy Commissioner of Police (Cyber Staff), South Gurugram </strong>said<em>, &quot;Gurugram Police is actively dedicated to increasing cyber safety awareness and empowering citizens to stay safe online. The ongoing challenges of cyber fraud are concerning, as Gurugram Police receives around 100-120 complaints daily, with an average monthly loss of ₹40 crore due to cyber fraud. To combat this, our collaborative efforts with Truecaller aim to reduce the impersonation of Gurugram Police officials by verifying official numbers through Truecaller&rsquo;s Government Directory Services. Through the cyber safety training sessions, our mission is to provide citizens with the essential knowledge and skills needed to make informed choices for their protection while harnessing opportunities in the digital world. We look forward to working collaboratively with Truecaller to ensure the safety of citizens in Gurugram and across the state.&rdquo; </em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Sharing his thoughts on the partnership,<strong> Mr Rishit Jhunjhunwala, Chief Product Officer and Managing Director at Truecaller India</strong>, said<em>, &quot;Truecaller is committed to working with law enforcement agencies and the government to curb online frauds and ensure cyber safety of citizens. This MoU marks a significant stride in our efforts to work alongside law enforcement in addressing the escalating number of fraud cases, including preventing the impersonation of police officials through verification on the Government Directory Services. We have previously also partnered with other law enforcement agencies such as Delhi Police and Assam Police as part of our initiatives to combat online fraud. Moreover, we are actively engaged in enhancing citizens&#39; cyber fraud prevention capabilities through cyber safety training programs.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Truecaller</strong><br />
	We enable safe and relevant conversations between people and make it efficient for businesses to connect with consumers. Fraud and unwanted communication are endemic to digital economies, especially in emerging markets. We are on a mission to build trust in communication. Truecaller is an essential part of everyday communication for over 374 million active users, with more than a billion downloads since launch and close to 50 billion unwanted calls identified and blocked in 2021. Headquartered in Stockholm since 2009, we are a co-founder-led, entrepreneurial company, with a highly experienced management team. Truecaller has been listed on Nasdaq Stockholm since October, 2021. Visit truecaller.com for more information.&nbsp;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">For more information, please contact <a href="mailto:press@truecaller.com">press@truecaller.com</a></span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=28112' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=28112</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_truelogo.JPG</clientLogo>
      <pubDate>Tue, 23 Apr 2024 16:10:25 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Rakuten India Issues Urgent Warning on Fraudulent &quot;R-ole&quot; Scam]]></title>
      <description><![CDATA[<div>
	<p>
		<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Rakuten India Enterprise Pvt. Ltd.</strong>, a key technology hub and development center of Rakuten Group Inc., has issued an urgent warning to the public regarding a fraudulent scheme carried out under the guise of an entity named &quot;<strong>R-ole</strong>&quot;. The company has uncovered unauthorized activities where its brand and leadership identities are being exploited in a scam soliciting personal funds under deceitful pretenses.</span></span></p>

	<p>
		&nbsp;</p>

	<p>
		<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">This scam is mainly spreading through messaging platforms such as Telegram and WhatsApp. It involves over 17,000 subscribers and&nbsp;bogus invitations for an office tour that does not exist, planned from April 1<sup>st</sup> to 3<sup>rd</sup>.</span></span><br />
		<br />
		<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Fake documents such as the &quot;<strong>Activity Flow Sheet</strong>&quot;, which outlines the supposed activities planned during this office tour, and invitations using Rakuten India&rsquo;s office address still continue to circulate. Rakuten India urges the public to remain vigilant and report any suspicious events related to the scam known as &ldquo;R-ole&rdquo;, to the concerned police authorities. Rakuten India takes this matter extremely seriously and is taking firm action to combat the unauthorized use of its brand as part of fraudulent, criminal activity. Rakuten India asserts in the strongest terms that it never solicits financial contributions or personal banking details for any purpose. Rakuten India hopes that by highlighting these developments, unsuspecting individuals will not be duped by the scam.</span></span></p>

	<p>
		&nbsp;</p>

	<p>
		<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Additionally, Rakuten India wants to clarify that no activities are planned at its office in India from April 1<sup>st</sup> to 3<sup>rd</sup>. This should serve as a reminder to remain cautious and not fall victim to this scam.</span></span></p>

	<p>
		&nbsp;</p>

	<p>
		<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Upon the discovery of individuals being duped into an ostensible &ldquo;<strong>R-OLE Business Plan</strong>&rdquo; that falsely claims a partnership with Rakuten India and other reputed brands, Rakuten India has lodged a First Information Report (FIR) with the Cyber Crime Police.</span></span></p>

	<p>
		&nbsp;</p>

	<p>
		<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">A comprehensive investigation is active, and expedient measures are being taken to curb these criminal acts.</span></span></p>

	<p>
		&nbsp;</p>

	<p>
		<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Rakuten India Enterprise</strong></span></span></p>

	<p>
		<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Rakuten India is the global product and innovation centre for&nbsp;Rakuten Group, Inc. Rakuten India enables global businesses in the areas of e-commerce, fintech, advertising, mobile, content and entertainment with deep expertise in the areas of&nbsp;data science and engineering, machine learning, artificial intelligence, cloud, security, distributed systems and more.</span></span></p>

	<p>
		&nbsp;</p>

	<p>
		<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">With around 2000 employees and growing, Rakuten India is housed in Crimson House Bangalore.</span></span></p>
</div>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=27814' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=27814</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_rakut.jpg</clientLogo>
      <pubDate>Thu, 21 Mar 2024 15:52:30 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[The Fusion of Cloud Computing and Cutting-edge Technologies Emerges in Tackling the Deepfake Menace]]></title>
      <description><![CDATA[<div>
	<p>
		<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In an era dominated by digital advancements, the rise of deepfake technology poses a significant threat to the integrity of information and media. Deepfakes, synthetic media created using artificial intelligence algorithms, can convincingly manipulate audio and video content, raising concerns about misinformation, identity theft, and the erosion of trust in media. As this challenge looms large, the marriage of cloud computing and cutting-edge technologies emerges as a crucial defense against the deepfake menace.</span></span></p>

	<p>
		&nbsp;</p>

	<div>
		<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
			<tbody>
				<tr>
					<td>
						<img alt="" src="https://www.newsvoir.com/images/article/image1/27565_deep.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
				</tr>
			</tbody>
		</table>

		<p style="text-align: center;">
			<strong><span style="color: rgb(1, 1, 1); font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-align: center;">Deepfake Menace</span></strong></p>

		<p>
			&nbsp;</p>

		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Cloud computing, with its scalable infrastructure and processing power, plays a pivotal role in both the creation and mitigation of deep fakes. Numerous alarming incidents employing deepfake videos were reported in India in 2023. One such occurrence was actor Rashmika Mandanna, whose face was placed on that of a British-Indian social media celebrity.</span></span></p>

		<p>
			&nbsp;</p>

		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">According to the &quot;<strong>2023 State of Deepfakes Report</strong>&#39;&#39; by &quot;<strong>Home Security Heroes</strong>&quot;, a US-based web security services provider, deepfake films have increased fivefold since 2019, underscoring the urgency of addressing this evolving threat. In this article, we explain, what can be done about the deepfake so far, and how cloud computing and cutting-edge technologies have emerged to tackle the situation.</span></span></p>

		<p>
			&nbsp;</p>

		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>How do Cloud-Based Threat Intelligence Platforms contribute to proactive defense strategies against deepfake?</strong></span></span></p>

		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Mr. Ashish Laddha, Chief Delivery Officer at Quarks Technosoft</strong> explains, &ldquo;<em>Cloud-based threat intelligence platforms play a crucial role in coordinating responses to emerging deepfake challenges and contribute to a proactive defense against deepfake threats. These platforms leverage the collective intelligence gathered from various sources, including global network traffic, user behavior, and known threat databases. In the context of deepfakes, cloud-based threat intelligence platforms can analyze patterns and identify potential threats by monitoring the dissemination of deepfake content across cloud networks. By continuously updating threat databases and sharing real-time insights, these platforms enable a coordinated response among cloud service providers, security professionals, and law enforcement agencies. This proactive defense approach allows for the rapid identification and mitigation of deepfake threats before they can cause significant harm</em>.&rdquo;</span></span></p>

		<p>
			&nbsp;</p>

		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>How can global collaboration enhance the effectiveness of combating deepfake threats on a worldwide scale?</strong></span></span></p>

		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Bhaskar Ganguli, Director of Marketing and Sales at Mass Software Solutions Pvt. Ltd.</strong>, highlights the effectiveness of collaboration on cloud platforms in creating a global network of expertise. Cloud-based collaboration tools foster instantaneous information exchange and group problem-solving, facilitating seamless global cooperation among security experts. This global network enables the quick sharing of threat indicators, detection approaches, and responses, forming a united front against ever-evolving deepfake techniques.</span></span></p>

		<p>
			&nbsp;</p>

		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>How does adaptability play a crucial role in addressing the challenges posed by the constantly evolving deepfake landscape?</strong></span></span></p>
	</div>

	<p>
		<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Ratan Dargan, Co-founder and CTO of ThoughtSol Infotech</strong>, said, &quot;<em>As the deepfake landscape continues to evolve at a rapid pace, adaptability emerges as our greatest ally in confronting its myriad challenges. Cloud computing&#39;s inherent flexibility empowers us to swiftly embrace advancements in detection technologies, staying ahead of the curve. By seamlessly integrating modern algorithms and machine learning models into our cloud systems, we not only enhance our detection capabilities but also foster an environment of constant innovation. In this ever-changing landscape, adaptability isn&#39;t just advantageous&mdash;it&#39;s imperative.&quot;</em></span></span></p>

	<p>
		&nbsp;</p>

	<div>
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>How does cloud computing contribute to the mitigation of deepfake threats?</strong></span></span></p>

		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Mr. Visakh S, CTO, Simplify3X</strong>, said, &ldquo;<em>Cloud infrastructure supports real-time detection and mitigation through seamless integration with various platforms, curtailing the spread of deepfakes across digital channels. Additionally, cloud platforms facilitate collaboration, enabling shared datasets and cooperative algorithm development for enhanced detection accuracy. In a nutshell, cloud computing plays an indispensable role in addressing the deepfake menace, offering scalable, accessible, and collaborative solutions that harness AI advancements for effective detection and mitigation in real-time</em>.&rdquo;</span></span></p>

		<p>
			&nbsp;</p>

		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>How does the integration of AI and ML algorithms in cloud-based systems contribute to the enhanced accuracy and effectiveness of deepfake detection mechanisms?</strong></span></span></p>

		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">&ldquo;<em>The integration of artificial intelligence (AI) and machine learning (ML) algorithms within cloud-based systems enhances the accuracy and effectiveness of deepfake detection mechanisms. Through continuous training on diverse datasets, AI models can learn to discern subtle inconsistencies in facial expressions, voice modulation, and contextual cues, distinguishing genuine content from manipulated forgeries. By harnessing the power of AI-driven analytics, cloud-based solutions can stay ahead of evolving deepfake techniques, ensuring the robustness of content verification mechanisms,</em>&rdquo;&nbsp;stated by <strong>Pallav Agarwal, Founder &amp; CEO, of HTS Solutions</strong>.</span></span></p>

		<p>
			&nbsp;</p>

		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The threat posed by deepfakes highlights the pressing need for creative and scalable solutions, and cloud computing proves to be a key component in this continuing conflict. Organizations may implement strong protection measures, keep ahead of emerging threats, and promote cooperative efforts to safeguard the integrity of digital assets by utilizing the cloud&#39;s computational power. The combination of cloud computing and cutting-edge technologies continues to be a ray of hope for preserving the legitimacy and dependability of our digital environment, even as the deepfake landscape changes.</span></span></p>
	</div>
</div>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=27565' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=27565</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_Mass.jpg</clientLogo>
      <pubDate>Thu, 29 Feb 2024 17:12:06 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[TRAI Secretary V. Raghunandan at Truecaller&apos;s &apos;Fraud Prevention Summit&apos;: &quot;We need to collaborate to address all dimensions of safety in India&quot;]]></title>
      <description><![CDATA[<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Senior government officials from the Ministry of Electronics, Information &amp; Technology (MEITY), Department of Telecommunications (DoT), Reserve Bank of India, industry and experts participated in the event.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Alan Mamedi, CEO &amp; Co-founder, of Truecaller, reiterated the company&rsquo;s commitment to building customised products and features to help citizens of India combat fraud. </span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Committed to the purpose of providing a safe communication experience and addressing the growing threats of online and mobile fraud in our increasingly digitised society, <strong>Truecaller</strong>, the global leader in safe digital communications, joined forces with the PHD Chamber of Commerce and Industry to host a Fraud Prevention Summit in New Delhi. The summit served as a collaborative platform for various stakeholders, including industry leaders, government representatives, technology innovators, policymakers, and safety experts, to explore the crucial theme of &#39;<strong>Enhancing Safety in Digital Communication</strong>&#39;. The event facilitated a meaningful dialogue on comprehending the legal, social, and economic impacts of fraud, as well as harnessing the power of AI and technology to mitigate risks and combat fraudulent activities in the rapidly evolving digital landscape.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/26483_Truecaller.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="color: rgb(1, 1, 1); font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-align: center;">Alan Mamedi facilitating Secretary, TRAI, V. Raghunandan</span></strong></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Speaking as the chief guest at the event,<strong> Secretary, TRAI, V. Raghunandan </strong>underscored the significance of combating digital fraud, stating,<em> &ldquo;Only one agency, public or private cannot address all the dimensions of security in the country. The approach must be collaborative with strategic public-private partnerships. India is likely to lead such developments and this is the reason why we must look at every security dimension. Collaboration is the new mantra!&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Alan Mamedi, Co-founder and CEO of Truecaller</strong> highlighted the company&rsquo;s efforts and stated, <em>&quot;At Truecaller, we are dedicated to advancing our products and services to match the swift evolution of fraudulent activities facilitated by technology. Our commitment involves proactively mitigating risks through innovation and fostering collaboration among all stakeholders. This collective effort is crucial in preventing fraud, safeguarding citizens, and ensuring a safe digital experience for citizens. The Fraud Prevention Summit represents a significant step in this direction, uniting key stakeholders to adopt effective strategies to counter emerging threats and fortify user trust in digital communication.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Furthering adding, <strong>Sandip Chatterjee, </strong><strong>&lsquo;Scientist G&rsquo; and Group Coordinator of the Cyber Law and Data Governance Division at the Ministry of Electronics and Information Technology</strong> said, &ldquo;<em>On behalf of MEITY, I&rsquo;d like to congratulate Truecaller &amp; PHD chamber of Commerce &amp; Industry for organising the Fraud Prevention Summit to raise awareness and bring together stakeholders to ensure responsibility and safety of citizens in digital communication</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The Fraud Prevention Summit also witnessed the esteemed participation of Dr.Sandip Chatterjee, &lsquo;<strong>Scientist G</strong>&rsquo; and Group Coordinator of the Cyber Law and Data Governance Division at the Ministry of Electronics and Information Technology, along with Naveen Jakhar, Assistant Director General at the Department of Telecommunications, and Brijlal Singh, Deputy RBI Ombudsman and Rakesh Maheshwari, independent consultant &amp; former Senior Director and Group Coordinator, Ministry of Electronics and Information Technology.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Truecaller has forged close collaborations with various government departments and agencies, including the Ministry of Electronics and Information Technology, Ministry of Home Affairs, Department of Telecommunications and Telecom Regulatory Authority of India as well as law enforcement agencies and civil society organisations. These partnerships are aimed at combating fraud and enhancing safety in digital communication. With over 262 million users in India, Truecaller is a trusted ally for protection against spam, scams, and fraud.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Truecaller</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">We enable safe and relevant conversations between people and make it efficient for businesses to connect with consumers. Fraud and unwanted communication are endemic to digital economies, especially in emerging markets. We are on a mission to build trust in communication. Truecaller is an essential part of everyday communication for over 368 million active users, with more than a billion downloads since launch and close to 50 billion unwanted calls identified and blocked in 2022. Headquartered in Stockholm since 2009, we are a co-founder-led, entrepreneurial company, with a highly experienced management team. Truecaller has been listed on Nasdaq Stockholm since October, 2021. </span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Visit <a href="https://www.truecaller.com/">truecaller.com</a> for more information.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=26483' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=26483</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_truecaller_logo.jpg</clientLogo>
      <pubDate>Tue, 21 Nov 2023 15:56:56 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Truecaller and Delhi Police Conduct CyberWise Training Session to Enhance Safety in Digital Communication]]></title>
      <description><![CDATA[<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Cyber safety training session conducted for citizens under Delhi Police&rsquo;s Yuva program</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Training session to encourage citizens to take action by reporting online scams, fraud and harassment to Delhi Police</span></span><br />
			&nbsp;</p>
	</li>
</ul>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Delhi Police, in collaboration with Truecaller, organized a cyber safety training session for citizens, as part of their ongoing partnership aimed at preventing cyber frauds, scams and raising cyber safety awareness among citizens. The CyberWise training session was conducted in Hindi, and focused on empowering individuals under the Delhi Police&#39;s Yuva program with essential digital safety skills. The training program included educating participants about fundamental digital hygiene practices, safeguarding personal information online, and tips to avoid cyber scams. Its primary goal is to reduce citizens&#39; exposure to online harm while fostering trust in digital communication.</span></span><br />
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/26117_cyberwise-1.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Ms. Suman Nalwa, DCP &amp; PRO, Delhi Police and Ms. Pragya Misra, Director of Public Affairs, at Truecaller</strong></span></span><br />
	&nbsp;</p>

<p>
	<span style="font-family: arial, helvetica, sans-serif; font-size: 12px; text-align: center;">In addition to raising awareness, the cyber safety training sessions encourage citizens to take requisite action by reporting online scams, spam, fraud, and harassment to Delhi Police.</span><br />
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Sharing her thoughts on the initiative,<strong> Ms Suman Nalwa, DCP &amp; PRO, Delhi Police </strong>said,<em> &ldquo;Delhi Police is actively dedicated to increasing cyber safety awareness and empowering citizens to stay safe online. Our collaborative efforts with Truecaller have successfully reduced the impersonation of Delhi Police officials by verifying official numbers through Truecaller&rsquo;s Government Directory Services. Through the CyberWise training sessions, our mission is to provide citizens and young participants of the Yuva Programme with the essential knowledge and skills needed to make informed choices for their protection while harnessing the opportunities in the digital world.&rdquo; </em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Sharing her thoughts on the partnership,<strong> Ms. Pragya Misra, Director of Public Affairs, at Truecaller</strong>, said<em>, &quot;We are truly delighted to continue our mission of fostering online safety, with the Delhi Police, in line with the Government of India&rsquo;s aim of making the internet open and safe, trusted and accountable for its citizens</em>. <em>CyberWise has already benefited over 1.6 million citizens nationwide, and we remain committed to contribute towards creating a digitally resilient community that can harness the internet&#39;s potential while staying safe from frauds and scams.&rdquo;</em></span></span><br />
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image2/26117_cyberwise-2.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">CyberWise training being conducted in the local language to equip participants with online safety skills at the Saket Police Station</span></span></strong></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">As part of the Truecaller &amp; Delhi Police partnership, a variety of initiatives have been conducted to combat cybercrime. These initiatives include a range of capacity-building measures for the Delhi Police, online safety training sessions on emerging cybercrimes, and verifying all official numbers of Delhi Police personnel on Truecaller&rsquo;s Government Directory Services to tackle impersonation.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Truecaller</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">We enable safe and relevant conversations between people and make it efficient for businesses to connect with consumers. Fraud and unwanted communication are endemic to digital economies, especially in emerging markets. We are on a mission to build trust in communication. Truecaller is an essential part of everyday communication for over 356 million active users, with more than a billion downloads since launch and close to 50 billion unwanted calls identified and blocked in 2021. Headquartered in Stockholm since 2009, we are a co-founder-led, entrepreneurial company, with a highly experienced management team. Truecaller has been listed on Nasdaq Stockholm since October, 2021.<br />
	<br />
	Visit <a href="https://www.truecaller.com/">truecaller.com</a> for more information.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=26117' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=26117</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_truecaller_logo.jpg</clientLogo>
      <pubDate>Fri, 20 Oct 2023 11:31:39 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Beware: G20 Summit Spirit Used as Bait in Phoney Tata Motors Gift Scam by Cybercriminals, CyberPeace Issues an Advisory]]></title>
      <description><![CDATA[<p>
	In the midst of the G20 summit, the global community comes together to address critical issues facing our world. However, in the digital realm, a new threat has emerged - cybercriminals exploiting the G20 spirit to deceive internet users.</p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/25800_cyber2509.JPG" style="width: 500px; height: 305px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>The string of messages received during this scam</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	A recent report prepared by CyberPeace, in collaboration with Autobot Infosec Private Limited and academic partners under the CyberPeace Center of Excellence (CCoE), highlights an online scam falsely associated with Tata Motors, a renowned automotive company.</p>

<p>
	&nbsp;</p>

<p>
	This fraudulent campaign masquerades as an official Tata Motors promotion, luring unsuspecting individuals with enticing offers. Here&#39;s how the scam unfolds:</p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<strong>Attractive Bait:</strong> The scam begins with an eye-catching image featuring Tata Motors&#39; logo, the G20 logo, and a fleet of cars, designed to capture the attention of potential victims.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<strong>Quiz Participation:</strong> Users are invited to participate in a quiz promising a free Tata Motors gift as a reward.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<strong>Fake Congratulations:</strong> Upon completion of the quiz, a congratulatory message is displayed, further enticing users.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<strong>Gift Attempts:</strong> Users are given three attempts to claim their prizes, presented as multiple gift boxes.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<strong>Social Sharing Pressure:</strong> Instructions prompt users to share the campaign via WhatsApp, creating a sense of urgency and legitimacy.</p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<strong>Key findings from the study includes:</strong></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<strong>Unofficial Website:</strong> The campaign does not reside on Tata Motors&#39; official website, raising red flags.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<strong>Redirections:</strong> Multiple link redirections indicate a lack of transparency.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<strong>Unusual Sharing Request:</strong> Legitimate campaigns rarely demand sharing via WhatsApp.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<strong>Too Good to Be True:</strong> The promised prizes are exceptionally attractive, a classic tactic to ensnare unsuspecting victims.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<strong>Grammar Errors: </strong>Grammatical mistakes within the campaign content hint at its fraudulent nature.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			The domain names associated with the campaigns have the registrant country as China.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			Cybercriminals used Cloudflare technologies to mask the real IP addresses of the front end domains. The research team uncovered a China-linked analytical service in the backend during the investigation.</p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	&quot;<em>Internet users must remain vigilant against these nefarious threats. It is paramount to exercise caution and double-check before interacting with suspicious links or attachments.&nbsp; There is a need for international cyber cooperation between countries to bust the criminal gangs running the fraud campaigns affecting individuals and organisations to make Cyberspace resilient and peaceful</em>,&quot; commented a spokesperson from CyberPeace.</p>

