top of page
The Legal Journal On Technology

CYBER PANDEMIC WHILE WORKING FROM HOME


INTRODUCTION


‘Working from home’, a newly forged phrase, trending rapidly over the Internet, has fundamentally changed the working procedure globally. Whether it is Delhi or Durban, Washington or Wayanad, Hemingway or Hyderabad, people are working over their computers, mobile phones, etc. to keep the economy running.

It is quite putative that on the announcement of the lockdown, neither the small corporations nor the market giants were entirely ready[1] to shift to the virtual world. As a consequence, most employees had to resort[2] to the use of technology through their personal smartphones or computers. These devices, despite being equipped with a good antivirus software, are not[3] immune to the Internet machinations completely.

A recent study claimed[4] a substantial rise in cyber-attacks in the past three months. A surge in the manifold cyberattacks blows an alarm for a cyber pandemic. In light of this matter, let us navigate through the possible virtual assaults and consequences, and most importantly, the protection mechanisms.

A potential attack on "vigilant citizenry"!


The cyberpunks had, a month ago, developed[5] a nasty mobile application imitating the original one developed by the World Health Organization. On installation, this application hacked the software of the concerned device and by virtue of Cerberus Banking Trojan, embezzled all the sensitive personal data. This could lead to the fraudulent attainment of the device’s entire data without letting the user know about it.

In another instance, the WHO, of course, due to its prominence nowadays, was again targeted. The hackers had sent[6] an email to thousands of recipients with a subject "Urgent letter from WHO: First human COVID-19 vaccine test/result update". This mail contained a file titled "xerox_scan_covid-19_urgent information letter.xlxs.exe". The people who opened the file unintentionally installed[7] a malware AgentTesla. In at least two instances, people received mails for " extortion" by a fictitious account of the United Nations.

‘Working from home’, a newly forged phrase, trending rapidly over the Internet, has fundamentally changed the working procedure globally. Whether it is Delhi or Durban, Washington or Wayanad, Hemingway or Hyderabad, people are working over their computers, mobile phones, etc. to keep the economy running.

It is quite putative that on the announcement of the lockdown, neither the small corporations nor the market giants were entirely ready[1] to shift to the virtual world. As a consequence, most employees had to resort[2] to the use of technology through their personal smartphones or computers. These devices, despite being equipped with a good antivirus software, are not[3] immune to the Internet machinations completely.

A recent study claimed[4] a substantial rise in cyber-attacks in the past three months. A surge in the manifold cyberattacks blows an alarm for a cyber pandemic. In light of this matter, let us navigate through the possible virtual assaults and consequences, and most importantly, the protection mechanisms.

A potential attack on "vigilant citizenry"!

The cyberpunks had, a month ago, developed[5] a nasty mobile application imitating the original one developed by the World Health Organization. On installation, this application hacked the software of the concerned device and by virtue of Cerberus Banking Trojan, embezzled all the sensitive personal data. This could lead to the fraudulent attainment of the device’s entire data without letting the user know about it.

In another instance, the WHO, of course, due to its prominence nowadays, was again targeted. The hackers had sent[6] an email to thousands of recipients with a subject "Urgent letter from WHO: First human COVID-19 vaccine test/result update". This mail contained a file titled "xerox_scan_covid-19_urgent information letter.xlxs.exe". The people who opened the file unintentionally installed[7] a malware AgentTesla. In at least two instances, people received mails for " extortion" by a fictitious account of the United Nations.

Vulnerability of Video Conferencing apps

Prior to the lockdown, the video conferencing applications were infrequently[8] utilized and most of the matters used to be dealt in person. However, the pandemic led to a technological shift, which made it easy to connect over geographical boundaries, paving the way for a new normal. From Courts to Cabs, Police to Peons, Money to Marriages, everything was switched to ‘online platforms. People separated by thousands of miles could see each other on these applications. Considering the convenience offered by these video-calling applications and the pace disseminated by them in the past few months, it can be deciphered that this innovation is here to last for a long time. Zoom, the most[9] downloaded video conferencing app, had 300 million users in April 2020, compared to just 10 million in December last year.

But popularity doesn't guarantee safety and privacy. It is sometimes an antithesis to it, especially during the corona time frame, when it is relatively difficult for the manufacturers to resolve the security issues which exist in thousands, particularly in Zoom. The Computer Emergency Response Team of India (CERT-In) had recently declared[10] that unguarded usage of these apps could lead to the " leakage of sensitive information to the cybercriminals". In a sensational[11] instance, the video conference by BARC, the nodal agency in India informing people about the TV and smartphone consumption, got hacked and subsequently stopped. The events jeopardized the personal data of 600 people, who were attending the meeting. Subsequently, the government of India banned the use of Zoom for public officials. This was followed[12] by Singapore after witnessing to a similar incident. In a report, the Cyble founded more than 50,000 unused accounts of people, who possibly had forgotten their passwords and made new accounts thereafter, without turning off the earlier ones. These accounts could easily be used by hackers and could even make it much difficult to trace them due to a "real" identity conundrum. In the USA, the Federal Bureau of Investigation(FBI) investigated a case where child pornography was displayed during zoom meetings for Texas school. Furthermore, in London, an academic meeting was hacked to show a child abuse video.

This susceptibility is further acutely explained[13] by a report from Intercept, which accused zoom of unavailability of end to end encryption. This could be the succour behind so-called "zoom bombing". This assertion was then[14] dramatically accepted by the application. In addition, another deplorable instance is when Zoom was accused of selling data of users, claimed research by Motherboard. A legal suit has been filed against Zoom, accusing it to be delinquent in maintaining privacy.

Google meet is a great application for this purpose, but what makes zoom distinctive[15] is the wide range of features it provides for free. Although banned[16] or restricted in various nations like Taiwan, few states in the US and Australia and private giants like Google and SpaceX, Zoom still is the first choice of users around the globe, pertaining to its convenient use and accessibility. Zoom, inarguably has become a synonym for video conferencing!

Are you sufficiently guarded?

It is axiomatic that the majority of hackers are tech masters. Although antiviruses are the first-choices people make when it comes to system protection, yet a good number of experts toil[17] to confess their unfailing protection.

Windows offers some outstanding third-party antivirus software. Apple's app store has a strong defence against malware, something not done by Play Store, which[18] only 'removes' but does not act as a deterrent. A malicious app on the Play Store could be downloaded before the store removes it.

Now we have some commonly used applications like Adobe, Word, etc. where the encryption is done due to an unintentional act of the user. Employees in this perspective are the weakest link in the security system. A malicious file opened “voluntarily" by an employee could encrypt the data in the impugn software, which would latch all data in the system and require an encryption key to unlock it. The employee is unaware of how their data has been confiscated. Then comes the ransom demand- “give or lose your data”. Your antivirus wouldn't guard you against your own employee's blunder. Instances affirm how hackers devoted ninety per cent of their time phishing through people and not software, for there would be no antivirus in the former. Thus, these security layers are useless when the weakest link, that is humans, are targeted, and for our dismay, hackers know this!

Let us Protect Ourselves!

The question that arises asks for methods to secure our data from this awful virtual deception.

As per experts and nerds, the following points become of utmost essence:

Be cautious about emails- As mentioned above, Covid-19 is being used[19] as a smokescreen by the cyberpunks to accomplish their scandalous activities. An email you open could lead to the installation of malware in your device's processing system. