Top Section
Explore Business Standard
Don’t miss the latest developments in business and finance.
Rise in cyberattacks, shortage of cybersecurity experts is spawning an ecosystem
Ethical hacking of computer systems or networks done with the permission of its owner does not attract any liability under the IT Act, Parliament was informed on Friday. The Minister of State for Electronics and Information Technology in response to a question on the guidelines for ethical hacking shared that liability for compensation and punishment under provisions of the IT Act arises if anyone gains access to a computer system without the permission of its owner. "Any act, including an act of ethical hacking, undertaken with the permission/ consent of its owner does not attract liability under the said or other provisions of the Act," Chandrasekhar said. He said that Section 43 of the Information Technology Act, 2000, provides that if any person, without the permission of the owner or other person in charge of a computer, computer system or computer network, among other things, accesses or damages or disrupts such computer etc., he shall be liable to pay damages by way of ...
Ethical hackers abound in real life and in fiction. But, what exactly is ethical hacking? How is it different from the other hacking we are hear about generally? Let's delve deeper into the subject
What's behind the recent surge in Indians' credit card spending? Can JioPhone Next help make India '2G-mukt'? How is 'ethical hacking' different from hacking as we know it? Get all the answers here
Poly Network is a decentralized finance (DeFi) platform that facilitates peer-to-peer transactions with a focus on allowing users to transfer or swap tokens across different blockchains.
Some peculiar issues faced in India arise as the people who are tasked with the job of enforcement are not trained to distinguish "hacking" from "ethical hacking"
Govt says continuously upgrading systems, no data or security breach has been identified
The app is the government's mobile application for contact tracing and disseminating medical advisories to users in order to contain the spread of Covid-19
Team Fluoroacetate, comprising of members Amat Cama and Richard Zhu collected a bounty of $1,45,000 during the first day of the event
There are many instances in which ethical hacking has successfully prevented a potential attack