<p>
	&nbsp;</p>

<p>
	<strong>CyberPeace Advisory:</strong></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			Refrain from opening messages received via social platforms that seem suspicious or unsolicited. Your initial discretion can be your best defence.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			Falling prey to such scams could compromise your entire system, potentially granting unauthorised access to your microphone, camera, text messages, contacts, pictures, videos, banking applications, and more. Protect your digital castle from invasion.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			Never, under any circumstances, share confidential information such as login credentials or banking details with entities you haven&#39;t verified as trustworthy.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			Before sharing any content or clicking on links within messages, always verify the legitimacy of the source. Protect not only yourself but also those in your digital circle.</p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			To confirm the authenticity of offers and messages, reach out directly to official sources and companies. Verify the legitimacy of enticing offers before taking any action.</p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<strong>About CyberPeace</strong></p>

<p>
	CyberPeace Foundation is a leading not for profit organisation dedicated to enhancing cybersecurity and ensuring a safer digital landscape for all. They work tirelessly in collaboration with various partners to conduct research, raise awareness, and advocate for CyberPeace norms.</p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=25800' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=25800</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_cybernew.JPG</clientLogo>
      <pubDate>Tue, 26 Sep 2023 11:40:43 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[L&T Finance Unveils its Fraud Awareness Mascot &apos;Sachet Kumar&apos; and Campaign &apos;#JaankarBaniyeSavdhaanRahiye&apos; ]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>L&amp;T Finance Limited (LTF)</strong>, one of the leading Non-Banking Financial Companies of the country, unveiled its new mascot &lsquo;<strong>Sachet Kumar</strong>&rsquo; and the campaign &lsquo;<strong>#JaankarBaniyeSavdhaanRahiye</strong>&rsquo; aimed towards promoting cyber safety measures and digital fraud awareness amongst its customers and employees.</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">&nbsp;</span></span></p>

<table align="center" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/24782_Fraud-Awareness-Mascot.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Mr. Dinanath Dubhashi, MD &amp; CEO of L&amp;T Finance Holdings Limited with fraud awareness mascot Sachet Kumar</span></span></strong></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The unveiling of the mascot and the campaign forms a part of the Cyber Jagrukta Week, an initiative aimed to educate, prevent, and combat cyber and digital frauds prevailing in the industry. &lsquo;<strong>Sachet Kumar</strong>&rsquo; along with the campaign &lsquo;<strong>#JaankarBaniyeSavdhaanRahiye</strong>&rsquo; will encourage people to practice secured financial transactions and promote digitally safe habits through social media posts.&nbsp;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">According to the National Crime Reporting Bureau (NCRB) the total number of cyber fraud cases in the country has increased by 84 percent in FY23 versus FY21. Under this initiative LTF will focus on educating the customers and employees on cyber safety habits and major fraud trends around phishing, vishing, UPI frauds, identity theft, skimming, etc.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">As part of the initiative, LTF will employ a multi-faceted approach and leverage various channels to drive fraud awareness and mitigation methods through owned social media assets, dedicated page and mobile application, workshops, and educational drives.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Speaking on the occasion, <strong>Mr. Dinanath Dubhashi, Managing Director &amp; CEO, L&amp;T Finance Holdings Limited</strong>&nbsp;said, &ldquo;<em>With rapid technological development and increased use of the internet, comes the growing risk of cybercrimes. This has generated a huge need for proper digital safety measures and cybersecurity framework. The current cybersecurity landscape of India needs to evolve in conjunction with the increasing rate of cybercrimes</em>.&rdquo;&nbsp;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">&ldquo;<em>Our strategic plan Lakshya is based on four key pillars namely, a strong growth and profitability engine, demonstrable strength in risk management, creating a &#39;<strong>Fintech@Scale</strong>&#39; and sustainable future growth through Environmental, Social and Governance (ESG). In line with strong risk management&nbsp;which forms an integral part of the plan, LTF has launched its fraud risk awareness mascot &lsquo;<strong>Sachet Kumar</strong>&rsquo; and the campaign &lsquo;#<strong>JaankarBaniyeSavdhaanRahiye</strong>&rsquo; to educate customers and employees on fraud trends and motivate them to stay vigilant by keeping them informed about the modus operandi of the fraudsters and share tips to mitigate digital and other fraud attempts</em>,&rdquo; <strong>Mr. Dubhashi</strong> added.&nbsp;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About L&amp;T Finance Holdings (LTFH)</strong><br />
	L&amp;T Finance Holdings Limited (LTFH) (<a href="https://www.ltfs.com/">www.ltfs.com</a>), a leading Non-Banking Financial Company (NBFC), offers a range of financial products and services through its subsidiary L&amp;T Finance Limited (LTF) under the L&amp;T Finance brand. Headquartered in Mumbai, the Company has been rated AAA-the highest credit rating for NBFCs-by four leading rating agencies. It has also received leadership scores and ratings by global and national Environmental, Social and Governance (ESG) rating providers for its sustainability performance. The Company has also won many prestigious awards for its flagship CSR project -&nbsp;&ldquo;<strong>Digital Sakhi</strong>&rdquo; which is focused on women empowerment and digital and financial inclusion. Under Right to Win, being in the &lsquo;<strong>right businesses</strong>&rsquo; has helped the Company become one of the leading financiers in key retail products. The Company is focused on creating a top-class, digitally-enabled retail finance Company as part of the Lakshya 2026 plan. The goal is to move the emphasis from product focus to customer focus and establish a robust retail portfolio with quality assets, thus creating a Fintech@Scale while keeping ESG at the core. Fintech@Scale is one of the pillars of the Company&rsquo;s strategic roadmap - Lakshya 2026. The Company has over 7 crore customer database, and this database is being leveraged to cross-sell, up-sell as well as identify new customers.&nbsp;</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=24782' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=24782</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_landt-logo.png</clientLogo>
      <pubDate>Wed, 21 Jun 2023 17:20:13 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Truecaller Launches SMS Fraud Protection; Powerful Update that Warns Consumers Against All Possible Scams]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Truecaller</strong> has been warning users about potential fraudulent phone calls for over a decade. We have been relying on community-driven feedback to tackle spam SMS. Now, with the rise in SMS fraud, we have also initiated &lsquo;Fraud Protection&rsquo;: an active effort that combines user feedback with our proprietary machine learning intelligence to effectively combat fraudulent messages and senders.</span></span><br />
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/24068_SMS-Fraud-Protection.png" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Truecaller launches SMS Fraud Protection</span></span></strong></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">This is especially helpful for people who may not know how to spot fraud and mistakenly believe they are dealing with legitimate businesses. Currently available to all Android users, Fraud Protection intelligently recognizes fraudulent senders and messages. Our system also adapts to automatically discover new forms of fraud, even without user reports.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Unlike regular spam, frauds and scams are often malicious in nature. There are always new types of fraud around, especially in the name of legitimate businesses. This often leads to victims getting duped of hard-earned money within a fraction of a second.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>How Fraud Protection Works</strong><br />
	When it comes to scam and fraud, you are not alone! We estimate that over 100 million people using Truecaller have received at least one fraudulent SMS over the past three months. These frauds range from electricity bill payments, banks, job offers, KYC related, loans, charity, lottery and many other types.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Fraud Protection is completely free and available to all Truecaller users across India. For every single fraudulent message that a user receives, Truecaller will show a clearly marked red notification, warning the user not to take action. The notification will remain on screen till it is manually dismissed. It is important to note that Truecaller does not upload any messages. All processing happens locally on the device, thanks to our advanced AI filters.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Even if the user misses the warning and opens the fraudulent SMS, Truecaller automatically disables all links. The SMS thread will only be accessible if the user explicitly marks that sender as safe. This adds yet another layer of protection against fraud.<br />
	&nbsp;&nbsp;<br />
	<strong>What sets Fraud Protection Apart?</strong></span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Truecaller has been analysing fraud for many years and has developed advanced artificial intelligence technology to predict them. We call this Fraud Intelligence.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Our community of 338 Million helps us stay ahead of the latest frauds since we get daily feedback on SMS fraud from many thousands of users.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Unlike other SMS applications, Truecaller partners with the government and businesses to ensure safe and efficient communication. Legitimate senders are verified on Truecaller by a verified badge and prominent green colour.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Businesses and various Government agencies trust us by sending us regular scam reports, allowing us to further improve fraud detection.</span></span><br />
			&nbsp;</p>
	</li>
</ul>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">By using Truecaller as your default messaging app, you can be rest assured that you clearly recognise legitimate businesses and are protected against the latest frauds.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">You can help Truecaller and play your part in the community by reporting fraudulent messages within the app. It also helps greatly if you can spread the message to friends and family so that they can be aware and protected against the latest frauds.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Truecaller</strong><br />
	We enable safe and relevant conversations between people and make it efficient for businesses to connect with consumers. Fraud and unwanted communication are endemic to digital economies, especially in emerging markets. Truecaller is an essential part of everyday communication for over 338 million active users and more than a billion downloads since launch. Headquartered in Stockholm, since 2009, we are a co-founder-led, entrepreneurial company, with a highly experienced management team. Truecaller has been listed on Nasdaq Stockholm since Oct 8th 2021.<br />
	<br />
	For more information, please contact&nbsp;<a href="mailto:press@truecaller.com">press@truecaller.com</a>.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=24068' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=24068</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_trucaller-logo.png</clientLogo>
      <pubDate>Mon, 17 Apr 2023 15:46:31 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[WhizHack Technologies Collaborates with IIT Madras Pravartak to Build &apos;Self Reliant India&apos; Cyber Security Ecosystem]]></title>
      <description><![CDATA[<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">WhizHack has built advanced security products and training solutions to predict and prevent advanced cyber-attacks, particularly on critical infrastructure and OT networks</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Consortium will focus on building an end-to-end Atmanirbhar security ecosystem</span></span><br />
			&nbsp;</p>
	</li>
</ul>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>WhizHack Technologies Private Limited</strong> announced the signing of a strategic MOU with IIT Madras Pravartak. The association will entail joint research to develop breakthrough products to detect, predict and mitigate attacks on cyber physical systems. It will also build OT security solutions on &lsquo;Made in India&rsquo; Shakti Chip and will also embark upon joint cybersecurity capacity building projects of national importance.</span></span><br />
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/23963_MOU_WhizHack-IITM.png" style="width: 450px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Team IIT Madras seals the deal with WhizHack to create a &#39;Self Reliant&#39; Cyber Security Ecosystem</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">According to a 2022 Gartner study, cyber-attacks&nbsp;on organizations in critical infrastructure sectors have risen dramatically by 3900% between 2013 and 2020. Gartner security and risk leaders ranked the&nbsp;<a href="https://www.gartner.com/smarterwithgartner/will-iot-thrive-post-pandemic/">Internet of Things</a>&nbsp;(IoT) and cyber-physical systems as their top concerns for the next three to five years.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Commenting on the association, <strong>Dr. M. J. Shankar Raman, Chief Executive Officer, IIT Madras Pravartak Technologies Foundation</strong>, said, <em>&quot;Strong Industry-Academia partnership is critical for an emerging India in advancing research and creating a skilled workforce. IIT-M Pravartak is extremely thrilled to collaborate with a specialist Indian player like WhizHack that is building original security products and training programs. Our &lsquo;Made in India&rsquo; Shakti chip would be leveraged as a building block to build sustainable and cost effective security solutions for critical OT &amp; IT infrastructure that are completely built, serviced and maintained in India.&quot;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Mr. Kallol Sil, Co-founder &amp; CEO, WhizHack Technologies</strong> said, <em>&ldquo;Advanced state sponsored Cyberattacks are thwarting India&#39;s push to digitization and its global accent. WhizHack, as India&rsquo;s only vertically integrated cyber security organisation, has built and deployed its &lsquo;Made in India&rsquo; cyber threat detection and remediation system to defend critical infrastructure including Defence, Telecom, Power and Enterprises. Our association will collaborate for deep research in building next generation security products to serve India and global markets across OT and IT networks. We also want to empower employees of major institutions through trainings on latest cyber defense techniques, ultimately creating an Atmanirbhar Bharat.&rdquo;</em></span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">WhizHack&nbsp;is India&rsquo;s first vertically integrated cyber security company committed to democratizing cyber defence. The company is focused on an integrated approach &ndash; products, services and training. It has raised USD 3 million as Pre-Series A funding round by&nbsp;its existing investors&nbsp;Vedswasti Holdings, Netherlands and SAA Capital, Singapore at a valuation of $40 million. Founded in November 2020, WhizHack has grown its business from both Enterprise and Consumer segments by over 200% and&nbsp;shareholder value by over 20 times in less than 2 years.&nbsp;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About IIT Madras Pravartak</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">IIT Madras Pravartak Technologies Foundation is a section 08 company funded by Department of Science and Technology under its National Mission on Interdisciplinary Cyber Physical Systems and hosted by IIT Madras, the No.1 NIRF ranked institute in India. It is engaged in conducting advanced research in various fields of technologies and participating in global standardization of the technologies in collaboration with key stakeholders in the market across industry and academia.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About WhizHack Technologies Private Limited</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">WhizHack Technologies is the first truly Indian company creating a vertically integrated cyber ecosystem. WhizHack and IIT Jodhpur have an MoU for collaborating on innovations in Cyber Security, AI and IoT. &nbsp;WhizHack has capacity building programs starting from teenagers to Post Graduation in Cybersecurity. WhizHack security software aims to serve the global market in predicting and mitigating zero day attacks.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=23963' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=23963</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_whizhack-official-logo.png</clientLogo>
      <pubDate>Thu, 06 Apr 2023 14:57:18 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Alert: Cybercriminals Target Taxpayers and Banking Customers with Phishing Campaign and Malicious Application]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">If you have received any message that contains a link asking users to download an application to avail Income Tax Refund or KYC benefits with the name of Income Tax Department or reputed Banks, Beware!</span></span></p>

<p>
	&nbsp;</p>

<table align="center" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/23589_cybersecurity.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Phishing pages and Malicious Applications</span></span></strong></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">CyberPeace Foundation and Autobot Infosec Private Limited along with the academic partners under CyberPeace Center of Excellence (CCoE) recently conducted five different studies on phishing campaigns that have been circulating on the internet by using misleading tactics to convince users to install malicious applications on their devices. The first campaign impersonates the Income Tax Department, while the rest of the campaigns impersonate ICICI Bank, State Bank of India, IDFC Bank and Axis bank respectively. The phishing campaigns aim to trick users into divulging their personal and financial information.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>After a detailed study, the research team found that</strong></span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">All campaigns appear to be an offer from reputed entities, however hosted on third-party domains instead of the official website of the Income Tax Department or the respective Banks, raising suspicion.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The applications ask several access permissions of the device. Moreover some of them seek users to provide full control of the device. Allowing such access permission could result in a complete compromise of the system, including access to sensitive information such as microphone recordings, camera footage, text messages, contacts, pictures, videos, and even banking applications.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Cybercriminals created malicious applications using icons that closely resemble those of legitimate entities with the intention of&nbsp;enticing users into downloading the malicious applications.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The applications collect user&#39;s personal and banking information. Getting into this type of trap could lead users to face significant financial losses.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">While investigating the impersonated Income Tax Department&rsquo;s application, the Research team identified the application sends http traffic to a remote server which acts as a Command and Control (CnC/C2) for the application.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Customers who desire to avail benefits or refunds from respective banks, download relevant apps, believing that the chosen app will assist them. However, they are not always aware that the app may be fraudulent.</span></span></p>
	</li>
</ul>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">&ldquo;<em>The Research highlights the importance of being vigilant while browsing the internet and not falling prey to such phishing attacks. It is crucial to be cautious when clicking on links or downloading attachments from unknown sources, as they may contain malware that can harm the device or compromise the data,</em>&rdquo;&nbsp;<strong>spokesperson, CyberPeace</strong> added.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In addition to this in an earlier report released in last month, the same research team had drawn attention to the WhatsApp messages masquerading as an offer from Tanishq Jewellers with links luring unsuspecting users with the promise of free valentine&rsquo;s day&nbsp;presents making the rounds on the app.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>CyberPeace Advisory</strong></span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The Research team recommends that people should avoid opening such messages sent via social platforms. One must always think before clicking on such links, or downloading any attachments from unauthorised sources.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Downloading any application from any third party sources instead of the official app store should be avoided. This will greatly reduce the risk of downloading a malicious app, as official app stores have strict guidelines for app developers and review each app before it gets published on the store.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Even if you download the application from an authorised source, check the app&#39;s permissions before you install it. Some malicious apps may request access to sensitive information or resources on your device. If an app is asking for too many permissions, it&#39;s best to avoid it.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Keep your device and the app-store app up to date. This will ensure that you have the latest security updates and bug fixes.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Falling into such a trap could result in a complete compromise of the system, including access to sensitive information such as microphone recordings, camera footage, text messages, contacts, pictures, videos, and even banking applications and could lead users to financial loss.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Do not share confidential details like credentials, banking information with such types of Phishing scams.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Never share or forward fake messages containing links on any social platform without proper verification.</span></span></p>
	</li>
</ul>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=23589' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=23589</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_cybernew.JPG</clientLogo>
      <pubDate>Fri, 03 Mar 2023 16:24:26 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[National Commission for Women Launches 4th Phase of Digital Shakti with CyberPeace Foundation, Meta and Autobot Infosec]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">National Commission for Women launched the fourth phase of Digital Shakti Campaign, a pan-India project on digitally empowering and upskilling women and girls in cyberspace, run in collaboration with CyberPeace Foundation, Meta and Autobot Infosec.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In line with its commitment to create safe spaces for women and girls online, the Commission, along with partners has launched the fourth phase of Digital Shakti post successful completion of the three phases in the past. The campaign is focused on making women digitally skilled and aware to stand up against any cyber harms - illegal/inappropriate activity online.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The launch was graced by Smt Rekha Sharma, Chairperson, NCW, Lt Gen BS Raju, UYSM, AVSM, YSM, Vice Chief of Army Staff (VCOAS); Major Vineet Kumar, Founder and Global President, CyberPeace Foundation; Shri Rajiv Aggarwal, Director and Head of Public Policy, Meta India (previously Facebook), graced the occasion.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/22406_digita%20booklet.jpg" style="margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Dignitaries releasing of the Compendium and Digital Shakti Booklet</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Lt Gen BS Raju, UYSM, AVSM, YSM, Vice Chief of Army Staff (VCOAS)</strong> addressing the audience said, &ldquo;Today India is the second largest user of the internet, and the third largest country which gets cyberbullied, and stats show that 98% are women. we are scaling this to the fourth phase with an exponential path to go. e will take this opportunity to awareness more and more women. I am happy that AWWA, NWWA and AFWWA are constantly striving to follow these policies by CPF, Meta and NCW towards awareness for women about safe cyberspace because that&#39;s how our families will also be safe.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">While addressing the audience <strong>Smt. Rekha Sharma, Chairperson, NCW</strong> mentioned the continuous efforts of the Commission for empowering women in every sphere across the&nbsp;nation. She said, &ldquo;This new phase will prove to be a milestone in ensuring safe cyber spaces for women. Digital Shakti has been accelerating the digital participation of women and girls by training them to use technology to their advantage and to keep themselves safe online. I believe the project will continue to contribute towards the larger goal of fighting Cyber violence against women and girls and make internet a safer space for them.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Shri Rajiv Aggarwal</strong> highlighted Meta&#39;s efforts towards enabling safe online experience for women,&quot;It has always been our endeavor to create an online experience for women which is not only enabling but is also safe. Digital Shakti has been an enabler for more than 3 lakh women and with the launch of phase 4, we aim to sensitize more than 1 million women across India on how to be safe online so as to derive the best experience and opportunities that digital platforms have to offer.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Major Vineet Kumar, Founder and Global President, CyberPeace Foundation</strong> mentioned, &quot;Given the accelerated digital adoption and cyber harms against vulnerable populations, government and fraternity members are working aggressively towards empowering and upskilling girls and women in cyberspace to protect them. After receiving a tremendously positive response, we are glad to have partnered with NCW, Meta, Autobot Infosec and other collaborators. We look forward to significantly bridging the cybersecurity knowledge gap in India among vulnerable populations and reaching 1 million netizens in the next two years.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image2/22406_digit.JPG" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Panel Discussion in progress moderated by Padma Shri Sunitha Krishnan</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The launch was followed by an interactive panel discussion on &ldquo;<strong>Safe Spaces Online Combatting Cyber-enabled Human Trafficking &amp; Combatting Other forms of Online Violence</strong>&rdquo; in order to provide keen opinions from experts from the Industry, Government, and Academia to address the issue of online women safety from all tangents and provide whole approach to ensure better women safety online. The discussion was moderated by <strong>Padma Shri Sunitha Krishnan</strong>, General Secretary, Prajwala and as panelists were - Mr. Ashutosh Pande, Senior Research Officer, NCW, Mr. Pavan Duggal, Advocate, Supreme Court of India and Advisor, CPF, Veerendra Mishra, AIG, SISF,&nbsp;Madhya Pradesh Police and Advisor, NCW, Ms. Preeti Chauhan, Director-Operations, CPF participated in the discussion.</span></span></p>

<p align="center">
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The campaign Digital Shakti started in June 2018 to help women across the nation to raise the awareness level on the digital front, to build resilience, and fight cyber-crime in the most effective ways. Through this project, over 3 Lakhs women across India have been made aware of cyber safety tips and tricks, reporting &amp; redressal mechanisms, data privacy and usage of technology for their benefits.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The third phase of the program started in March 2021 with the Launch at Leh by Hon&rsquo;ble NCW Chairperson Smt Rekha Sharma in the presence of Lieutenant Governor Shri Radha Krishna Mathur &amp; Jamyang Tsering Namgyal MP Ladakh. In the third phase, a Resource Center was also developed under the project to provide information on all the avenues of reporting in case a woman faces any cyber crime. The Resource Center was launched by Shri Ramesh Bais, Hon&rsquo;ble Governor of Jharkhand.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=22406' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=22406</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_digital%20Shakti%20logo.JPG</clientLogo>
      <pubDate>Tue, 15 Nov 2022 18:58:21 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Addressing an Ecological Fallacy: Does Lower Digital Access in Rural India Result in Minimal Cases of Cyber Abuse]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The National Commission for the Protection of Child Rights&rsquo; (<strong>NCPCR) Chairperson Shri Priyank Kanoongo</strong> launched a report titled, <em>&ldquo;Changing Trends in Online Abuse and Trafficking of Women and Children: A Study in Jharkhand, Madhya Pradesh, Rajasthan and West Bengal&rdquo;</em> conducted in partnership by <strong>Space2Grow and CyberPeace Foundation</strong> in the NCPCR office on <strong>19 October 2022</strong>. </span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The study set out to explore the common misconception that lower digital access in rural areas of the country in comparison to urban areas automatically leads to lower instances of cyber abuse and fraud. The most pertinent flaw of this outlook has been the complete oversight on experiences of women and children with abuse and trafficking in rural India in both journalistic pieces as well as academic research. This is especially significant in the post-pandemic phase which is marked by increasing internet exposure and adoption towards varied activities. Space2Grow and CyberPeace Foundation set out to study the internet usage practices, experiences of common forms of abuse (such as cyber bullying, stalking, phishing, impersonation and identity theft, unwanted exposure to content etc.), response to abuse and other aspects like perception, knowledge and opinions on the topic of cyber safety. The study findings have thrown up the dire need for training, capacity building and programs targeting all key stakeholders to contain the victimization and address the vulnerability faced by women and children online, including and especially in rural areas.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/22183_cyber.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p align="center">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Shri Priyank Kanoongo, Chairperson, NCPCR launching the research by CyberPeace Foundation and Space2Grow</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Shri Priyank Kanoongo, Chairperson, NCPCR </strong>while launching the book said, &ldquo;Children today are extremely vulnerable in cyberspace, especially while using social media. It is important for parents, teachers, and for the society at large to give thought to the safety of children in cyberspace as this can be achieved only when we work together. This study by Space2Grow in collaboration with CyberPeace Foundation points to these dangers. This report has come at a time when children are increasingly using the internet and are therefore highly vulnerable. This report should hence be treated as a wakeup call and as stakeholders, we need to work with a sense of urgency towards having conversations with and keeping an eye on children&rsquo;s online activities.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Talking about the research report, <strong>Major Vineet Kumar, Founder and Global President, CyberPeace Foundation </strong>said, &ldquo;Internet usership in rural India is growing on a year on year basis and hence requires rural-area specific prevention strategy to tackle abuse. CyberPeace Foundation has found that it is a fairly organized crime and indicates the use of cyberspace and different online platforms as a medium of trafficking to target vulnerable population. The report provides a recommendation to creating and capacity building of FIRST RESPONDER, Peer groups, community and stakeholders to protect the vulnerable population from Cyber harms and quick redressal of the problem.&quot;&nbsp;</span></span><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">He also mentioned about the South Asia CyberPeace Cooperation Council (SAC3), which will bring together nations in the region for a common objective &ndash; to fight cyber-enabled human trafficking and online child sexual abuse exploitation (OCSAE).&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Ms Chitra Iyer, Co-founder and CEO, Space2Grow:</strong> At Space2Grow our aim was to deep dive into the issue of increasing online abuse that&#39;s linked to trafficking. The findings are evident of the fact that no more can vulnerabilities of online abuse be ignored on the pretext of lack of digital access. Instead, it&#39;s time for a mass level campaign for protecting children and women at large from online abuse and trafficking.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Some of the key findings of the study are given below:</strong></span></span></p>

<ol>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Cyber abuse is agnostic to ownership of devices as it can and does happen via any device and medium.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">While cyber abuse and fraud are extremely common among women and children in the study areas, awareness on prevention, reporting and redressal is abysmally low.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">There is a high level of tolerance to cyber abuse in that participants did not consider reporting an incident unless it was considered grave or involved financial fraud. This additionally points to a lack of understanding on the long-term effects of cyber abuse on one&rsquo;s mental health.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Women and children often choose to confide in friends, rather than close family members like a spouse or parents, when faced with an uncomfortable situation online.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Teachers in general, despite being key stakeholders in the lives of children, are not aware of or involved in any way with their students&rsquo; online activities and they do not have the awareness or knowledge on how to respond to online abuse.</span></span></p>
	</li>
</ol>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In response to and as a way forward, Space2Grow and CyberPeace Foundation are committed to working with all relevant stakeholders to address the issue of cyber safety of women and children.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The key recommendations based on the study findings are given below.</span></span></p>

<p>
	&nbsp;</p>

<ol>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Awareness and capacity building on the topic for all stakeholders</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">To encourage, promote and normalize conversations and discussions on cyber abuse</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Peer-group trainings and support groups in institutions and community</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Ensuring reporting of cyber crimes</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Efficient, convenient and effective reporting mechanisms</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Transparent and quick redressal processes</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Counseling services for victims of cyber abuse</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Collaboration of all stakeholders to address rising cyber crimes</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Education of caregivers, parents/guardians and teachers</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Rural-area specific prevention strategy to tackle abuse</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">To popularize helpline numbers</span></span></p>
	</li>
</ol>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Space2Grow</strong> is a social impact consulting firm which plays a pivotal role in collaborating, engaging and co-creating sustainable solutions for complex social problems related to Anti-Human Trafficking, Inclusive Skilling and Livelihoods, Child Protection and Digital Safety.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><a href="http://www.cyberpeace.org/">CyberPeace Foundation</a> is the world&rsquo;s first non-profit civil society organization and think tank of cyber and policy experts with the vision of pioneering CyberPeace initiatives to build collective resilience against cybercrimes &amp; global threats of cyber warfare.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=22183' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=22183</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_cybernew.JPG</clientLogo>
      <pubDate>Fri, 21 Oct 2022 17:25:11 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Austrade Education and Future Skills Initiatives and Australia-India Cybersecurity Hackathon Challenge Launched at AIBX 2022 Business Mission Event in Bengaluru
]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">As a part of the AIBX 2022 Business Mission, the Australian Trade and Investment Commission (Austrade) launched future skills initiatives, the Australia-India Cybersecurity Hackathon Challenge along with key partnerships and initiatives in Bengaluru today.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/21920_Photo%201.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Austrade Education and Future Skills Initiatives and Australia-India Cybersecurity Hackathon Challenge launched at AIBX 2022 Business Mission event in Bengaluru</span></span></strong><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Austrade&rsquo;s future skills initiatives will support skilling capacity in India by upskilling India&rsquo;s workforce through world-class Australian vocational, training and education programs. Austrade will bring a delegation of Australian skills providers to India early 2023, to exchange ideas and partner for success with Indian counterparts.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">To support tech collaboration, Austrade has partnered with NASSCOM and 2 universities for the Australia-India Cybersecurity Hackathon Challenge. This program will bring together industry and academia to showcase the cyber credentials of Australian and Indian universities and their students. Students competing in this challenge will tackle real-world challenges, during the hackathon, with the help of industry experts.&nbsp;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Speaking at the launch, <strong>Mr. Xavier Simonet, Chief Executive Officer, Australian Trade and Investment Commission, Australian Government</strong> said, &ldquo;<em>Australian Government Education initiatives are designed to shape the global careers of Indian students. We work closely with the students to assure world-class education, skills to support strong careers pathways and an unmatched lifestyle for students. Since the early 2000s, Australia has become a destination of choice for Indian students pursuing higher education internationally and will continue to have a strong relationship with the students. This year&rsquo;s AIBX 2022 business mission comes at a time when Australia and India are more strategically and economically aligned and our focus turns to bringing Australian skills and curriculum to be delivered in India through partner institutes</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Dr. Monica Kennedy, Senior Trade and Investment Commissioner, Australian Trade and Investment Commission also announced several Australia-India partnerships. These announcements were witnessed by Mr. Xavier Simonet, Chief Executive Officer, Australian Trade and Investment Commission, Australian Government.</span></span></p>

<p style="margin-left: 40px;">
	&nbsp;</p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The UNISA-Accenture partnership is a 10-year program. UNISA will offer a Bachelor of Digital Business program for which content is provided by Accenture. It also includes opportunity for Accenture scholarships and internships for students.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Australia&rsquo;s Griffith University, UpGrad, Insofe and UpGrad Atlas signed a partnership for 3+2 transfer arrangement for UpGrad students to Griffith University for a Master of Information Technology program.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Curtin University signed a partnership with TEXMiN, the technology innovation hub of the IIT-Indian School of Mines Dhanbad. This partnership will foster development and commercialisation of cyber-physical system based services &amp; products related to exploration and mining. The signing will also see the establishment of a world-class center at the IIT ISM Campus at Dhanbad.</span></span></p>
	</li>
</ul>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Dr. Kennedy also launched Study Australia&rsquo;s &ldquo;<strong>India Student Hub (Digital Education Hub) toolkit</strong>&rdquo; which provides Indian students with access to course search tools, an employability hub and masterclass library to help identify their strengths, scope career options and build their employability skills. Students will also have access to course information to identify the best courses for their careers. The hub elevates &lsquo;<strong>Study Australia</strong>&rsquo; brand positioning through omni-channel campaigns and special projects like the Industry Experience Program, Study Entrepreneurship Challenge, and Study Australia showcase. The site also hosts the &lsquo;<strong>partner hub</strong>&rsquo; which provides up-to-date information to education partners.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About the AIBX 2022 Business Mission</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The Australia India Business Exchange mission is a flagship programme of the Australian government to promote trade and investment ties with India. The AIBX 2022 Business Mission will support Australian exporters to capture commercial opportunities in high-growth and future-facing segments of the dynamic Indian economy.&nbsp;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The mission will be the first Australian Government-sponsored multi-sector trade mission to India since early 2020 and will be an important signal to India of Australia&rsquo;s commitment to the trade and investment relationship.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Over 100+ Australian business delegates from five priority sectors: agrifood, built environment, critical minerals, digital health and education are in India as a part of the mission.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=21920' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=21920</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_Australia-India-Business-trade.png</clientLogo>
      <pubDate>Mon, 03 Oct 2022 11:56:45 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Research Report on the Scams in Names of Indian Railway and Big Brands in India released ]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">WhatsApp messages masquerading as the offers from various giant entities with links luring unsuspecting users with the promise of transport subsidy, medical subsidy, recharge offer, free travel tickets etc., have been making the rounds on the app recently. If you receive such messages try to stay away from these, as these can be a scam.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/21777_congra%203.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Images above show Fake WhatsApp Messages (Screenshots)</span></span></strong></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The Research Wing of <strong>CyberPeace Foundation</strong>, Autobot Infosec Private Limited along with CyberPeace Center of Excellence (CCoE) have conducted six different studies based on these WhatsApp messages that contained links pretending to be a free subsidy, recharge offer and travel tickets from <strong>Indian Railways</strong>, <strong>Apollo Hospitals</strong>, <strong>Haldiram</strong>, <strong>Emirates Airlines</strong>, <strong>Various Telecom giants and Tata Group</strong> which ask users to participate in various offers and survey in order to get a chance to win the prizes.</span></span></p>

<p>
	&nbsp;</p>

<table border="1" cellpadding="5" cellspacing="0" width="673">
	<thead>
		<tr>
			<th style="width:312px;">
				<p style="text-align: left;">
					<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Warning Signs</span></span></strong></p>
			</th>
			<th style="width:361px;">
				<p style="text-align: left;">
					<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">CyberPeace Advisory</span></span></strong></p>
			</th>
		</tr>
		<tr>
			<th style="width:312px;">
				<ul>
					<li style="text-align: left; margin-left: 40px;">
						<p>
							<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The campaigns are pretended to be the offer from various big brands but hosted on the third party domain instead of the official website of the respective brands which make it more suspicious</span></span></p>
					</li>
					<li style="text-align: left; margin-left: 40px;">
						<p>
							<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The domain names associated with the campaigns have been registered in very recent times.</span></span></p>
					</li>
					<li style="text-align: left; margin-left: 40px;">
						<p>
							<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Multiple redirections have been noticed between the links.</span></span></p>
					</li>
					<li style="text-align: left; margin-left: 40px;">
						<p>
							<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">No reputed site would ask its users to share the campaign on WhatsApp.</span></span></p>
					</li>
					<li style="text-align: left; margin-left: 40px;">
						<p>
							<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The prizes are kept really attractive to lure the laymen.</span></span></p>
					</li>
					<li style="text-align: left; margin-left: 40px;">
						<p>
							<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Grammatical mistakes have been noticed.</span></span></p>
					</li>
				</ul>
			</th>
			<th style="width:361px;">
				<ul>
					<li style="text-align: left; margin-left: 40px;">
						<p>
							<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">CyberPeace Foundation recommends that people should avoid opening such messages sent via social platforms.</span></span></p>
					</li>
					<li style="text-align: left; margin-left: 40px;">
						<p>
							<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Falling for this trap could lead to whole system compromise such as access to microphone, Camera, Text Messages, Contacts, Pictures, Videos, Banking Applications etc as well as financial loss for the users.</span></span></p>
					</li>
					<li style="text-align: left; margin-left: 40px;">
						<p>
							<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Do not share confidential details like login credentials, banking information with such a type of scam.</span></span></p>
					</li>
					<li style="text-align: left; margin-left: 40px;">
						<p>
							<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Never share or forward fake messages containing links to any social platform without proper verification.</span></span></p>
					</li>
					<li style="text-align: left; margin-left: 40px;">
						<p>
							<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Never install an application from a third party source instead of the official app store.</span></span></p>
					</li>
					<li style="text-align: left; margin-left: 40px;">
						<p>
							<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">There is a need for International Cyber Cooperation between countries to bust the criminal gangs running the fraud campaigns affecting individuals and organizations to make the Cyberspace resilient and peaceful.</span></span></p>
					</li>
				</ul>

				<p>
					&nbsp;</p>

				<p>
					&nbsp;</p>
			</th>
		</tr>
	</thead>
</table>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">On the landing page a Congratulations message appears with the attractive photo of the offers and ask users to participate in a quick survey or questionnaires in order to avail the said offers. All the links showcase the respective logos of the said entities and ask users to take the survey to win <strong>recharges and subsidies</strong>.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size: 12px;"><span style="font-family: arial, helvetica, sans-serif;">Also at the bottom of the page a section comes up which seems to be a comment section where many users have commented about how the offers are beneficial.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size: 12px;"><span style="font-family: arial, helvetica, sans-serif;">All the surveys start with some basic questions like Do you know the above mentioned companies? How old are you? What do you think of Emirates Airlines or Haldiram&rsquo;s? Are you male or female? etc.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size: 12px;"><span style="font-family: arial, helvetica, sans-serif;">Once the user answers the questions a &ldquo;congratulatory message&rdquo; is displayed. After Clicking the OK button users are given three attempts to win the prizes.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size: 12px;"><span style="font-family: arial, helvetica, sans-serif;">After completing all the attempts it says that the user has won the respective offers.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image2/21777_picf.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="color: rgb(1, 1, 1); font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-align: center;">Image 2: Fake congratulatory messages</span></strong></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Clicking on the &lsquo;<strong>OK</strong>&rsquo; button, it instructs users to share the campaign on WhatsApp. Strangely enough the user has to keep clicking the Whatsapp button until the progress bar completes. After clicking on the green &lsquo;<strong>WhatsApp</strong>&rsquo; button it shows a section where a &ldquo;<strong>Congratulations</strong>&rdquo; appears once again.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">During the analysis the research team found a JavaScript code called hm.js was being executed in the background from the host hm[.]baidu[.]com which is a subdomain of <strong>Baidu</strong> and is used for Baidu Analytics, also known as Baidu Tongji. The important part is that Baidu is a Chinese multinational technology company specializing in Internet-related services, products and artificial intelligence, headquartered in China.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The campaign, pretending an offer from TATA, insists users to download an application from a third party app store.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><span style="color: rgb(0, 0, 0);">To read the detailed reports, visit&nbsp;</span><a data-saferedirecturl="" style="color: rgb(17, 85, 204); font-family: verdana, sans-serif; font-size: small;" target="_blank">www.cyberpeace.org/<wbr />publications</a></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The detailed study helped CyberPeace and AutoBot Infosec Pvt Ltd to come to the following conclusions:</span></span></p>

