In a previous blog we mentioned that it might be beneficial for Indian netizens to have a very high-level overview […]

Dhanalakshmi
April 17, 2015
In a previous blog we mentioned that it might be beneficial for Indian netizens to have a very high-level overview […]
The controversial Section 66A of the Information Technology Act 2000 (Amendment 2008) has been struck down by the honourable Supreme […]
Whilst the ghost of Shellshock still haunts everybody two diametrically opposite vulnerabilities have made the headlines over the past 24 […]
This is the final part of a three-part blog based on my paper for AVAR 2012 that discusses the security […]
This is the second part of a three-part blog based on my paper for AVAR 2012 that discusses the security […]