<p>
	&nbsp;</p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The whole research activity was performed in a secured sandbox environment where the WhatsApp application was not installed. If any user opens the link from a device like smartphones where WhatsApp application is installed, the sharing features on the site will open the WhatsApp application on the device to share the link.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The campaign collects browser and system information from the users.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Most of the domain names associated with the campaign have the registrant country as China whereas the campaign that offers free 30GB of internet data has the registrant country as Pakistan.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Cybercriminals used Cloudflare technologies to mask the real IP addresses of the front end domain names used in the campaigns. But during the phases of investigation, the research team has identified a domain name that was requested in the background and has been traced as belonging to China<strong>.</strong></span></span></p>
	</li>
</ul>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=21777' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=21777</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_cybernew.JPG</clientLogo>
      <pubDate>Thu, 22 Sep 2022 17:31:18 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[MetricStream Enhances Cloud Security and Compliance with Continuous Control Monitoring on AWS, Enabling a Proactive Response to Threats and Vulnerabilities]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><a href="https://www.metricstream.com/?channel=pr_media&amp;utm_name__c=fy23q2_prm5_sep20_pr_media_AWS&amp;campaign_name__c=pr_media&amp;utm_campaign=Press-Release&amp;utm_source=PR_Media&amp;utm_medium=PR_Media">MetricStream</a>, the global market leader of integrated risk management (IRM) and governance, risk, and compliance (GRC), today announced&nbsp;MetricStream CyberGRC works with AWS Security Hub, a cloud security posture management service from Amazon Web Services (AWS), to provide continuous control monitoring (CCM), delivering meaningful intelligence on an organization&rsquo;s cloud environment.&nbsp;&nbsp;</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">CCM refers to the use of automated tools and technologies to continuously test and monitor the effectiveness of security controls in line with compliance standards (like NIST, ISO 27001, and others). This improves the compliance posture and reduces audit costs. As a result of this integration, customers will have access to near real-time cloud security control tests that identify issues requiring attention, providing Chief Information Security Officers (CISOs) the visibility required to respond to vulnerabilities proactively.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">AWS Security Hub performs security best practice checks, aggregates alerts, and enables automated remediation. Combined with MetricStream&rsquo;s always-on CCM, CISOs can ensure ongoing compliance of cloud assets to standards, with minimal user intervention.</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">&ldquo;<em>Speed and visibility are critical to proactively fending off cyber-attacks</em>,&rdquo; said <a href="https://www.metricstream.com/about-us/leadership.htm?channel=pr_media&amp;utm_name__c=fy23q2_prm5_sep20_pr_media_AWS&amp;campaign_name__c=pr_media&amp;utm_campaign=Press-Release&amp;utm_source=PR_Media&amp;utm_medium=PR_Media">Prasad Sabbineni, Co-CEO, MetricStream</a>. &ldquo;<em>Organizations are looking to innovate quickly on the cloud and risk-based security is more critical than ever before. With real-time, actionable insights and analysis, customers can strengthen their cyber security controls and take an aggressive stance against risks</em>.&rdquo;</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">AWS customers can purchase the full breadth of MetricStream&#39;s GRC solutions in <a href="https://aws.amazon.com/marketplace/pp/prodview-5ph5amfrrmyx4?qid=1616170904192&amp;sr=0-1&amp;ref_=srh_res_product_title">AWS Marketplace</a>. To learn more about MetricStream and its product offerings, visit <a href="https://login.microsoftonline.com/f06c7555-b296-4319-acaf-2d0786aa68b0/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&amp;response%5Fmode=form%5Fpost&amp;protectedtoken=true&amp;response%5Ftype=code%20id%5Ftoken&amp;resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&amp;scope=openid&amp;nonce=A5880B67C477462992057591FCCDA0715271C5BB18F5F486%2D2A3792FDBA4156AD7A486BBE04E970F4B05D3592649C49361BB40424817FB3CB&amp;redirect%5Furi=https%3A%2F%2Fmetricstream%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&amp;state=OD0w&amp;claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&amp;wsucxt=1&amp;cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&amp;client%2Drequest%2Did=29b866a0%2D90cf%2Dd000%2D750d%2D5424f4442a47&amp;sso_reload=true">www.metricstream.com</a>.&nbsp;</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About MetricStream, Inc.</strong><br />
	MetricStream is the global market leader of Integrated Risk Management and GRC solutions that empower organizations to thrive on risk by accelerating growth via risk-aware decisions. We connect governance, risk management and compliance across the extended enterprise to enable resilience and digital transformation. MetricStream is headquartered in San Jose, California, with an operations and R&amp;D center in Bangalore, India, and sales and operations support around the globe.&nbsp;</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Join us on November 8 and 9 in London for our 10th GRC Summit - <a href="https://www.metricstream.com/grc-summit/london-2022?channel=pr_media&amp;utm_name__c=fy23q2_prm5_sep20_pr_media_AWS&amp;campaign_name__c=pr_media&amp;utm_campaign=Press-Release&amp;utm_source=PR_Media&amp;utm_medium=PR_Media">Experience the Power of Connection</a>.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=21750' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=21750</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_metric-stream-off-logo.png</clientLogo>
      <pubDate>Wed, 21 Sep 2022 07:00:22 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[GET SET HACK by RISE Marks Massive Success with More than 22k Participants]]></title>
      <description><![CDATA[<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The top 5 winners will receive direct placement opportunities; winners 6-25 will received interview opportunities</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Top 100 winners will get paid scholarships on the Cybersecurity Bootcamp, PG Course by RISE</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">GET SET HACK by RISE: Secure the World with Cryptography, a first-of-its-kind Hackathon in partnership with the ThriveDX, and &lsquo;<strong>Andhra Pradesh State</strong> <strong>Council of Higher Education</strong>,&rsquo; AP Government, marks a massive success with more than 22 thousand participants. The top 100 winners bagged an exciting prize pool consisting placement opportunities, internship opportunities and multiple paid scholarships, and were felicitated by Mr. Sagi Itcher, Head of Economic and Trade Mission of Israel, and Roy Zur, CEO of ThriveDX SaaS.</span></span><br />
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/21551_RISE_Hackathon.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">GET SET HACK by RISE</span></span></strong><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Delhi-based Sarthak Jain, a 4th-year B.Tech student pursuing Computer Science from GGSIPU bagged the first prize, followed by Kolkata-based 4th year CS Student from IIEST, Shibpur, Arnab Sen who came in second. Additionally, Manish Kumar, Vaibhavi Paliya and Deepanshu Arya rounded up as the top five winners. The top five winners of the GET SET HACK by RISE were awarded 100% placement offers along with full scholarships on the Cybersecurity Bootcamp PG Course by RISE. The recruitments are powered by some of the biggest names in the corporate world including Ziroh Labs, Riskpro, Grant Thornton, Digisailor, Elliot Systems, Cryptowire, Allied Digital, Buddi AI, Analyttica and Taylor &amp; Francis Group, among others.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Highlighting the importance of cyber-security in today&rsquo;s day and age <strong>Mr. Sagi Itcher, Head of Economic and Trade Mission of Israel</strong> commented, <em>&ldquo;As per our estimate, over 1 million cyber security experts are needed in the Indian market currently, and this gap is struggling to find a way to bridge itself. This shows how vulnerable the digital ecosystem is in the country. And that&rsquo;s why I believe the effort companies like ThriveDX and RISE are putting in is so important as they can take people with basically zero knowledge in cyber security and bring them up to the level of an expert with their dedicated and tailor-made training programs.&rdquo;</em>&nbsp;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Adding to Mr. Sagi&rsquo;s statement and addressing the need to bridge the demand and skill gap in the field for better protection and online safety, <strong>Mr.</strong> <strong>Roy Zur, CEO of ThriveDX</strong> stated, <em>&ldquo;It&rsquo;s great to see talented people come together to tackle one of the biggest challenges on earth using cyber-security techniques. It is a field with a huge skill gap and in high demand in both the Indian and international markets and therefore it is a great career path to choose. At its core, the central objective of cyber security is to protect your country, government or organization from bad elements. Therefore, cyber security as a field is a lot about protecting the good against the bad.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Addressing the ongoing success of the Hackathon, <strong>Mr.</strong> <strong>Gaurav Bhatia, CEO at RISE</strong> states, &ldquo;<em>India alone is expected to create around 3.5 Mn job vacancies in the cyber-security space by 2025 and the current talent shortage with skills such as Application Development Security, Cloud Security Risk Management, Threat Intelligence, Data Privacy and Security, stands at 43 per cent. These are the reasons why we organized the Hackathon to create awareness about cyber-security&nbsp;as a lucrative career option. We are overwhelmed with the response that we got with over 22 thousand participants, making GET SET HACK by RISE one of the biggest of its kind hackathons in India. We thank all our partners who have made this a massive success.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The response to &lsquo;<strong>GET SET HACK by RISE</strong>&rsquo; hackathon has been overwhelming on all fronts, at all levels. In addition to record-breaking participation and tremendous student response, the event has been able to successfully drive awareness about Cybersecurity as a lucrative career option among the younger generation.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In addition to the top 5 rankers who received direct placement opportunities; 6-25 rank holders received interview opportunities along with a 50% paid scholarship; 26-50 rank winners also got internship opportunities along with a 50% paid scholarship, while the next 51-100 rank holders got awarded with a 35% paid scholarship on the course.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About RISE</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Founded in April 2021, RISE&rsquo;s mission is to encourage and empower students across cities, strata, and societies to be socially and culturally aware leaders of the world. The startup offers PG Programs in Business Analytics, Data Science, AIML, Cybersecurity, FinTech, Finance &amp; Accounting, and Marketing Research in collaboration with KPMG in India, Grant Thornton, ThriveDX SaaS and Aeon Research. RISE also offers a course in Public Policy with Analytics, and a Global MBA in collaboration with SRH Mobile University (Germany). Besides, and more significantly, RISE also provides scholarships for &lsquo;<strong>Women in Tech</strong>&rsquo; and discounted courses for the underprivileged. Each course is affordable and, crucially, is curated and taught by industry experts, thus increasing the chances of employability.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=21551' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=21551</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_RISE-official-LOGO.png</clientLogo>
      <pubDate>Fri, 02 Sep 2022 12:30:38 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Cyber Risks are Lurking Around Every Corner of the Digital World: Raghnall Launches &apos;Individual Cyber Insurance&apos; to Keep your Fears at Bay]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Navigating the digital world reveals all the infinite possibilities that the powers of the Internet can accomplish for us. From searching for information online, browsing on social media, sending chats/emails and video calling to online shopping, money transfers and so much more - nowadays you can easily do it all at the click of a button. However, this fascinating virtual world is also replete with numerous cyber threats, waiting to pounce and strike on unsuspecting netizens out of nowhere! If pondering about cyber risks is giving you nightmares - fret not, as <a href="https://www.raghnall.co.in/">Raghnall Insurance Brokers</a> are here to your rescue with the launch of &lsquo;<strong>Individual Cyber Insurance</strong>&rsquo; - India&rsquo;s first-ever integrated platform for the dual purpose of breach assessment and insurance buying!</span></span><br />
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/21446_Raghnall%20Insurance%20Brokers.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Secure your digital data with Raghnall&rsquo;s Individual Cyber Insurance</span></span></strong><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Established in 2014 by Mr. Amit Goel and Mr. Yagnesh Doshi, Raghnall has emerged as India&rsquo;s trusted insurance broking and risk advisory company. Headquartered in Mumbai, the organisation efficiently caters to the corporate insurance requirements of large commercial businesses, MSMEs, and start-ups, as well as personal insurance needs of individual clients. They also have branches in other cities like Delhi, Hyderabad, Vijayawada, Nagpur, and Bengaluru. By working closely with reputed insurance, reinsurance, and technology partners, Raghnall aims to provide nothing but exceptional risk management solutions to their diverse clientele.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Raghnall has always put their clients&rsquo; needs at the forefront by consistently keeping abreast of their needs and conducting extensive research about all the latest risks that they can be vulnerable to. Acutely cognisant of the fact that cyber risks are a major threat in today&rsquo;s digital era, looming large over the head of any and every individual who uses the Internet, the prominent insurance broker felt compelled to address the dire need of the hour - which is to provide an effective safety shield against the dark side of the web. That&rsquo;s why Raghnall is thrilled to introduce their brand new &lsquo;<strong>Individual Cyber Insurance</strong>&rsquo; on the 22nd of August, 2022 - a first-of-its-kind integrated platform in India that will safeguard you from all the potential damages of cyber threats with utmost finesse!</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Naturally, some people might think it is not necessary to invest in a personal <a href="https://raghnall.msmeaccelerate.in/corporate-cyber/">cyber insurance</a>, but they need to know that cyber attackers don&rsquo;t give warnings in advance before they invade your digital space! While there are some basic things that can somewhat reduce your vulnerability to such attacks - such as keeping your systems and softwares updated, installing firewalls, setting different passwords for different accounts, etc. - they cannot eliminate the risks completely. Perhaps, knowing a little better about some cyber-attacks that can rob your entire life savings in no time, can help you comprehend the necessity of a personal cyber insurance policy:</span></span></p>

<p>
	&nbsp;</p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Malware - Malware comprises a range of malicious softwares like ransomware, spyware, viruses, worms, etc., which gets installed and activated when you unknowingly click on a dangerous link or attachment. Malware attacks can block your access to key network components, steal your data from the hard drive, install more hazardous softwares, and even make your system inoperable.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Phishing attacks - Phishing scams or attacks involve fake communication in the form of a legitimate looking email or message that requests for your sensitive personal information, like password, credit card number, PIN, etc. If you click on the links in such emails or messages and provide them with these details, you can inadvertently end up losing your hard-earned finances!</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Online Harassment - The leakage of your personal photos, videos, chats, browser history and more to a random cyber-criminal indulging in nefarious activities on the web can have disastrous consequences for you. Online harassment through cyber stalking can not only cause you financial losses but also severely affect your mental health due to the blatant invasion of privacy.</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">These are just a few of the dozens of cyber threats waiting to make the Internet a virtual hell for you! But there&rsquo;s no need to worry, as Raghnall&rsquo;s Cyber Insurance is proud to be India&rsquo;s first one-of-its-kind integrated platform which empowers users for assessing personal data theft or breaches, and also for buying insurance - a unique one-stop solution that no other insurer in the country is offering yet. To safeguard your finances from the perils of cyber-attacks, Raghnall curates the finest personal cyber insurance in the market from top companies like ICICI Lombard, HDFC Ergo, SBI General, and Bajaj Allianz. On this platform, customers can get independent product rating, review, and comparison, allowing them to select the right insurance plan that perfectly suits their distinct budget and requirements - whether they are homemakers, teenagers, or working professionals.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Another coveted feature that customers can avail themselves of with Raghnall&rsquo;s integrated Individual Cyber Insurance is their &lsquo;<strong>Cyber Theft Scanner</strong>&rsquo; tool. These days, it is a common phenomenon for most of us to store our personal documents like PAN card, Aadhaar card, etc. on our phones and other devices or on cloud storage. However, this simple matter of convenience can also significantly heighten a person&rsquo;s risk of becoming a victim of multiple cyber-attacks. But fortunately, the Cyber Theft Scanner tool can let you rest easy by enabling you to check if your data is breached or stolen!</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&ldquo;At Raghnall, we understand that the risks posed by cyber-attacks to a person and their subsequent results can be unimaginable. Although these attacks can be unavoidable in most cases, we can certainly be prepared to face them head on by being insured with an appropriate Cyber Insurance policy. However, choosing the apt policy on your own from the different options available from the market can get confusing and overwhelming. That&rsquo;s why, Raghnall aims to simplify this process by bringing to you only the best personal cyber insurance options online. Thanks to our new integrated &lsquo;<strong>Individual Cyber Insurance</strong>,&rsquo; all you have to do now is assess your risk, explore the products, check the premium and buy your preferred policy on Raghnall&rsquo;s website - to avail instant and optimal coverage against various cyber threats,&rdquo;</em> says&nbsp;<strong>Mr. Amit Goel - Principal Officer &amp; Director, and Mr. Yagnesh Doshi - Director of </strong><a href="https://www.raghnall.co.in/">Raghnall Insurance</a>.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Have a look at some of the major coverages under Raghnall&rsquo;s &lsquo;<strong>Individual Cyber Insurance</strong>&rsquo; to know why it&rsquo;s absolutely essential for you to have this insurance:</span></span></p>

<p>
	&nbsp;</p>

<ol>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Theft of funds - It offers coverage for money robbed from bank accounts, credit or debit cards, digital wallets, etc. due to phishing attacks or spoofing as well as unauthorised access of personal data and losses arising due to fraudulent ATM withdrawals.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Online shopping - It covers the loss of money that you may have spent while shopping online from a fraudulent website, as such websites may showcase a product and deliver something else in its place, or even nothing for that matter!</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Cyber bullying - It covers the cost of removing objectionable content posted by cyber bullies along with legal costs and psychological consultation costs for the victim of cyberbullying.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Identity theft - It covers financial losses, credit monitoring costs, and legal costs resulting from the misuse of your information on the Internet by an unknown third party.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Social media liability - It protects you from third party claims that may result due to any privacy breach or copyright infringement from your social media posts.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Data restoration from malware contamination - It ensures indemnity for recovering the data lost after a malware attack on your devices.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Cyber extortion - It covers the financial losses that the insured individual may have to incur to pay as ransom for the resolution of the cyber extortion situation.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Electronic devices&rsquo; protection - Raghnall&rsquo;s &lsquo;<strong>Individual Cyber Insurance</strong>&rsquo; provides comprehensive coverage for the protection of sensitive data stored in your personal electronic devices, as well as for any theft or loss of money occurring due to cyber-attacks on these devices.</span></span></p>
	</li>
</ol>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In addition to &lsquo;<strong>Individual Cyber Insurance</strong>&rsquo;, Raghnall is all set to come up with an Integrated <a href="https://raghnall.msmeaccelerate.in/corporate-cyber/">Cyber Risk Insurance</a> platform for MSMEs and small corporates too, which can help these businesses accurately assess, protect, and prevent cyber risks. So, for availing superior insurance and risk management solutions in both the B2B as well as B2C segment - be rest assured that there&#39;s no better choice of broker for all than Raghnall!</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=21446' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=21446</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_Raghnall-Logo.png</clientLogo>
      <pubDate>Tue, 23 Aug 2022 16:04:32 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Governor of Jharkhand Launches Ranchi University-IETE-CyberPeace - Center of Excellence (CoE)
]]></title>
      <description><![CDATA[<p style="margin-left:1.0pt;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Research in Cyber domain, Diploma courses on CyberSecurity and CyberSecurity Entrepreneurship will now be available on the premises of Ranchi University, Jharkhand.</span></span></p>

<p style="margin-left:1.0pt;">
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">To promote the initiatives of the State Government and establish a close and continuing interaction for exploring areas of mutual cooperation in the field of CyberPeace, CyberSecurity Research, Capacity Building, Policy and Advocacy along with other facilities. CyberPeace Council, Institution of Electronics and Telecommunication Engineers (IETE) and Ranchi University have entered into a strategic collaboration to work together for addressing the Global skill shortage of 3.5 million CyberSecurity experts. The partnership will work towards the state wide shortage of cyber experts by training students through Diploma courses in CyberSecurity.</span></span></p>

<p>
	&nbsp;</p>

<p style="margin-left:1.0pt;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The CyberPeace Global President, Major Vineet Kumar, IETE Ranchi Ex-Chairperson Shree KK Thakur and Ranchi University the then Vice Chancellor Dr. (Mrs.) Kamini Kumar had signed a Memorandum of Understanding (MoU) on May 19th 2022. This MoU will help set up The CyberPeace Center of Excellence, an initiative of CyberPeace at Ranchi University.</span></span></p>

<p style="margin-left:1.0pt;">
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/21353_cyber.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p align="center" style="margin-left:1.0pt;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Honorable Governor of Jharkhand, Shree Ramesh Bais lighting the lamp with other dignitaries at the launch of RU-IETE-CyberPeace Centre of Excellence (CoE)</strong></span></span></p>

<p style="margin-left:1.0pt;">
	&nbsp;</p>

<p style="margin-left:1.0pt;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">On the International Youth Day, the Center of Excellence and Interdisciplinary Post Graduate Diploma in CyberSecurity course was inaugurated by His Excellency Shree Ramesh Bais, Honorable Governor cum Chancellor of Universities of Jharkhand. The occasion was graced by Dr. Ajit Kumar Sinha, Honorable Vice Chancellor, Ranchi University, Major Vineet Kumar, Founder and Global President, CyberPeace and Shree Niranjan Prasad, Chairman, IETE New Delhi.</span></span></p>

<p style="margin-left:1.0pt;">
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">While IETE and CyberPeace Council will be responsible to provide technical guidance to the programme, Ranchi University shall be responsible for infrastructure support including faculty support and developing a research lab for the cause.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The collaboration will encourage research in the field of CyberPeace, CyberSecurity, Cyber Defense and Internet Engineering and Governance. With lack of skilled manpower in the area of CyberSecurity defense, the collaboration aims to start new forces in concerned areas and introduce technical training to enhance skills in the said domain.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The Center of Excellence will also promote Research and Development (R&amp;D), Cyber security entrepreneurship, innovation, design and develop indigenous software to help maintain cyber security, cyber peace and Internet standards.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The collaboration will also encourage workshops, awareness programs and internship opportunities for the students, cyber security skill development, research and development for both students and faculties.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image2/21353_cyberef.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Major Vineet Kumar felicitating the Honorable Governor of Jharkhand, Shree Ramesh Bais</span></span></strong></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">While inaugurating the Center of Excellence, <strong>Honorable</strong> <strong>Governor of Jharkhand,</strong> <strong>Shree Ramesh Bais</strong> said, <em>&ldquo;When hacking can be done from Jamtara, Jharkhand, then why can&#39;t efforts be made to stop it in the university located in Ranchi. I appreciate the efforts being taken by the Ranchi University and CyberPeace Foundation for the all round development of youths of the state. It gives me immense pleasure to see individuals like Major Vineet Kumar, who fights all the odds and shines like a star across the world.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>The Vice Chancellor of Ranchi University, Prof. (Dr.) Ajit Kumar Sinha</strong>, while giving the welcome address, congratulated the Governor for granting permission to start new courses. The Vice Chancellor also introduced the expansion of Ranchi University in his speech, he told how the university was started with 10 PG courses and today about 30 PGs are operated, apart from this, at present there are about 165000 students studying in Ranchi University. Giving information, he said that he is trying to take Ranchi University further with the efforts of all and get a higher position in the UGC ranking.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Talking about the collaboration, <strong>Major Vineet Kumar, Founder &amp; Global President, CyberPeace</strong> said,&nbsp;<em>&ldquo;This is like a dream come true to establish Jharkhand as a Cybersecurity hub. Jharkhand has always been known as the hot bed of cybercrimes and financial frauds. The Interdisciplinary Post-Graduate Diploma Course on CyberSecurity and the CyberPeace Center of Excellence (CoE) will help Jharkhand become a &ldquo;<strong>State of the Art</strong>&rdquo; hub for CyberPeace and CyberSecurity.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Giving information on behalf of IETE,<strong> Niranjan Prasad</strong> said that our institute is currently working in about 114 countries and we have tried to take an initiative regarding cyber security in Jharkhand also, under this we have signed MoU with Ranchi University and CyberPeace. We have started a diploma course, through which we will not only make the students aware about cyber security, apart from going to rural areas, we will also share information about cyber security so that awareness about cyber security spreads among the common people.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">As the next steps, a Joint Committee, a Joint Expert Group and an Advisory Council will be formed for the overall administrative, academic, monitoring and review of the programme.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=21353' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=21353</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_CyberPeace%20Council%20Logo.jpeg</clientLogo>
      <pubDate>Sat, 13 Aug 2022 14:33:19 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Grant Thornton Bharat Acts as Exclusive Advisor to C3M on its Acquisition by CyberArk ]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Grant Thornton Bharat</strong> led the recently concluded sale of C3M, an emerging multi-cloud cybersecurity firm, to CyberArk, a NASDAQ listed global leader in <a href="https://www.cyberark.com/products/">Identity Security</a>. Grant Thornton Bharat was the exclusive advisor to the shareholders of C3M.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Founded in 2018, C3M developed a cloud security management software that has been used by global enterprises across financial services, insurance, e-commerce and retail adopting cloud-centric business and technology transformations. The company has offices in India and the United States, with its R&amp;D team based out of India.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Karthik Gopalakrishnan, Partner, Lead Advisory at Grant Thornton Bharat</strong> who led the transaction said, &ldquo;<em>With the aggressive adoption of cloud services, businesses require specialist solutions to manage their security posture across multiple cloud environments, and to have granular visibility into identity and access-related activities in the cloud. C3M has built best-in-class technology to address these needs. The acquisition by CyberArk, </em><em>the world&rsquo;s largest Identity Security company, </em><em>was a natural fit</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Sumeet Abrol, Partner and Head, Lead Advisory at Grant Thornton Bharat</strong> said, &ldquo;<em>The transaction strongly validates global interest in acquiring product capabilities in cyber focused technology platforms. With successive deals across the technology stack in the past 12 months, this further reinforces Grant Thornton&rsquo;s position as the advisor of choice for unlocking value in this sector</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Padmanabhan Viswanathan, Founder and former CEO of C3M, and current VP of Cloud Security at CyberArk</strong>, said, &ldquo;<em>All of us from C3M are thrilled about this acquisition. Our mission was to simplify cloud security for enterprises and staying true to that mission enabled us to build a successful global business, helping industry leading security-focused companies manage their cloud security risk and improve their compliance posture. With cloud-related breaches at an all-time high and privileged access being a major cause of concern for enterprises, we see huge possibilities and innovation happening in the Identity Security space. We are happy to be a part of CyberArk&rsquo;s vision for the future of cloud security - with identity at the core</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">&ldquo;<em>The acquisition of C3M will further strengthen CyberArk&rsquo;s existing Cloud Privilege Security offerings with capabilities for identifying security and compliance risks in cloud IAM policies, cloud activity monitoring and threat detection while helping solve visibility and security challenges in public cloud environments</em>,&rdquo; said <strong>Clarence Hinton, Chief Strategy Officer, Head of Corporate Development, CyberArk</strong>. &ldquo;<em>We are thrilled to bring on-board t</em><em>he C3M team who will add talent and experience to CyberArk&#39;s R&amp;D and product teams, further accelerating our development and innovation</em>.&rdquo;&nbsp;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Grant Thornton Bharat was recently conferred with two global M&amp;A awards: &lsquo;<strong>M&amp;A Firm of the year Award (mid-market category)</strong>&rsquo; and &lsquo;<strong>Cross border deal of the year</strong>&rsquo; at the recent M&amp;A Atlas Awards 2021. As one of India&rsquo;s leading transaction advisors, this recognition has further strengthened the efforts of the firm towards shaping a vibrant India and creating gold standards in consulting and advisory.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=21330' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=21330</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_Grant_Thornton_logo.png</clientLogo>
      <pubDate>Thu, 11 Aug 2022 12:20:11 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Truecaller and News18 Network Culminates ItsNotOk Campaign Against Women Harassment]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Truecaller</strong> &amp; News18 Network culminate their six-month-long #ItsNotOK campaign against harassment of women with the unveiling of #CallItOut wall &amp; a Run to EmpowHER. The culmination was in partnership with Delhi Police saw participation from dignitaries such as Bhupender Yadav, Union Minister for Environment, Forest &amp; Climate Change, Rakesh Asthana, Commissioner of Police, Delhi, Mandira Bedi, Sagar Preet Hooda, Special Commissioner For Police (Law &amp; Order), Delhi extending their support towards the need to take action against harassment. Over 500 citizens came together to run for the cause to reclaim safety in digital communications and the real world. The Ministry of Culture has also extended their support to the campaign under the Azadi ka Amrit Mahotsav celebrations.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/21242_mm.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Rakesh Asthana, Commissioner of Police, Delhi at the CallItOut wall</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Unveiling the #CallItOut wall at the Civil Lines Police Station, Rakesh Asthana, Commissioner of Delhi Police lauded the efforts and impact of the #ItsNotOk campaign and cited the law enforcement&rsquo;s commitment to creating a sense of safety to empower women to call out harassment. Developed by the Delhi Street Art, the mural art signifies stories of brave women who have taken action against harassment and the support of law enforcement towards ensuring safety in both the physical and the more complex world of digital communications. The artwork will further engage citizens across the city as it will be carried and displayed on the rear windscreens of the Delhi Police Emergency Helpline Vehicles.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Following this, the Run to EmpowHER saw elaborate participation from citizens, policymakers, law enforcement and influencers who came together to express their support for the cause and run on a route designed in the shape of &lsquo;<strong>ITS NOT OK</strong>&rsquo;. The run was symbolic of women reclaiming their right to safety in everyday life with the support of Delhi Police personnel and fellow men running by their side highlighting the need for collective action and responsibility towards putting an end to harassment. The energy and enthusiasm of the run continued as runners shared updates from the event, their personal stories and their commitment to safety for women across social media platforms spreading more awareness and enlightening the masses.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Speaking at the flag-off of #ItsNotOK Run to EmpowHER, <strong>Bhupender Yadav, Union Minister for Environment, Forest &amp; Climate Change </strong>said,<strong> </strong>&ldquo;<em>India is rising as a global power, however the realisation of this power would not be truly complete if women continue to be discriminated against or be subjected to harassment. It is important to realise that we just can&rsquo;t leave the burden of speaking out and fighting harassment and discrimination in all spheres of life purely on women. Men have to engage as allies in fighting harassment as a basic responsibility of a human being. There has to be an enabling environment for women to be able to freely&nbsp;live, work and just be themselves as humans. The realisation of that enabling environment is everyone&rsquo;s responsibility. The onus of fighting this battle is on each one of us as responsible citizens&nbsp;and not just women facing harassment alone.&rdquo; </em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Mandira Bedi, Bollywood </strong><strong>Actress</strong> who also joined the Run to EmpowHER on Sunday, said,&nbsp;<em>&ldquo;Every wom</em><em>an has faced harassment of some form in their life. While we have been told to silently endure, ignore or block such incidents, it is important to call it out. There are many ways to call out harassment. There are apps like Truecaller that tell you the number of the person who is calling. My message to women is that they should call out harassment because it&#39;s not okay.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Commenting on the culmination, <strong>Ms. Pragya Misra, Director of Public Affairs, Truecaller, India </strong>said, &ldquo;<em>We are emboldened with the massive support of citizens through their participation in the #ItsNotOk campaign and helping us strengthen our fight against harassment of women. Our goal has always been to bolster the conversation to #CallItOut and create awareness by driving action on the ground. We are confident that the efforts of the initiative will be amplified with these events and will continue to encourage every citizen who will come in contact and engage with the artwork on the #CallItOutWall or the Delhi Police Vehicles. We are grateful to the Delhi Police for championing this fight and partnering with us to ensure that the culmination is a continuation of our resolve for the safety of women in physical and digital communications.&rdquo; </em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Sidharth Saini, SVP &amp; Head - Marketing, Content &amp; Operations at Network18 Studio</strong> said,&nbsp;&ldquo;<em>We are really happy and encouraged by the support that this campaign has received from stakeholders in the society, be it policy makers, police, legal authorities, academicians or celebrities. Delighted to have been partners with Truecaller on a purpose-driven campaign that is making conversations happen on real issues</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Sagar Preet Hooda,&nbsp;IPS and Special Commissioner of Police (Law &amp; Order), Delhi Police, </strong>who also joined the Run to EmpowHER said,&nbsp;&ldquo;<em>This fight against harassment of women is of all of us as a society. The mural art on the wall of the civil lines police station is a testament to the Delhi Police&#39;s dedication and spirit to fight against this menace. It&rsquo;s not okay to be silent. In India, our women also face harassment within domestic spaces, not only in public areas. We encourage women to report such cases of harassment. We have created helplines 112 and 181 that help women in immediate emergency situations.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">A woman runner who was on a holiday in Mumbai decided to participate in the EmpowHER run in her own city, said that she ran to instill the right values in her son, and not get self defence classes for her daughter in future. Her support for the campaign shows how the initiative has turned into a people&rsquo;s movement over its journey.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The campaign has seen an overall digital reach of 1.65 billion and received support from policymakers such as Smriti Irani, Rajeev Chandrasekhar, K Chandrashekhar Rao, Bhupender Yadav, Naveen Patnaik, K.T. Rama Rao, K. Kavitha; law enforcement authorities like KPS Malhotra, Usha Rangnani, and Shalini Singh; social activists like Ranjana Kumari, Rajni Abbi; actresses Raveena Tandon, Aditi Rao Hydari, Mandira Bedi and Huma Qureshi; as well as Indian badminton stars PV Sindhu, and Jwala Gutta; Social media influencers Anupriya Kapur and Satshya Tharein, through its journey.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=21242' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=21242</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_news18logo.png</clientLogo>
      <pubDate>Fri, 05 Aug 2022 10:17:54 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Wranga and Disney Star India Partner to Conduct &apos;Responsible Digital Citizenship and Online Safety&apos; Study]]></title>
      <description><![CDATA[<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Initiative on Responsible Digital Citizenship part of startup&rsquo;s commitment to promoting online safety for kids</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Report was launched virtually in the presence of Smt. Annapurna Devi, Hon&#39;ble Minister of State for Education, Government of India</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The &lsquo;<strong>Responsible Digital Citizenship and Online Safety</strong>&rsquo; report by <strong>Wranga</strong>, an Indian start-up focused on cyber safety for kids, with the support of <strong>Disney Star India</strong>, one of the biggest media conglomerates, was released today.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The aim of the report was to assess the proficiency of young online users with the safety tools at their disposal, and identify their preferred mode of learning. Among the many conclusions drawn was that 84% of users have come across fake news online. </span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Wranga leaned on the support of Disney Star India to bring out the study, undertaken to understand - and contribute to - the domain of digital education for creative expression, learning and participation of students as responsible digital citizens, and to ensure their digital wellbeing.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The survey is one of the main elements in the first phase of this programme, alongside workshops, training, focus-group discussions and design of curricula.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Conducted among school students, the report found that the greatest threat girls and boys face in the online space is inappropriate sharing of images. Students also revealed that although topics like cyberbullying and misinformation are touched upon in the classroom, more must be done to have a real-life impact. &ldquo;<em>Topics were taught but not enforced in any way. So they didn&rsquo;t have any real-world impact</em>,&rdquo; the report mentions.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Interestingly, the respondents listed specific topics they would like to deep-dive into through their school curriculum, including Legal Protection, Internet Privacy and Cyber Wellness. Significantly, 70% of respondents were worried about their online privacy and safety - besides improper use of photos, they also raised concerns over setting up of fake profiles or misrepresenting profiles, taking screenshots without permission and circulating, stumbling upon inappropriate visual and textual content, and unwanted approaches in chat rooms, on social-networking sites or on email.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">On the positive side, however, an overwhelming 80%-90% of students believed that the Internet has helped broaden their horizons, and prefer to use the worldwide web for learning new subjects and for creative expression.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">This initiative is a step towards building a secure digital space for India&rsquo;s youth. It also highlighted apprehensions that users have while reflecting on the measures that need to be taken to enhance their online experiences, and identifying the resources required to build capacities that can guarantee safe digital surfing.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Wranga collaborated with various stakeholders such as teachers, parents, institutions, the Government and its agencies NGOs/SOs, online platforms and legal and cyber security experts for a comprehensive consultation. The survey was carried out amongst children of school-going age in India, from January to April 2022. Altogether, <strong>842 responses</strong> of students from grade-9 to grade-12 were documented and analysed.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">According to <strong>Amitabh Kumar, CEO, Wranga</strong>, &ldquo;<em>I feel that this report, compiled with the invaluable co-operation of Disney Star India, can be the start to a conversation we must all be having. Because our children are spending a lot of their time online, it is imperative that we understand the particular challenges and threats they face, and that we resolve to make the digital world as safe as possible for them</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In the words of <strong>Mihir Rale, Chief General Counsel, Disney Star India</strong>, &ldquo;<em>This study is an important contribution to the discussion on digital safety, knowing that a lot of our lives are being spent online. It is even more urgent that steps are taken to address the problems and risks associated with the digital ecosystem, more so when these affect our children. I think the report will go a long way towards strengthening online security.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Present at the launch of the report was chief guest<strong> Smt. Annapurna Devi, Hon&#39;ble Minister of State for Education, Government of India</strong>, who gave a special address stating, &ldquo;<em>The National Education Policy, under the guidance of Hon&rsquo;ble Shri Narendra Modi Ji, has been created by honorary literates and equips the Indian youth and masses with Ed-tech. Wranga&rsquo;s efforts towards digital citizenship and online safety are being reflected in the project report taken up in collaboration with Disney Star, which is truly commendable.&rdquo; </em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">She further added, &ldquo;<em>In the present times, the digital presence of students and educational institutes has significantly increased. Thus, educating our youth about the safety and security of utilizing Internet is imperative to make them responsible digital citizens. Along with the teachers, it is also the responsibility of the youth&rsquo;s guardians to steer them in the right direction. I believe that this project will be beneficial, and congratulate the stakeholders from both Team Disney Star and Wranga for this achievement.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The release also saw panel discussions on the many aspects of digital citizenship, in which domain experts discussed existing gaps in online safety and shared recommendations on how young adults can become vigilant and accountable for their online actions.&nbsp;</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">&nbsp;</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=21217' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=21217</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_Wranga%20Logo.png</clientLogo>
      <pubDate>Wed, 03 Aug 2022 10:22:34 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[CyberPeace Foundation and TASK, Government of Telangana Signs MoU to Collaborate for CyberSecurity Research and Skilling Initiatives]]></title>
      <description><![CDATA[<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">State of Art CyberPeace Centre of Excellence (CoE) to be setup</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">To promote the State government&rsquo;s initiatives and establish a close and continuing interaction for exploring areas of mutual co-operation in the field of CyberSecurity Research, capacity building, CyberPeace Foundation and Telangana Academy for Skill and Knowledge (TASK) on Wednesday signed an MoU at Thub, Hyderabad in presence of Mr. KT Rama Rao, IT Minister of Telangana to collaborate on Cybersecurity research and cyber skilling activities across the state of Telangana to address the Global skill shortage of 3.5 million Cybersecurity experts.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/21100_CPF-TASK-MoU-Signing.png" style="width: 500px; height: 333px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Major Vineet Kumar, CPF with IT Minister of Telangana, Mr. KT Rama Rao and Mr. Jayesh Ranjan, IAS and Principal Secretary, I&amp;C and IT, Telangana Government</span></span></strong></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">&nbsp;As per the MoU, the objective of the MoU are organizing CyberSecurity sessions at all TASK colleges, conducting CyberPeace Challenges/Exercises/Hackathon to identify the Cyber Talents, initiate Joint Certification Courses in CyberSecurity, conduct Dialogues and Round table discussions on areas of concern in Emerging Technologies and CyberSecurity Domain, organizing Guest Lecture Series and FDP on Emerging Technologies, CyberSecurity, Critical Information Infrastructure (CII) Security and other upcoming areas. They would also be providing Development of Course Material for Academic institutions and Industry on Emerging Technologies and CyberSecurity, encouraging Capacity Building-<a href="https://www.cyberpeacecorps.in/">CyberPeace Corps</a> initiative for all students and constitute CyberPeaceCoE and CyberPeace Clubs.<br />
	<br />
	Representing TASK and CyberPeace Foundation, Shrikant Sinha, CEO, TASK and Major Vineet Kumar, Founder and Global President, CyberPeace Foundation, exchanged the MoU in the presence of IT Minister of Telangana, Mr. KT Rama Rao; Mr. Jayesh Ranjan, IAS and Principal Secretary, Industries &amp; Commerce (I&amp;C) and Information Technology (IT), Departments of the Telangana Government,. Also, present at the Event were Shri Krishnamachari Srikkanth, also known as Cheeka, is a former captain of the Indian cricket team and former chairman of the selection committee.&nbsp;<br />
	&nbsp;<br />
	<strong>Major Vineet Kumar, Founder and Global President, CyberPeace Foundation</strong> addressing the audience said, &ldquo;<em>We are extremely happy to collaborate with TASK, Government of Telangana for CyberSecurity research and Cyber skilling initiatives. This in turn would help enable a secure cyber ecosystem and also get CyberSecurity talents to bridge the Global skill gap in the CyberSecurity space</em>.&rdquo;<br />
	&nbsp;<br />
	The MoU shall require CyberPeace Foundation to setup CyberSecurity Center of Excellence, Identification of Cyber Talents; awareness programs and activities;assisting in developing Certifications and content related to Cybersecurity; to help in organizing the various competitions, Cyber Dialogues and roundtables; conduct awareness programs in radio channels and TV in association with TASK Telangana; to facilitate the experts for cyber internship programs; training the volunteers and creation of CyberPeace Corps volunteers in Telangana.<br />
	&nbsp;<br />
	<strong>About CyberPeace Foundation</strong><br />
	CPF is a Global civil society organisation and think tank of cybersecurity and policy experts. CPF is involved in Policy Advocacy, Research and Training related to all aspects of Cyber Peace and Cyber Security. Key areas of CPF work are in Technology / Internet Governance, Policy Review and Advocacy, Capacity and Capability creation and building through partnerships with various government organizations, academic institutions and civil society entities.&nbsp;</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=21100' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=21100</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_cybernew.JPG</clientLogo>
      <pubDate>Thu, 21 Jul 2022 16:04:51 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[CERT-In, Koo and CyberPeace Foundation Launch a Year-long CyberSecurity Awareness Campaign for Students on 6th July 2022]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">To encourage youth on safe and responsible use of technology, Indian Computer Emergency Response Team (CERT-In), Ministry of Electronics and Information Technology (MeitY), Koo and the CyberPeace Foundation have launched joint initiative &lsquo;<strong>#CybersKool</strong>&rsquo; for creating CyberSecurity awareness among Indian youth. The initiative aims to sensitize college level students and children across India over the next 11 months to make the internet and social media safe, secure and reliable.</span></span><br />
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/20974_Dignitaries%20at%20the%20CybersKool.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Dignitaries at the #CybersKool Launch</span></span></strong><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">#CybersKool will conduct a series of interactive webinars, panel discussions, workshops and competitions focused on information exchange around ethical online practices, cyber rights and duties, and responsible online behaviour. As an inclusive platform for sharing thoughts and opinions in native languages, Koo will run interactive activities for students like slogan writing and quizzes to encourage knowledge-sharing around online safety. Along with students, other relevant stakeholders like parents, guardians and the faculty are expected to participate in the activities. The year-long campaign will conclude with the release of a Digital CyberSafety Manual that will carry learnings from #CybersKool. The manual will be available on Koo and CyberPeace Foundation website for students to download and read.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">An independent and responsible platform, Koo has been driving citizen outreach efforts on an ongoing basis along with CERT-In around cyber security. With India being one of the fastest growing internet markets in the world, the need to inform and educate users, especially the youth around cyber hygiene, carries tremendous significance.</span></span><br />
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image2/20974_Students%20virtually%20attending.jpg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Students virtually attending the #CybersKool session</span></span></strong><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Spokesperson Koo</strong> said,<em> &ldquo;At Koo, in our effort to drive freedom of expression on social media in native languages, promoting safe and responsible user behaviour is a priority for us. #CybersKool initiative together with CERT-In and the CyberPeace Foundation is another step in that direction.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Major Vineet Kumar, Founder and Global President, CyberPeace Foundation</strong> said, <em>&ldquo;Students are active internet users and hence, one of the most vulnerable ones as well. #CybersKool - in partnership with platforms like Koo and CERTIn becomes necessary to educate the youth and relevant stakeholders about secure online practices. We are grateful for the association and look forward to a successful campaign ahead.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Director General, CERT-In, Dr. Sanjay Bahl</strong> said, <em>&ldquo;CyberSecurity Awareness on latest malicious cyber activities is a key element for Internet users and citizens to protect themselves from such activities. CERT-In, KooApp and CyberPeace Foundation are jointly organizing a yearlong cyber security awareness campaign <strong>&quot;CybersKool</strong>&quot; and launched it on 6th July 2022 as part of &#39;<strong>Cyber Jagrookta Diwas</strong>&#39;. The objective of this program is to sensitize the Internet users especially college level students and school children on safety &amp; security tips for protecting themselves from cyber-attacks, frauds and crimes. Along with CERT-In, KooApp, the Indian Micro-blogging and multi-language platform is actively working on creating cyber security awareness among Indian citizens in their local language. CERT-In sincerely hopes that this campaign will help the Internet users to understand that the technology used for empowering them to foster creativity and innovation must be used in a responsible, trusted and secure manner.&rdquo;</em></span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Koo </strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Koo, a multi-lingual, micro-blogging platform was launched in March 2020. The objective was to enable users across the World to express themselves online in their mother tongue. An innovator of language-based micro-blogging, currently Koo is available in 10 languages -&nbsp;Hindi, Marathi, Gujarati, Punjabi, Kannada, Tamil, Telugu, Assamese, Bengali and English. The platform&rsquo;s unique features include a translation feature which enables real-time translation of a post across the slew of languages, while retaining the sentiment and context of the original text. This enhances reach and garners greater traction for a user. The app has over 30 million downloads and is actively leveraged by over 7,000 people of eminence across politics, sports, media, entertainment, spirituality, and art &amp; culture to connect with their followers in multiple languages.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><a href="http://www.cyberpeace.org/">About CyberPeace Foundation</a></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">CyberPeace Foundation (CPF) is an award-winning civil society organization, think tank of cyber security and policy experts with the vision of pioneering CyberPeace Initiatives to build collective resiliency against cybercrimes &amp; global threats of cyber warfare. CyberPeace Foundation is involved in Policy Advocacy, Research and Training related to all aspects of CyberPeace and CyberSecurity. Key areas of CyberPeace Foundation work are in Technology Governance, Policy Review and Advocacy, Capacity and Capability creation and building through partnerships with various government organizations, academic institutions and civil society entities.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=20974' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=20974</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_cybernew.JPG</clientLogo>
      <pubDate>Sat, 09 Jul 2022 16:08:14 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Truecaller Conducts Cybersafety Trainings in Bengaluru as Part of its Women Safety Initiatives]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Truecaller</strong>, the world&rsquo;s leading global communications platform, in collaboration with CyberPeace Foundation, a non-partisan civil society organization, conducted their first training in Karnataka as part of the ongoing national #TrueCyberSafe campaign. The training focused on increasing awareness about cybercrime and building the capacity to navigate digital communication safely. Ms. Pramila Naidu, Chairperson-State Commission for Women and Chairman-Rajya Mahila Ayoga, Karnataka, Mr. BS Angadi, KSPS, Deputy Commissioner of Police, Crime 2, Bengaluru along with Pragya of Truecaller and Mr. Purnendu Singh of CyberPeace Foundation spoke at the event that was attended by students, faculties of various universities, police officers and others held at B.M.S. College of Engineering.</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">&nbsp;</span></span></p>

<table align="center" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/20689_DSC_0022.jpg" style="width: 500px; height: 333px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Ms. Pragya Misra, Director of Public Affairs at Truecaller India with other&nbsp;important dignitaries from Cyber Peace Foundation, BMS College at the TrueCyberSafe&nbsp;training in Bengaluru</span></span></strong><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The campaign has already reached close to 3 lakh Indians so far through impactful training sessions in the North Eastern Region and New Delhi.&nbsp;Through these awareness sessions, the attendees learn about the recent cyber scams and&nbsp;frauds, safety measures that people can take and the reporting mechanisms available within Truecaller and otherwise that allow for relevant authorities like the Police to take action.&nbsp;<br />
	<br />
	Gracing the event by her presence, <strong>Ms. Pramila Naidu, Chairperson-State Commission for Women and Chairman-Rajya Mahila Ayoga, Karnataka</strong> said, &ldquo;<em>The Commission&rsquo;s primary responsibility is to safeguard the rights of women and proactively work to improve the safety and security of women in Karnataka. Traditionally, we had mostly been dealing with cases of physical abuse, like domestic violence and acid attack. However, recently we have seen that cases of digital fraud and online harassment are also increasing. While there have been numerous benefits of increased access to smartphones and technology for women, it has also exposed them to both new and old harms in the digital space. However, my message here would be to reinforce that the Commission is prepared and we are here to create awareness and provide support and protection to women. I am thankful that Truecaller and CPF have taken this initiative to build capacity on this issue, and I am sure that it will help everyone who joins the #TrueCyberSafe campaign to access and interact with digital spaces in a safe and secure manner</em>.&rdquo;<br />
	<br />
	The technical interactive training session at BMS College and R.V. College of Engineering focused on the different types of threats and frauds in the digital world and ended with equipping attendees with best practices, tools and skills needed to protect themselves from harm. Numerous safety features within Truecaller like auto block, spam tagging, one-click national helpline, smart SMS and much more were spotlighted as well. At the end of the session, the participants were encouraged to become active contributors to #TrueCyberSafe by sharing the knowledge with their friends and family, ensuring that more and more people can help make digital communication safe.&nbsp;<br />
	<br />
	<strong>Mr. BS Angadi, KSPS, Deputy Commissioner of Police, Crime 2, Bengaluru</strong>, said, &ldquo;<em>As the state with the tech capital of India, Karnataka has the highest recorded cyber crime rate in India. One of the main reasons for this is that we have made it easier for citizens to report cyber crimes in Karnataka. Cyber Crimes police stations have been established in each district, and citizens in Karnataka can directly report cybercrimes on the 112 helpline. The Karnataka model of the Cybercrime Incident Report (CIR) system has made it easier for citizens to file complaints and is being studied for implementation in other states as well. We are cognizant of the threat posed by cybercriminals and are proactively working to prevent online fraud and harassment. In this context, I would like to congratulate both Truecaller and CPF for taking this initiative and helping to create awareness amongst citizens on how to have a safe digital experience</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Addressing the dignitaries and the audience,<strong> </strong>the Principal<strong>, BMSCE, Dr. S Muralidhara</strong> said, &quot;<em>In today&#39;s world when the internet is rapidly growing and everybody is online all the time, people often ignore their safety and security. Our contact information is highly susceptible to getting into the wrong hands and resulting in people getting vulnerable online. Often we users get unwanted calls and messages leading to gullible public getting trapped by cyber criminals. To educate&nbsp;everybody, we are happy and honored to share that CyberPeace Foundation and TrueCaller have joined hands to launch the campaign #TrueCyberSafe at BMS College of Engineering Bengaluru. I would request all the students, teachers, staff members to be&nbsp;part of this initiative and spread the message about the campaign&nbsp;in their family circles, so as to&nbsp;give people the knowledge and tools to be safe online</em>.&quot;</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Ms. Pragya Misra, Director of Public Affairs, Truecaller</strong> said,&nbsp;&ldquo;<em>Almost all the activities in our daily lives, whether social, economic, educational, are overlapping in digital spaces. There are immense benefits that the internet and use of technology bring but it lends itself to challenges like spam and fraud that we must protect ourselves from. At Truecaller, safety continues to be an absolute priority and we are constantly working towards building trust in communication over phone and SMS by making it safe. With the TrueCyberSafe initiative, we are expanding the scope of our efforts to increase awareness about Cyber fraud and build user capacity on how people can stay safe while communicating. We are happy to be bringing this national campaign to Karnataka, and I hope that along with the efforts of the government and the police, we are able to make communication safer for more Indians</em>.&quot;</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Talking about the CyberPeace-The Need of the hour,<strong> Mr. Purnendu Singh, Director-Operations and Strategy, CyberPeace Foundation</strong> said, &ldquo;<em>#TrueCyberSafe is a monumental initiative to eradicate the menace of cybercrime from cyberspace, by sowing the fruitful seeds of awareness and knowledge among the people. Awareness among children and elderly is essential as they are most vulnerable, hence safeguarding the youngsters will in turn safeguard the future generations. CyberPeace Foundation in collaboration with various corporates and govt agencies have launched various projects to strengthen the online safety and security, some of these projects are-E-Raksha, E-Shakti, E-Saksham, Safety Track and various hackathons, hence today with #TrueCyberSafe campaign we consolidate our take on war against cyber crimes more efficiently. Stay CyberSafe !! Stay CyberSecure</em> !!&rdquo;</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The joint initiative was launched nationwide in February 2022. The campaign aims to create awareness by training 15 lakh people across 5 regions of India to tackle cyber fraud leading to a safer digital communication and increasing awareness about the steps that our users can take to avoid fraud, spam and scams. The campaign will gradually be launched in two other regions in the upcoming months.&nbsp;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Truecaller</strong><br />
	We enable safe and relevant conversations between people and make it efficient for businesses to connect with consumers. Fraud and unwanted communication are endemic to digital economies, especially in emerging markets. We are on a mission to build trust in communication. Truecaller is an essential part of everyday communication for over 310 million active users, with half a billion downloads since launch and close to 38 billion unwanted calls identified and blocked in 2021. Headquartered in Stockholm, since 2009, we are a co-founder-led, entrepreneurial company, with a highly experienced management team. Truecaller has been listed on Nasdaq Stockholm since 8 October 2021.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">For more information, please visit <a href="https://corporate.truecaller.com/">corporate.truecaller.com</a>.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=20689' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=20689</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_trucaller-logo.png</clientLogo>
      <pubDate>Fri, 10 Jun 2022 15:56:10 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[CyberPeace Foundation and Amazon Launches #FightTheFraud Initiative]]></title>
      <description><![CDATA[<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Amazon India has collaborated with the CyberPeace Foundation and Knowledge Partner, Rashtriya Raksha University (RRU) to launch the #FightTheFraud initiative to rally against the increasing cases of online scams</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Aimed to drive awareness to better equip consumers, brands and small businesses on online safety</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">To dial-up awareness around online scams, Amazon India today announced a one-of-its-kind consumer awareness initiative &lsquo;<strong>#FightTheFraud</strong>&rsquo;, in collaboration with the CyberPeace Foundation and Rashtriya Raksha University, an Institute of National Importance under the aegis of Ministry of Home Affairs, Government of India as a knowledge partner. The initiative intends to develop a collective response against the growing cybercrime and online scams in India through a range of activities such as webinars, social media awareness campaigns, capacity-building workshops, and others. All relevant stakeholders including consumers, small businesses, industry associations, civil society organizations, and government bodies are expected to participate in these activities.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Combating online fraud and scams has been a top priority of Amazon; it has implemented industry-leading processes to create a secure and safe online marketplace for all relevant stakeholders. These processes include stringent seller verification, using Artificial Intelligence (AI) and Machine Learning (ML) tools, to help identify and address potential scams and other fraud prevention measures based on a set of weighted performance criteria determined from feedback reviews and other parameters.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The #FightTheFraud initiative will supplement the measures taken by e-commerce entities, civil societies and government agencies. Lt Gen (Dr.) Rajesh Pant (Retd), PVSM, AVSM, VSM, National Cyber Security Coordinator (NCSC) at the Prime Minister&rsquo;s Office, Government of India launched the event in the presence of Col Nidhish Bhatnagar, Rashtriya Raksha University, Ministry of Home Affairs, Govt of India, Major Vineet Kumar, Founder and Global President, The CyberPeace Foundation and Chetan Krishnaswamy, Vice President, Public Policy, Amazon India.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><img alt="" src="https://www.newsvoir.com/images/article/image1/20679_cyber%2009_01.JPG" style="width: 500px; height: 278px; margin-left: 10px; margin-right: 10px;" /></span></span></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Dignitaries at the launch of </strong></span></span><strong>#FightTheFraud</strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong> initiative by CyberPeace Foundation and Amazon</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Speaking on the power and impact of a collaborative approach to fighting issues of online scams,&nbsp;<strong>Sumit Sahay, Director, Seller Partner Services, Amazon India,</strong>&nbsp;said,&nbsp;&ldquo;<em>There is growing uncertainty around cybercrime, and it remains a significant issue plaguing oblivious consumers across industries. We believe that through efficacious collaboration between the stakeholders, which includes industry leaders, policymakers, law enforcement agencies, and consumers, will we be able to resolve this complex issue and derive key learnings. #FightTheFraud initiative is a valuable first step toward bringing together the stakeholders and will serve as a vantage point for collective action</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Lt General (Dr.) Rajesh Pant (Retd.), National Cyber Security Coordinator (NCSC), Government of India </strong>said,&nbsp;&quot;<em>The World Economic Forum (WEF) has termed cybercrime as the biggest man-made risk to the economic progress of nations and it is said that in a few years of time the total losses, globally are going to touch $10 trillion dollars. Per a report titled Cyber Prabhaav published by the Ministry of Home Affairs, the first quarter of 2022 saw a rise of 31% in reported complaints, on the government portal cybercrime.gov.in, as compared to the last quarter of 2021</em>,&rdquo;&nbsp;<strong>Lt General (Dr.) Pant </strong>added,&nbsp;<em>&ldquo;#FightTheFraud initiative is both timely and important given the rising incidence of online scams over the last few years</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Major Vineet Kumar, Founder and Global President, CyberPeace Foundation</strong>&nbsp;said,&nbsp;&ldquo;<em>I feel this is a very good time to launch the campaign and a very relevant time because post pandemic, post pandemic, we have seen a surge in the number of cyber frauds and cybercrimes happening that are taking place with people, the netizens all across. It&rsquo;s not just cities; it&rsquo;s also going to the villages and smaller towns. We all need to come together and create a safe space online for sellers, consumers and brands</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Individual addresses from dignitaries were followed by a panel discussion on the theme of &ldquo;<strong>Enhancing Customer Trust through Collaborations</strong>&rdquo;. The discussion highlighted risks faced by consumers, small businesses and brands from online scams and the range of measures adopted by stakeholders to mitigate these risks.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><img alt="" src="https://www.newsvoir.com/images/article/image2/20679_cyber%2009_02.JPG" style="width: 500px; height: 277px; margin-left: 10px; margin-right: 10px;" /></span></span></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Ongoing Panel Discussion on &ldquo;Enhancing Customer Trust through Collaborations&rdquo;</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About&nbsp;Amazon.in</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The&nbsp;Amazon.in&nbsp;marketplace is operated by Amazon Seller Services Private Ltd, an affiliate of Amazon.com, Inc. (NASDAQ: AMZN).&nbsp;Amazon.in&nbsp;seeks to build the most customer-centric online destination for customers to find and discover virtually anything they want to buy online by giving them more of what they want -&nbsp;vast selection, attractive prices, fast and reliable delivery, and a trusted and convenient experience; and provide sellers with a world-class ecommerce marketplace.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>For more information</strong>, please visit&nbsp;<a href="http://www.amazon.in/aboutus">www.amazon.in/aboutus</a>. For news on Amazon, follow&nbsp;<a href="http://www.twitter.com/AmazonNews_IN">www.twitter.com/AmazonNews_IN</a></span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Amazon</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Amazon is guided by four principles: customer obsession rather than competitor focus, passion for invention, commitment to operational excellence, and long-term thinking. Amazon strives to be Earth&rsquo;s Most Customer-Centric Company, Earth&rsquo;s Best Employer, and Earth&rsquo;s Safest Place to Work. Customer reviews, 1-Click shopping, personalized recommendations, Prime, fulfilment by Amazon, AWS, Kindle Direct Publishing, Kindle, Career Choice, Fire tablets, Fire TV, Amazon Echo, Alexa, Just Walk Out technology, Amazon Studios, and The Climate Pledge are some of the things pioneered by Amazon.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">For more information, visit&nbsp;<a href="https://www.aboutamazon.com/">amazon.com/about</a>&nbsp;and follow @AmazonNews</span></span></p>

<p>
	<br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About The&nbsp;CyberPeace Foundation</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">CyberPeace Foundation (CPF) is an award-winning civil society organization, think tank of cyber security and policy experts with the vision of pioneering cyber peace Initiatives to build collective resiliency against cybercrimes &amp; global threats of cyber warfare. CyberPeace Foundation is involved in Policy Advocacy, Research and Training related to all aspects of cyber peace and cyber security. Key areas of CyberPeace Foundation work are in Technology Governance, Policy Review and Advocacy, Capacity and Capability creation and building through partnerships with various government organizations, academic institutions and civil society entities.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">For more information, please visit:&nbsp;</span></span><a href="http://www.cyberpeace.org/">www.cyberpeace.org</a>.</p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=20679' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=20679</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_cyber-autobot.png</clientLogo>
      <pubDate>Thu, 09 Jun 2022 18:05:31 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[SecurView Launches Next-Generation Cybersecurity Solutions to Protect Hybrid and Remote Workplaces]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Remote Working and Hybrid Workplaces are two emerging trends in the industry that are driving the adoption of digital transformation. Cyberattacks, such as ransomware, are becoming a day-to-day struggle for businesses, with the average cost of a breach estimated at several millions by the Ponemon Institute. Additionally, there is a shortage of Cybersecurity experts in the job market that further compounds the problem. <strong>SecurView</strong> has launched next-generation Cybersecurity solutions to meet these growing demands, including a new state-of-the-art Cyber Defense &amp; Resiliency Center (CDRC) in Pune, India. The Center consists of several innovations and collaboration techniques that result in faster threat detection and resolution. This capability also includes support for OT and the IT world.</span></span><br />
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><img alt="" src="https://www.newsvoir.com/images/article/image1/20306_Photograph%20for%20Securview%20Press%20Release.png" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></span></span></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Inauguration of the new state-of-the-art CDRC in Pune</strong></span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Over the past ten years, SecurView has delivered hundreds of security projects involving Network Access Control, Wide Area Networking and Data Center security. SecurView&rsquo;s Cyber Defense Center provides end-to-end managed security for Zero-Trust Networking (that includes managed NAC, NextGen Firewalls, RA-VPN, Compliance) for on-prem and Cloud IT assets for customers.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&ldquo;SecurView&rsquo;s mission is to assist organizations in implementing cybersecurity solutions effectively.&nbsp;Our cloud-native Next-Gen platform provides contextual threat intelligence. Cybersecurity threats are becoming complex, and many organizations find it difficult to prevent evolving threats such as ransomware attacks.&nbsp;With this in mind, we are proud of our new state-of-the-art CDRC in Pune, India that is available to customers globally,&rdquo;</em> said <strong>Rajeev Khanolkar, President and CEO of SecurView</strong>.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&ldquo;SecurView continues to be a trusted service provider that helps customers adopt to a more proactive security approach. We have proven security methodologies, expertise, and a customer-centric approach. Our world-class SOC analysts perform 24x7 security monitoring and management, along with advanced analytics and threat hunting,&rdquo; </em>said <strong>Nilesh Patil, Managing Director of APAC and EMEA at SecurView</strong>.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&quot;SecurView is a leading cybersecurity solutions service provider focusing on helping organizations with the implementation and optimization of their security devices and services. They are differentiated in the market by their quick time-to-value, reduced complexity, and cost of implementation for customers&rsquo; cyber security needs. SecurView&#39;s mission is to help clients stay ahead of threats and mitigate risks that could impact their businesses. SecurView team monitors systems around-the-clock to protect Fareportal&#39;s service reliability as a trusted customer,&quot; </em>says <strong>Ankur Ahuja, CISO, Fareportal.</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>SecurView Solutions</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Here is a partial list of SecurView&rsquo;s solutions:</span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Security Operations Center</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">MDR (Managed Detect and Response)</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Zero Trust Networking</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">NAC/Segmentation (Cisco ISE and TrustSec)</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Micro-segmentation</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Next-Generation Firewalls</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">SDN - Architecture, Implementation, and Optimization</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">SDWAN - Architecture, Implementation, and Optimization</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Remote Access VPN</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Cloud Security</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">IoT Security</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Malware Protection</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">IT-GRC</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Automation</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Product Engineering</span></span><br />
			&nbsp;</p>
	</li>
</ul>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About SecurView</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">SecurView is a leading cybersecurity services provider focused on helping organizations implement and optimize their security landscapes. In July 2018, the RAG-Stiftung (RAG Foundation), through its investment company RAG-Stiftung Beteiligungsgesellschaft mbH (RSBG), acquired the shares in SecurView, allowing plans to open new business areas and markets, particularly in Europe, to build upon SecurView&rsquo;s successful international growth path. RSBG provides the company with over 45 countries and 90 offices globally.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Learn more at <a href="http://www.securview.com/">www.securview.com</a>.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=20306' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=20306</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_SecurView-Logo.png</clientLogo>
      <pubDate>Wed, 25 May 2022 12:14:29 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[IETE, CyberPeace Foundation and Ranchi University Signs MoU for a Safer Cyber Space]]></title>
      <description><![CDATA[<p style="margin-left:.5pt;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">CyberSpace Research, Diploma courses on CyberSecurity and CyberSecurity Entrepreneurship will now be available on the premises of Ranchi University in Jharkhand.</span></span></p>

<p>
	&nbsp;</p>

<p style="margin-left:.5pt;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The <strong>CyberPeace Foundation</strong>;<strong> Institution of Electronics and Telecommunication Engineers (IETE)</strong> and <strong>Ranchi University</strong> has entered into a strategic collaboration to work together in the area of cyber space research, policy and advocacy along with other facilities. The CyberPeace Foundation President Major Vineet Kumar, IETE chairperson, Ranchi Shri K.K. Thakur and Ranchi University Vice Chancellor Dr. (Mrs.) Kamini Kumar signed a Memorandum of Understanding (MoU) on May 19.</span></span></p>

<p style="margin-left:.5pt;">
	&nbsp;</p>

<p style="margin-left:.5pt;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">While IETE and CyberPeace Foundation will be responsible to provide technical guidance to the programme, Ranchi University shall be responsible for infrastructure support including faculty support and developing a research lab for the cause.&nbsp;</span></span></p>

<p style="margin-left:.5pt;">
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/20450_cyber%2020-05.JPG" style="width: 500px; height: 280px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Founder, CyberPeace Foundation briefing the media persons about the initiative</strong></span></span></p>

<p style="text-align: center;">
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The collaboration effective from Thursday will encourage research in the field CyberPeace, CyberSecurity, Cyber Defence and Internet Engineering and Governance. With lack of skilled manpower in the area of CyberSecurity defence, the collaboration aims to start new forces in concerned areas and introduce technical trainings to enhance skills in the said domain.</span></span></p>

<p style="margin-left:21.3pt;">
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The collaboration will also promote cyber security entrepreneurship, innovation, design and develop indigenous software to help maintain cyber security, cyber peace and Internet standards.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">This apart, the collaboration will also encourage events, awareness program and internship opportunities, cyber security skills and education, research and development and faculty development program. Some of the activities planned are as follows:</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">1. Live Project</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">2. CyberPeace Quick Reaction Team (CQRT)</span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Detection of Fraudulent UPI Handles</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Phishing content</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Fraudulent Mobile Application</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Release threat advisory against real time Cyber Threats</span></span></p>
	</li>
</ul>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">3. Global and National level Cyber Security Hackathon</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">4. Internship opportunities</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">5. Certifications</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">6. Updates of Events and Activities</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">7. CyberPeace Club</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">A joint committee, a joint expert group and an advisory council will be formed for the overall administrative, academic, monitoring and review of the programme.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The MoU signing was graced by<strong> Honorable Vice Chancellor Dr. (Mrs.) Kamini Kumar</strong> and her team mentioned, &ldquo;<em>Our initiative in collaboration with CyberPeace Foundation and IETE here is to increase employability for our students and awareness for our teachers. We already teach subjects like Network Security, Artificial Intelligence, Internet of Things, etc. By this collaboration we intend to impart practical skills to the students. We will be providing the framework for the courses and CyberPeace Foundation will be developing them. This when gets approved will be taught as a 6 month course or a 1 year diploma</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">At the occasion, <strong>Shri KK Thakur, Chairman - IETE, Ranchi, CGMT (Retd), BSNL</strong> said, &ldquo;<em>Jharkhand </em><em>IETE and CyberPeace Foundation jointly have done this CoE and have been engaged in different research work, which have been published in various newspapers and magazines. This MoU with Ranchi University is really going to be a landmark for us as Jharkhand is already dealing with a lot of cybercrimes. This step is taken to educate people, the young generation, police personnel, teachers and netizens. We wish that there should be a lot of cyber training and this COE is going to work in this direction. We are going to have good courses for our students. There are a lot of job opportunities in this field and this is really going to be a boon for our state.</em>&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">While signing the MoU, Major <strong>Vineet Kumar, Founder and Global President, CyberPeace Foundation</strong> addressed the media and everyone there and mentioned, &ldquo;<em>CyberPeace Foundation is a Global initiative started from India. CyberPeace wishes to create an ecosystem for CyberPeace and CyberSecurity across the globe. It also aims to provide a platform to the students to showcase their cyber expertise and get them skill ready for the opportunities in field of CyberSecurity. There is still a CyberSecurity workforce gap of more than 2.72 million positions. Through this CoE we wish to bridge the skill gap</em>.&rdquo;</span></span></p>

<p style="margin-left:.5pt;">
	&nbsp;</p>

<p>
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">About Organizations</span></span></strong></p>

<p style="margin-left:.5pt;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>CyberPeace Foundation</strong> is an apolitical civil society organization and think tank of cyber security and policy experts. CPC is involved in Policy Advocacy, Research and Training related to all aspects of CyberPeace and Cyber Security. Key areas of its work are in Technology/Internet Governance, Policy Review and Advocacy, Capacity and Capability creation and building through partnerships with various government organizations, academic institutions and civil society entities.</span></span></p>

<p style="margin-left:.5pt;">
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Founded on Nov.1953, <strong>The Institution of Electronics and Telecommunication Engineers (IETE) </strong>is a leading professional society devoted to the advancement of science and technology of Electronics, Telecommunications, Computers and Information Technology. IETE serves its over 70,000 members both individuals and industries/organizations through its 57 centers spread all over India including one in Kathmandu, Nepal.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=20450' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=20450</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_cyber-autobot.png</clientLogo>
      <pubDate>Fri, 20 May 2022 16:38:02 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[KTR Commits to Assigning Resources for the Safety of Women as Part of News18 Network and Truecaller&apos;s &apos;CallItOut&apos; Telangana Initiative]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>News18 Network</strong> and Truecaller&rsquo;s nationwide initiative <strong>#CallItOut</strong> against harassment concluded with rounds of impactful discussions in Telangana. Focused on the need to stand against harassment faced by women, the initiative encourages their safety online as well as the real world. Recognizing the role of men as allies, the event witnessed influential dignitaries from various sports, political and police backgrounds voicing against one of the most dealt with societal issues faced by women all over India.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/20415_callitout.JPG" style="width: 500px; height: 303px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>News18 Network and Truecaller&rsquo;s &#39;CallItOut&#39; Telangana initiative</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Sharing some aspects of Telangana&#39;s phenomenal digital journey and prioritizing the need for online safety,&nbsp;<strong>KT Rama Rao, Cabinet Minister For IT E&amp;C, MA&amp;UD And Industries &amp; Commerce Departments, Telangana&nbsp;</strong>said, <em>&ldquo;</em><em>We would potentially set up a separate cell for those women who would like to call out online abuse. We would ensure that dedicated resources are provided which might help Telangana become a shining example to the rest of the country.&rdquo; </em>He further added, <em>&ldquo;A fine line must be drawn between freedom of speech and online harassment especially&nbsp;in the virtual world. The Government of Telangana will continue to bring measures for empowering women while taking every possible action against the perpetrators.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Following a keynote address by KT Rama Rao, Cabinet Minister For IT E&amp;C, MA&amp;UD And Industries &amp; Commerce Departments, Telangana, the stage opened for a one on one discussion between Ms K Kavitha, Member of Telangana Legislative Council and Ms Marya Shakil, Senior Political Editor, News18 Network.<strong> </strong>Appreciating the initiative, <strong>Ms K Kavitha</strong> stressed on the need for financial as well as societal empowerment of women while encouraging the audience to rise above gender bias. She said, <em>&ldquo;A collaborative effort is required to tackle harassment by focusing on the need to report things which are disturbing for women in order to bring a logical end to it.&rdquo;</em> Calling the male counterparts as allies, the minister called them an additional strength who can expand the boundaries of communication around women safety.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Inspiring women to call it out and report, the next phase of discussion brought views from notable speakers in the police department -&nbsp;Swati Lakra, Additional Director General of Police, Telangana; Mr. Jayesh Ranjan - Principal Secretary ITE&amp;C Dept., Government of Telangana and Mr. CV Anand, Commissioner of Police, Hyderabad.<strong> </strong>The speakers shared the phenomenal role played by The She Teams, a task force popularly known as the armor of women started exclusively to work for the safety and security of women. <strong>Mr. Anand</strong> shared that the police department is conducting training sessions of the officials, counseling them so that women can come forward and comfortably report anything which disturbs them. <strong>Ms Swati, </strong>on the other hand<strong>,</strong> told the audience about her experience while running initiatives like CybHER and Cyber Congress which were initiated to provide a safe digital space for women and develop cyber ambassadors. Sharing his views on the need for a balance in use of technology and calling the initiative timely, <strong>Mr. Ranjan</strong> said, <em>&ldquo;Digitalization is important but we need to have sophisticated technology as this space evolves.&rdquo;</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The discussion also witnessed the presence of Upasana Kamineni Konidela, Founder of URLife, Vice-chairperson of CSR at Apollo Hospitals and MD of Family Health Plan Insurance TPA Ltd.</span></span>&nbsp;<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">and the Editor-in-Chief, B Positive Magazine who focused on the need to practice good digital hygiene and Mr. J Srinivas Rao, Chairman, Telangana State Commission for the protection of Child Rights<strong> </strong>who called women safety a subject of everybody&rsquo;s concern<strong>.&nbsp; </strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Renowned Badminton player -&nbsp;Mr. Parupalli Kashyap who also shared the stage with other panelists highlighted on the need of spreading more awareness around the issue while Founder &amp; Director of Youngistaan Foundation<strong> </strong>who has actively been involved issues around harassment<strong>&nbsp;-&nbsp;</strong>Mr. Y Arun Daniel Kumar applauded the role men have been playing in empowering women and encouraged the audience to appreciate it during this consciousness building conclave.&nbsp;</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=20415' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=20415</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_news18logo.png</clientLogo>
      <pubDate>Wed, 18 May 2022 14:33:12 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Truecaller and Cyberpeace Foundation Launched &apos;TrueCyberSafe&apos; Training Program in Collaboration with Assam Police to Raise Awareness against Cyber Crime]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Truecaller</strong>, the leading global platform&nbsp;for verifying contacts and blocking unwanted communication, in collaboration with CyberPeace Foundation, a non-partisan civil society organisation, launched the first training of <strong>#TrueCyberSafe</strong> focused on Internet safety at the Royal Global University in Guwahati, Assam. The joint initiative by the organisations aims to create awareness and train people to tackle cyber frauds leading to a safer online experience. The safety training that begins in Assam will be held in five regions across India to increase awareness about the steps that our users can take to avoid fraud, spam and scams.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/20311_tru%2007.JPG" style="width: 500px; height: 312px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Ms. Pragya Misra, Director of Public Affairs at Truecaller India addressing the audience at the training</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The event was graced by Shri Anurag Goel, IAS, Principal Secretary, IT Department, The Commissioner of Police, Guwahati, Mr. Harmeet Singh, the Founder and GlobalPresident, CyberPeace Foundation, Major Vineet Kumar and Ms. Pragya Misra Mehrishi, Director of Public Affairs, Truecaller and was attended by other important dignitaries, students and faculties of the University.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">While delivering the Keynote address and launching the Campaign in Assam, <strong>Shri Anurag Goel, IAS, Principal Secretary, IT Department, Assam</strong> said, &ldquo;<em>The COVID-19 pandemic has highlighted the vulnerabilities of cyberspace, which is evidenced by the rise in cyber attacks in the past few years. This can only be tackled through better awareness and building the capacity of people to recognise and report cybercrimes. Taking cognizance of this issue, the government of Assam has taken several measures in the past, including organising a month-long cyber awareness drive and issuing a one-stop guide book on how to stay safe online. We are very happy to see Truecaller play a role in raising awareness, and we wish them all the best. We are confident that this will prove to be an extremely fruitful exercise</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Gracing the event by his presence,<strong> Commissioner of Police, Guwahati, Mr. Harmeet Singh</strong> said, &quot;<em>With rapid innovations in technology, there is also a corresponding rise in cyberthreats and online harassment. India has seen a five-fold jump in cyber fraud cases between 2018 and 2021. As we continue our march towards technology, these negative externalities will also continue to grow. Hence, it is imperative that we take measures to empower citizens, and the first step to achieving this is raising awareness about digital safety and outlining the ways in which people can report cyber crimes. I&rsquo;m certain that this nationwide program will go a long way in realising this goal</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Ms. Pragya Misra Mehrishi, Director of Public Affairs,</strong><strong> Truecaller </strong>said, &ldquo;<em>In this modern world, cyber safety is a pressing issue that needs </em><em>immediate attention and redressal. Our past surveys show that while one in five women in India receive sexual harrassment calls, only 12 percent report it to the authorities. This shows the extent of normalization in the country. Truecaller has always been committed to ensuring digital spaces are safe for everyone. There is a need for citizens, policymakers, volunteers, government and the civil society to join hands to raise awareness and play a role in making digital communication safer for everyone. It is with this objective that Truecaller has partnered with CyberPeace Foundation to launch #TrueCyberSafe to encourage digital users to learn how to stay safe online, take steps to report cybercrimes and aid them in nurturing the faculties of critical thinking and empathy. The program will focus on improving netizen&rsquo;s resilience and capacity to access the digital world safely, increase awareness on Cyber Frauds and its impact on communities. We are certain that this program will play an instrumental role in raising awareness and creating impact in the society.</em>&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Talking about the &ldquo;<strong>CyberPeace - The Need of the hour</strong>&rdquo; <strong>Major Vineet Kumar, Global President and Founder, CyberPeace Foundation </strong>said, &ldquo;<em>Since the past two decades CyberPeace Foundation has emphasised on Online Safety and the issues that might be faced in the upcoming days. Post the onset of pandemic, we did see a rise in the Online Frauds and hence we have constantly collaborated with the organisations across the globe to ensure that the netizens stay CyberAware and CyberAlert and they know the mechanism to report and raise their voices. On our helpline, we get almost 10-11 cases per day related to CyberFrauds. To address this issue, we along with Truecaller believe that this program on understanding online threats and safety is the future of Internet use. When we combine our content and expertise of Truecaller, we can create truly transformative learning experiences that deliver actionable intelligence and we are hopeful to provide the participants with lessons to follow for a safer and peaceful Cyberspace.</em>&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The launch was followed by the inaugural session conducted by Head-Capacity Building, CyberPeace Foundation, Dr. Rakshit Tandon, under the #TrueCyberSafe campaign. During the session Dr. Tandon talked about the recent cyber crimes and Safety measures that one can incorporate in their daily lives to stay CyberSafe. The session also spoke about various reporting mechanisms including the Government reporting portal <a href="http://www.cybercrime.gov.in/">www.cybercrime.gov.in</a> and CyberPeace WhatsApp helpline number +91 9570000066. The session also discussed the various safety features of Truecaller for users.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>For more information</strong>, please contact:&nbsp;</span></span><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><a href="mailto:press@truecaller.com">press@truecaller.com</a>; <a href="mailto:secretariat@cyberpeace.net">secretariat@cyberpeace.net</a></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Truecaller</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">We enable safe and relevant conversations between people and make it efficient for businesses to connect with consumers. Fraud and unwanted communication are endemic to digital economies, especially in emerging markets. We are on a mission to build trust in communication. Truecaller is an essential part of everyday communication for over 300 million active users, with half a billion downloads since launch and close to 38 billion unwanted calls identified and blocked in 2021. Headquartered in Stockholm, since 2009, we are a co-founder-led, entrepreneurial company, with a highly experienced management team. Truecaller has been listed on Nasdaq Stockholm since 8 October 2021.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>For more information</strong>, please visit<a href="https://corporate.truecaller.com/"> corporate.truecaller.com</a><u>.</u></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About CyberPeace Foundation</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">CyberPeace Foundation (CPF) is an award-winning non-partisan civil society organization, think tank of cybersecurity and policy experts with the vision of pioneering CyberPeace Initiatives to build collective resiliency against cybercrimes &amp; global threats of cyber warfare. CPF is involved in Policy Advocacy, Research and Training related to all aspects of CyberPeace and Cyber Security.Key areas of CyberPeace Foundation work are in technology governance, policy review and advocacy, capacity and capability creation and building through partnerships with various government organizations, academic institutions and civil society entities.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=20311' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=20311</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_trucaller-logo.png</clientLogo>
      <pubDate>Sat, 07 May 2022 13:14:39 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Indian Petroleum Refineries Network Faces Enormous Cyber Attacks from October 2021 to April 2022: CyberPeace Foundation and Autobot Infosec]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The vulnerable, exposed systems that are unmonitored and facing the internet are the most attacked targets for threat actors.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Research done by <strong>CyberPeace Foundation (CPF), Autobot Infosec Private Limited, </strong>along with <strong>CyberPeace Center of Excellence (CCoE), </strong>has found that nearly <strong>3.6 lakhs</strong> attack events have been recorded between October 2021 to April 2022 on Critical Information Infrastructure (CII) threat intelligence sensors network simulating the Petroleum Refinery network simulated by the research group in India.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The study is a part of CyberPeace Foundation&rsquo;s e-Kawach program to implement a comprehensive public network and threat intelligence sensors across the country to capture internet traffic and analyze real time cyberattacks that a location or an organization faces. A credible intelligence on real-time threats empower organizations or a Country to build cybersecurity policies.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">&ldquo;<em>By deploying the simulated network, we can collect data on attack patterns, the different types of attack vector for the different protocols, and the recent trends of malicious activity</em>,&rdquo; spokesperson, CyberPeace Foundation added.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Trends noticed by the research</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Like any other critical infrastructure worldwide, Indian critical infrastructure is also vulnerable to cyber attacks involving state &amp; non-state actors. The SCADA Critical Information Infrastructure (CII) threat intelligence sensors network simulating the Petroleum and refinery industry deployed by the CyberPeace Foundation, Autobot Infosec Private Ltd. with the CyberPeace Center of Excellence (CCoE) partners have seen a surge in the number of cyberattacks with <strong>359,989</strong> hits between October 2021 to April 12th 2022.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Being Specific,</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In October 2021: 117633 hits</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In November 2021: 55871 hits</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In December 2021: 20714 hits</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In January 2022: 52598 hits</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In February 2022: 19342 hits</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In March 2022: 69998 hits</span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In April 2022 (Till 12th): 23833 hits</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The Mostly attacked protocols were FTP, HTTP, s7comm, Modbus, SNMP, BACnet.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In addition, there is an increase in the number of phishing/social engineering attacks on Indian organizations in the petroleum or refinery business, as is illustrated in the following case.&nbsp;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Recently, news has been making the rounds on the internet that Oil India Limited&#39;s field headquarters in Assam&#39;s Dibrugarh faced a Cyberattack with the injected malwareon their systems, asking for USD 75,00,000 as a ransom.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><img alt="" src="https://www.newsvoir.com/images/article/image1/20102_cyber%2024.JPG" style="width: 500px; height: 144px; margin-left: 10px; margin-right: 10px;" /></span></span></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>WhatsApp message containing fake url</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In addition to this, the CPF spokesperson has also drawn attention to WhatsApp messages masquerading as an offer from Indian Oil with links luring unsuspecting users with the promise of Indian Oil fuel subsidy presents making the rounds on the app recently. If you receive such messages, try to avoid them, as they can be a scam.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">A similar study has been conducted by the Research Teams, based on a WhatsApp campaign that contained a link <strong>pretending</strong> to be a gift offer from Indian Oil that asks users to participate in a survey and get a chance to win USD 2000.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:315px;">
	<tbody>
		<tr>
			<td>
				<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><img alt="" src="https://www.newsvoir.com/images/article/image2/20102_cyber%2024%2001.JPG" style="width: 315px; height: 294px; margin-left: 10px; margin-right: 10px;" /></span></span></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Fake Congratulatory message</span></span></strong></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Warning Signs of the Campaign:</strong></span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The campaign is pretended to be an offer from Indian Oil Corporation but is hosted on the party third-party domain instead of the official Indian Oil Corporation website, which makes it more suspicious.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The domain name associated with the campaign has been registered in recent times.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Multiple redirections have been noticed between the links.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">No reputed site would ask its users to share the campaign on WhatsApp.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The prize is kept attractive to lure the laypeople.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Grammatical mistakes have been noticed.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">During the analysis, the research team found that a javascript code called hm.js was being executed in the background from the host hm(.)baidu(.)com, a Baidu subdomain and is used for Baidu Analytics, also known as Baidu Tongji. The important part is that Baidu is a Chinese multinational technology company specializing in Internet-related services, products, and artificial intelligence, headquartered in Beijing&#39;s Haidian district, China.</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>The Advisory:</strong></span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Do not expose critical services unnecessarily to the internet.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Network firewalls should always be patched with the latest security updates.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Isolate the SCADA/ICS network from the public network.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Periodically perform technical audits of Critical Infrastructuredevices and networks and any other webor end-points directly or indirectly connected to it to identify security concerns.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Run CyberAwareness Drive by Cyber Experts at regular intervals for the team.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Develop an R&amp;D lab to enhance CyberSecurity skills among the employees</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Maintain firmPassword Policy:</span></span></p>
	</li>
</ul>

<ul>
	<li style="margin-left: 120px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><span id="cke_bm_351S" style="display: none;">&nbsp;</span>Use a <strong>strong password</strong> for all devices and online accounts.</span></span></p>
	</li>
	<li style="margin-left: 120px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Passwords should be at least <strong>8-13 characters long.</strong></span></span></p>
	</li>
	<li style="margin-left: 120px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Passwords should contain at least one <strong>upper case (A-Z)</strong>, <strong>numeric character (0-9),</strong> and a <strong>special character (@&amp;, etc.)</strong>.</span></span></p>
	</li>
	<li style="margin-left: 120px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Do not use the<strong> same password for all your online accounts</strong>. All the passwords should be different for different versions.</span></span></p>
	</li>
	<li style="margin-left: 120px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Try avoiding a password that consists of dictionary words.</span></span></p>
	</li>
</ul>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><span id="cke_bm_351E" style="display: none;">&nbsp;</span>&nbsp;</span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Stay away from Phishing links: </strong>Phishing is an attempt of social engineering techniques to inject malware or obtain sensitive information such as usernames, passwords, and credit card information by spreading fake links and pretending to pretending to be acting a trustworthy entity. Please donot click on such links before verifying the authenticity of the same.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Never share or forward fake messages containing links to any social platform without proper verification.</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=20102' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=20102</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_cyber-autobot.png</clientLogo>
      <pubDate>Thu, 21 Apr 2022 17:47:06 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[K7 Computing Joins Hands with Indian Computer Emergency Response Team (CERT-In)]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><a href="https://www.k7computing.com/in/">K7 Computing Private Limited</a>, an Indian firm developing international award-winning cyber security products, has signed a Memorandum of Understanding (MoU) with the Indian Computer Emergency Response Team (CERT-In), Ministry of Electronics and Information Technology, Government of India for collaboration in the area of cyber security.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Through this MoU CERT-In and K7 Computing Private Limited propose to work together to enhance the overall security of the computing environment in India and to address the increasingly complex problems associated with cyber security threats. The MoU would facilitate cooperation for detection of latest cyber security threats such as malware/botnets and ransomware that can adversely affect the information assets in the country and devise appropriate security measures while providing security tools to enable such users to secure their systems.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Under this MoU, CERT-In is providing a platform to K7 to provide a free bot and ransomware removal tool for citizens. The details of the free bot and ransomware removal tool are provided on CERT-In&rsquo;s Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre) website through which users from across the country will be able to access and download K7&#39;s botnet and ransomware removal tool free of cost.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The &quot;<strong>Cyber Swachhta Kendra</strong>&quot; (Botnet Cleaning and Malware Analysis Centre) is a part of the Government of India&#39;s Digital India initiative under the Ministry of Electronics and Information Technology (MeitY) to create a secure cyberspace by detecting botnet infections in India and enable cleaning and securing systems of end users. This centre is being operated by the Indian Computer Emergency Response Team (CERT-In).</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">K7&#39;s bot and ransomware removal tool enable users to scan their computers and eradicate any infections they may have. It mitigates some of the commonly known infections like Viruses, Spyware, Adware, and other forms of malware.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Speaking on the collaboration, <strong>Mr. Kesavardhanan J, Founder &amp; CEO of K7 Computin</strong>g, said, &ldquo;<em>As a 100% Made In India company, we have always been keen to ensure that Indians thrive in cyberspace without fearing digital threats. We are pleased to see cybersecurity gain prominence on the national security agenda, and are delighted to collaborate with CERT-In to protect all Indian computing users.</em>&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Dr. Sanjay Bahl, Director General, CERT-In</strong>, said, &ldquo;<em>The Cyber Swachhta Kendra has achieved marvellous results for enabling secure cyberspace while enhancing cyber hygiene amongst citizens in India. CERT-In envisages effective collaboration with Industry to enable citizens regarding safe usage of digital technologies. As the complexity, frequency and sophistication of cyber-attacks continues to increase impacting the end user digital devices, there is a need for sophisticated tools in the hands of citizens to safeguard themselves. The K7 botnet/malware removal tool from K7 Computing is capable of detecting the prominent malware infections prevalent in the wild so as to safeguard customers against the malware and ransomware infections</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About K7 Computing</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">K7 Computing is a global provider of leading IT security solutions for enterprises and consumers. Incorporated 30 years ago, K7 Computing has its registered office in Chennai and a strong presence in all Indian states. With more than 20,000 channel partners, K7 Computing protects more than 25 million customers worldwide against threats to their IT environment.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">K7 Computing&rsquo;s range of cybersecurity products include Windows, Mac, Android and iOS protection for home users, and on-premises or cloud deployed desktop, laptop, and server protection for the enterprise. K7&rsquo;s cybersecurity products are known for their low impact on IT resources and are designed to be quickly deployed and easily used with minimal IT help.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>For more details</strong>, please visit: <a href="http://www.k7computing.com/">www.k7computing.com</a>.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=19977' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=19977</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_K7.jpg</clientLogo>
      <pubDate>Wed, 06 Apr 2022 16:52:57 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Rajeev Chandrasekhar and Raveena Tandon Talk About Women Harassment at #ItsNotOk The Call It Out Conclave]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Network18</strong>&rsquo;s streamathon for its #ItsNotOk campaign where it partnered with <strong>Truecaller</strong> to raise awareness about why it&rsquo;s important for women to &lsquo;<strong>Call It Out&rsquo;</strong> on harassment issues became a roaring success as a host of renowned people graced the on-ground event The Call It Out Conclave, with their presence and candidly expressed their views.</span></span><br />
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:500px;">
	<tbody>
		<tr>
			<td>
				<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><img alt="" src="https://www.newsvoir.com/images/article/image1/19965_The%20Callitout%20Conclave.jpeg" style="width: 500px; margin-left: 10px; margin-right: 10px;" /></span></span></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Call It Out Conclave</strong></span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Rajeev Chandrasekhar, Minister of State for Electronics and Information Technology, on March 29 said the Indian government is toying with the idea of ushering in a legislative framework that will make social media platforms and intermediaries more accountable.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&quot;A lot of people indulge in harassment and trolling online because they think there are no consequences for their actions. They think that they can abuse or harass anyone and will get away because there is a notion that no laws apply to cyberspace,&quot;</em> he said.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&quot;Right now, social media platforms and intermediaries are treated as safe haven. But soon we will bring in a legislature under which they will be treated as publishers. Down the road, we will create a reporting structure in which they mandatorily will have to take action against reported misconduct or harassment. This will make it easier to identify and punish those who are committing online crimes. Social media platforms and intermediaries will have to take more responsibility to make the Internet safe,&quot;</em> he added.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">He, however, clarified that the government wants the Internet to be open and not controlled by the state or big corporations, but it must be safe and trusted as well.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Noted actress Raveena Tandon shared her thoughts on harassment in Bollywood.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&quot;Women face some form of harassment in every industry. In our industry as well, there is harassment and I have seen it. Also, harassment is different at different levels. The glamour of the film industry attracts many women from across the world. They live alone and struggle in Mumbai to make it big in Bollywood. They are most susceptible to harassment as people try to take advantage of the fact that they don&#39;t have any background or standing in the industry,&quot;</em> she said.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&quot;Things have changed especially after the #MeToo movement. Such people are scared to indulge in harassment. Also, industry people are now more aware and sensitive about the issue of women safety. Women are encouraged to speak out against harassment,&quot;</em> she added.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Rakesh Asthana, Commissioner of Delhi Police, said that Delhi police had been able to control crime against women in the last few years.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Asthana</strong> also emphasised the role of technology in tackling online cases related to harassment. <em>&quot;We have a specialised unit under a special cell which uses advanced technology to detect and identify those who are involved in cyber-crimes. It has the wherewithal to handle all sorts of cyber-crimes across the country. We managed to solve the &#39;<strong>Bulli Bai</strong>&#39; case, in which photos of women were uploaded on a website for sale, in less than 7 days by doing a detailed cyber investigation. The accused were arrested and are now facing charges in the court of law,&quot; </em>he informed.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About&nbsp;#ItsNotOk Campaign</strong></span></span><br />
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">India&rsquo;s biggest news network, Network18 partnered with Truecaller to launch #ItsNotOk campaign, to raise awareness about why it&rsquo;s important for women to &lsquo;<strong>Call It Out</strong>&rsquo; on harassment issues, leading conversations on how society can enable a safer digital environment for them.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Last week they took the conversation forward with &lsquo;<strong>The Call It Out Conclave</strong>&rsquo; event. Attended by policy makers, law enforcers and Bollywood celebrities, the event was conceptualised to create a bigger conversation around online safety and security in today&rsquo;s digital world and take into account the steps taken towards making the online space safer for women and building a safe environment for them where they can report harassment.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=19965' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=19965</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_netw.jpg</clientLogo>
      <pubDate>Wed, 06 Apr 2022 13:05:03 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Indian Data Centers Network Faced Enormous Cyber Attacks in April to December: An IETE, CyberPeace Foundation and Autobot Infosec Report]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The vulnerable exposed systems that are unmonitored and facing the internet, are the most attacked system for the attackers nowadays. As per the research done by <strong>The Institution of Electronics and Telecommunication Engineers (IETE) </strong>and<strong> CyberPeace Foundation (CPF) </strong>along with<strong> Autobot Infosec Private Limited,</strong> nearly <strong>51</strong> <strong>million</strong> attack events have been recorded between April to December 2021 on the Data Centers Network based Threat Intelligence sensors network specifically simulated in India.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The Institution of Electronics and Telecommunication Engineers (IETE) and CyberPeace Foundation (CPF) along with Autobot Infosec Private Limited have jointly deployed Threat Intelligence sensor networks to capture and examine the behavioral techniques of threat actors.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The study is a part of CyberPeace Foundation&rsquo;s e-Kawach programme to implement a comprehensive public network and threat intelligence sensors across the country in order to capture internet traffic and analyze the real time Cyber attacks that a location or an organization faces. A credible intelligence on real time threats empower organizations or a Country to build CyberSecurity policies.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The objective for this research was to examine the different types of signatures that can be used as exhibitors of compromise on the simulated Data center network by collecting information which can mitigate the future attacks on real networks.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">&ldquo;<em>By deploying the simulated network we can collect data on patterns of attack, the different types of attack vector for the different protocols and the recent trends of malicious activity</em>.&rdquo; spokesperson, CyberPeace Foundation added.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Trends noticed by the research</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Data collection for the current study started from April, 2021 to December, 2021. It was found that during the aforementioned time span the deployed network instance captured a total number of <strong>50,477,393</strong> attack events from a total number of <strong>40937 </strong>Unique IP addresses globally. Mostly Attacked destination protocols were:</span></span></p>

<p>
	&nbsp;</p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">HTTPS (44.277%)</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">SSH (23.743%)</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">HTTP (19.305%)</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">SMTP (6.621%)</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:396px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/19832_cyber%2024.JPG" style="width: 396px; height: 450px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p align="center">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Image</strong>: <strong>Report Statistics</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Image: Attacks Statistics</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The study also found a total number of <strong>26166</strong> usernames that were used to log into the networks by attackers while a total number of <strong>80282</strong> passwords were found that were used to log into the networks by attackers.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">During the threat analysis the Researchers also identified that after compromising the environment, attackers tried to run multiple terminal commands and also tried to download malicious payloads on the system. Researchers found a total number of <strong>131388</strong> unique terminal commands were run in the system while a total number of <strong>1262</strong> unique payloads have been identified that were injected to the environment. The payloads include the malicious files like <strong>botnet</strong>, <strong>trojan</strong> etc.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>The Advisory</strong></span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Do not expose services like SSH, HTTP, HTTPS, SMTP, SMB, MSSQL, MYSQL unnecessarily to the internet.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Maintain strong Password Policy:</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<ul>
	<li style="margin-left: 80px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Use a strong password for all devices and online accounts.</span></span></p>
	</li>
	<li style="margin-left: 80px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Passwords should be at least 8-13 characters long.</span></span></p>
	</li>
	<li style="margin-left: 80px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Passwords should contain at least one upper case (A-Z), numeric character (0-9) and a special character (!@%&amp;....).</span></span></p>
	</li>
	<li style="margin-left: 80px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Do not use the same password for all your online accounts. All the passwords should be different for different accounts.</span></span></p>
	</li>
	<li style="margin-left: 80px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Try avoiding a password that consists in the dictionary.</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Network firewalls should always be patched with latest security updates.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Add the attacker IP addresses mentioned in the report to the blacklist of the firewall solution in order to block inbound connections from the respective IP addresses.</span></span></p>
	</li>
</ul>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=19832' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=19832</link>
      <clientLogo>http://newsvoir.com/images/user/logo/0_cyber-autobot.png</clientLogo>
      <pubDate>Thu, 24 Mar 2022 17:18:08 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Inflow Technologies Signs Distribution Pact with Claroty]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Bengaluru based <strong>Inflow Technologies</strong> is delighted to announce the distribution pact with <a href="https://www.claroty.com/">Claroty</a>, the industrial cybersecurity company that helps the world&rsquo;s largest enterprises reveal, protect, and manage their OT, IoT, and IIoT assets.</span></span><br />
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>
				<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><img alt="" src="https://www.newsvoir.com/images/article/image1/19709_Rajesh%20Kumarinflow.jpg" style="width: 380px; height: 350px; margin-left: 10px; margin-right: 10px;" /></span></span></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Rajesh Kumar, Vice President Business Technology Unit, Inflow Technologies Pvt. Ltd.</strong></span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Inflow Technologies is the fastest growing value-added distributor in India and is a niche player in the Distribution Services industry providing Value Added Distribution in Cyber Security, Networking, Unified Communications and Collaboration, AIDC &amp; POS, Infrastructure &amp; Application Software, Storage Management and Electronic Security products &amp; related services in South Asia with revenue run rate of USD 370+ million. Headquartered in Bangalore, Inflow Technologies has a presence in 15 locations across India &amp; SAARC.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&ldquo;Claroty has created the industry leading platform to detect, manage and secure OT, IoT, and IIoT assets in industrial environments. We are delighted to partner with them and through our esteemed channel partners we will focus on offering this industrial cybersecurity solution to end customers. Our skilled, focussed team will work with identified channel partners to equip and enable their teams,&rdquo;</em> said <strong>Rajesh Kumar, Vice President Business Technology Unit, Inflow Technologies Pvt</strong>.<strong> Ltd</strong>.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The Claroty Platform is a complete industrial cybersecurity solution that comprises Claroty&rsquo;s Continuous Threat Detection, Secure Remote Access, and Edge technologies. It reveals and protects all industrial assets while detecting the earliest indicators of threats via proprietary detection technologies. With highly flexible and rapid deployment options, a vast integration ecosystem, and robust API, the platform seamlessly integrates with any industrial environment regardless of scale, architecture, or maturity of existing cybersecurity programs. The platform is also the industry&rsquo;s only solution with integrated remote incident management capabilities spanning the entire incident lifecycle.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>&ldquo;Securing the industrial economy has historically been a difficult process due to the complexity and inaccessibility of OT environments,&rdquo;</em> said <strong>Nick Nindra, Head of Channels and Alliances, APJ&nbsp;at&nbsp;Claroty</strong>. <em>&ldquo;This endeavor requires a strong ecosystem of partners working closely together to give industrial enterprises fast and easy solutions, which we aim to do through our partnership with Inflow Technologies Pvt. Ltd. We look forward to working together to secure the industrial and critical infrastructure systems that power&nbsp;India&rsquo;s economy.&rdquo;</em></span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Inflow Technologies</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Inflow Technologies was founded in the year 2005 and is headquartered in Bangalore. A niche player in the IT Distribution Services market in India/South Asia. Inflow Technologies addresses the growing needs of organizations to manage and secure information more effectively and intelligently. The team at Inflow Technologies are well-versed with the latest and the most powerful technologies available today for locating, organizing, managing, retrieving, analysing, protecting, and presenting information.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Being a VAD (Value Add Distributor), we cater to Cyber Security, Unified Communications and Collaboration, Networking, Automatic Identification and Data Capture &amp; POS, Infrastructure &amp; Application Software, Storage Management, Electronic Security products &amp; related services in South Asia.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">We have direct relationships with 40 plus&nbsp;Global Technology vendors, have a strong channel of 2300 plus&nbsp;partners, offering one or more solutions to 7000 plus&nbsp;end customers.<br />
	<br />
	To learn more, please visit&nbsp;<a href="http://www.inflowtechnologies.com/">www.inflowtechnologies.com</a>.</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Claroty</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Claroty is the industrial cybersecurity company. Trusted by the world&rsquo;s largest enterprises, Claroty helps customers reveal, protect, and manage their OT, IoT, and IIoT assets. The company&rsquo;s comprehensive platform connects seamlessly with customers&rsquo; existing infrastructure and programs while providing a full range of industrial cybersecurity controls for visibility, threat detection, risk and vulnerability management, and secure remote access - all with a significantly reduced total cost of ownership. Claroty is backed and adopted by leading industrial automation vendors, with an expansive partner ecosystem and award-winning research team. The company is headquartered in New York City and has a presence in Europe, Asia-Pacific, and Latin America, and deployments on all seven continents.&nbsp;</span></span><br />
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">To learn more, please visit&nbsp;<a href="https://www.claroty.com/">www.claroty.com</a>.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=19709' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=19709</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_0_inflo.jpg</clientLogo>
      <pubDate>Mon, 14 Mar 2022 11:38:14 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Cyber Criminals Target Internet Users with &quot;Amazon International Women&apos;s Day 2022 Giveaway&quot; Scam]]></title>
      <description><![CDATA[<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">WhatsApp messages masquerading as an offer from Amazon with links luring unsuspecting users with the promise of Amazon International Women&rsquo;s Day presents have been making the rounds on the app. If you receive such messages try to stay away from it, as it can be a scam.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The Research Wing of <strong>CyberPeace Foundation</strong> along with Autobot Infosec Private Limited have conducted a study based on a WhatsApp message that contained a link pretending to be a free gift offer from Amazon which asks users to participate in a short quiz in order to get a chance to win a Women&rsquo;s Day gift.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:280px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image1/19653_cyber%2001.JPG" style="width: 280px; height: 400px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Message as received on WhatsApp with the link</strong></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Warning Signs:</strong></span></span></p>

<p>
	&nbsp;</p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The campaign is pretended to be an offer from Amazon but hosted on the third party domain instead of the official Amazon website which makes it more suspicious.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The domain name associated with the campaign has been registered in very recent times.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Multiple redirections have been noticed between the links.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">No reputed site would ask its users to share the campaign on WA.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The prize is kept really attractive to lure the laymen.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Grammatical mistakes have been noticed.</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">A congratulations message appears on the landing page with an attractive photo of Amazon products that asks users to participate in a short quiz in order to get a Women&rsquo;s Day gift. Also the bottom of the page seems to appear like a comment section with public comments establishing the truthfulness of the offer.</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:360px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image2/19653_cyber%2002.JPG" style="width: 360px; height: 379px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Look of the first page post opening the link</span></span></strong></p>

<p style="text-align: center;">
	<o:p></o:p></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The quiz starts with some basic questions like &ldquo;<em>Do you know Amazon? How old are you? What you think about Amazon? Would you recommend us to your friends?</em>&rdquo;,etc. Once the user answers the questions a &ldquo;<em>congratulatory message</em>&rdquo; is displayed.&nbsp;</span></span></p>

<p>
	&nbsp;</p>

<table align="center" cellpadding="1" cellspacing="1" style="width:345px;">
	<tbody>
		<tr>
			<td>
				<img alt="" src="https://www.newsvoir.com/images/article/image3/19653_cyber%2003.JPG" style="width: 345px; height: 300px; margin-left: 10px; margin-right: 10px;" /></td>
		</tr>
	</tbody>
</table>

<p style="text-align: center;">
	<strong><span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Fake Congratulatory message post the questions are answered</span></span></strong></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">On clicking the OK button users are given three attempts to win the prize. After completing all the attempts a message pops up that the user has won &ldquo;<strong>Samsung Galaxy S22 Ultra</strong>&rdquo; mobile phone. It then prompts the user to share the message on WhatsApp.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Strangely enough the user has to keep clicking the WhatsApp button until the progress bar completes. After clicking on the green &lsquo;<strong>WhatsApp</strong>&rsquo; button multiple times it shows a section where an instruction has been given to complete registration in order to get the prize.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">After clicking on the green &lsquo;<strong>FINISH</strong>&rsquo; button, it redirects the user to a promotional page of gearbest(.)com.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">In background analysis the Research team found a site settrogens(.)com was being connected which may trigger the injection of other malware or unwanted programs.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Read and download the full report here:&nbsp;<u><a href="http://www.cyberpeace.org/CyberPeace/Repository/20220303-Research-Report-on-Amazon-International-Womens-Day-2022-Giveaway-scam.pdf">www.cyberpeace.org/CyberPeace/Repository/20220303-Research-Report-on-Amazon-International-Womens-Day-2022-Giveaway-scam.pdf</a></u></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Conclusive Summary:</strong></span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The whole research activity was performed in a secured sandbox environment where the WhatsApp application was not installed. If any user opens the link from a device like smartphones where WhatsApp application is installed, the sharing features on the site will open the Whatsapp application on the device to share the link.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The campaign collects information from the users.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">During the investigation the Research team noticed the link redirects the user to a 404 error page if the user opens the link in the desktop computer. However if the link gets opened on a mobile device the campaign works fine. It means cybercriminals have targeted mainly mobile internet users through this campaign.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Cybercriminals used Cloudflare technologies to mask the real IP addresses of the front end domain name used in the campaign.</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>CyberPeace Advisory:</strong></span></span></p>

<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">CyberPeace Foundation and Autobot Infosec Private Limited recommend that people should avoid opening such messages sent via social platforms.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Falling for this trap could lead to whole system compromise such as access to microphone, Camera, Text Messages, Contacts, Pictures, Videos, Banking Applications etc as well as financial loss for the users.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Do not share confidential details like login credentials, banking information with such a type of scam.&nbsp;</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Never share or forward fake messages containing links to any social platform without proper verification.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">There is a need for International Cyber Cooperation between countries to bust the criminal gangs running the fraud campaigns affecting individuals and organizations to make the Cyberspace resilient and peaceful.</span></span><o:p></o:p></p>
	</li>
</ul>

<p>
	&nbsp;</p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=19653' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=19653</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_cybernew.JPG</clientLogo>
      <pubDate>Tue, 08 Mar 2022 14:40:20 +0530</pubDate>
    </item>
    <item>
      <title><![CDATA[Truecaller Partners with CyberPeace Foundation to Launch Online Safety Program - TrueCyberSafe]]></title>
      <description><![CDATA[<ul>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The joint initiative between <strong>Truecaller</strong> and <strong>CyberPeace Foundation</strong> aims to create awareness and train people to tackle Cyber frauds leading to a safer communication experience.</span></span></p>
	</li>
	<li style="margin-left: 40px;">
		<p>
			<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">The safety trainings will be held in 5 regions across India to increase awareness about the steps that our users can take to avoid fraud, spam and scams</span></span></p>
	</li>
</ul>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">With a strong commitment to raise awareness about internet safety, Truecaller, the leading global platform&nbsp;for verifying contacts and blocking unwanted communication is collaborating with CyberPeace Foundation, to launch #<strong>TrueCyberSafe</strong> focused on online safety.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">User safety remains a top priority at Truecaller, especially the safety of women and individuals from vulnerable communities. We continue to be the first line of defense against online harassment by empowering users to make informed decisions through Truecaller&rsquo;s caller identification service with the help of our community marking numbers as spam/scam/fraud. This added context helps the receiver of the call to block or/and report a number leading to safer communication. Additionally, the Guardians is an easy to use location safety app that helps people stay safe when they are on the move.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Truecaller along with CyberPeace Foundation is geared up to take a step ahead by training people to help them in developing the requisite skills to have a safe digital experience and aiding them in nurturing the faculties of critical thinking and empathy. The certification developed along with Autobot Infosec will help people in tackling various kinds of frauds, impersonation, harassment and scams.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Commenting on the partnership,<strong> Pragya Misra, Public Affairs Director, Truecaller India, </strong>said,<strong> </strong>&ldquo;<em>The recent pandemic and social distancing has emphasized the importance of digital communication. However, with this convenience that has helped all of us stay connected, we have also had to tackle challenges like Spam and Fraud instances leading to considerable personal loss. Safety has always been and continues to be an absolute priority for us at Truecaller and we are constantly working towards achieving the highest standards of online safety for our users and the wider public at large. This program is a continuation of our efforts that will help increase awareness about Cyber Frauds and build user capacity on how people can stay safe while communicating. We are very excited to partner with CyberPeace Foundation to disseminate these trainings that will target both mature and first-time internet users across India in English and regional languages</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Sharing his thoughts on the collaboration,<strong> Major Vineet Kumar, Founder and Global President, CyberPeace Foundation </strong>said, &ldquo;<em>Past two decades CyberPeace Foundation has emphasized on Online Safety and the issues that might be faced in the upcoming days. Post the onset of pandemic, we did see a rise in the Cyber related Frauds and hence we have constantly collaborated with the organizations to ensure that the netizens stay Cyber Aware and Cyber Alert and they know the mechanism to report and raise their voices. On our helpline, we get almost 10-11 cases per day related to Cyber Frauds. To address this issue, we are delighted to work with Truecaller and Autobot Infosec and believe that this program on understanding online threats and safety is the future of Internet use. When we combine our content and expertise of Truecaller, we can create truly transformative learning experiences that deliver measurable impact and we are hopeful to provide the participants with lessons to follow for a safe online environment.</em>&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Col Nidhish Bhatnagar, Rashtriya Raksha University, Ministry of Home Affairs, Govt of India </strong>said, &ldquo;<em>Cybersecurity is among India&rsquo;s major concerns today. As more cyber threats penetrate through the vulnerabilities of our digital infrastructure, the more at risk we are on a personal level, as well as at the national level. In today&rsquo;s globalized and interconnected world, such threats and vulnerabilities are only likely to increase manifold in the coming years. Hence, it becomes necessary to approach the issue of cybersecurity in a holistic manner to be able to prevent as well as manage cyberattacks. To this end, it is imperative to enhance the public awareness as well as build capacity to address this rapidly evolving threat; and a nationwide campaign for the same is a step towards mitigating data breaches, identity thefts and data thefts in the country</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Mr. Rakesh Maheshwari, </strong>Scientist G and Group Coordinator, Cyber Laws &amp; E-Security, Ministry of Electronics &amp; Information Technology (MeitY), Government of India<strong> </strong>said, &ldquo;<em>With rapidly evolving innovations in technology, there is also a corresponding global rise in cyberattacks and cyberthreats. With an increased dependence on digital technologies and communication, the rise in the misuse of such interconnectedness is inevitable. This paves the need for more attention, research and innovation in cybersecurity practices. India has made strides in the recent past with India&rsquo;s cyber security industry nearly doubling in size amid the pandemic, but a lot more needs to be done to build public awareness and capacity in this regard. This nationwide campaign of Truecaller and CyberPeace Foundation to raise awareness about cyber safety is a positive step in that direction</em>.&rdquo;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">Gracing the event by his presence,<strong> Commissioner of Police, Guwahati, Mr. Harmeet Singh</strong> said, &quot;T<em>he COVID-19 Pandemic led to people being confined at home, consequently increasing every individual&rsquo;s digital footprint, particularly with relation to financial transactions among of course the social and educational space.</em></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><em>We are witnessing a substantial rise in Cyber Frauds and Scams, as a consequence of this increased dependency on Digital Transactions. As we continue our march towards technology, these negative externalities will also continue to grow. Along with the sustained efforts of Law Enforcement Agencies, it is of utmost importance to empower citizens and enable safe digital experiences for everyone. This nationwide program to increase awareness and build the capacity of citizens will be a huge step forward in this regard</em>.&quot;</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About Truecaller</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">We enable safe and relevant conversations between people and make it efficient for businesses to connect with consumers. Fraud and unwanted communication are endemic to digital economies, especially in emerging markets. We are on a mission to build trust in communication. Truecaller is an essential part of everyday communication for over 300 million active users, with half a billion downloads since launch and close to 38 billion unwanted calls identified and blocked in 2021. Headquartered in Stockholm, since 2009, we are a co-founder-led, entrepreneurial company, with a highly experienced management team. Truecaller has been listed on Nasdaq Stockholm since 8 October 2021.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>For more information</strong>, please visit:&nbsp;<a href="https://corporate.truecaller.com/">corporate.truecaller.com</a></span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>About CyberPeace Foundation</strong></span></span></p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;">CyberPeace Foundation (CPF)&nbsp;is an award-winning non-partisan civil society organization, think tank of cybersecurity and policy experts with the vision of pioneering CyberPeace Initiatives to build collective resiliency against cybercrimes &amp; global threats of cyber warfare. CPF is involved in Policy Advocacy, Research and Training related to all aspects of CyberPeace and Cyber Security.Key areas of CyberPeace Foundation work are in technology governance, policy review and advocacy, capacity and capability creation and building through partnerships with various government organizations, academic institutions and civil society entities.</span></span></p>

<p>
	&nbsp;</p>

<p>
	<span style="font-size:12px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>For more information</strong>, please visit: <a href="http://www.cyberpeace.org">www.cyberpeace.org</a>.</span></span></p>
<img src='https://reports.newsvoir.com/images/pixel.gif?newsid=19457' alt='' border='0' height='1' width='1' />]]></description>
      <link>http://newsvoir.com/index.php?option=com_content&amp;view=release&amp;rid=19457</link>
      <clientLogo>http://newsvoir.com/images/user/logo/_trucaller-logo.png</clientLogo>
      <pubDate>Mon, 21 Feb 2022 16:07:26 +0530</pubDate>
    </item>
  </channel>
</rss>
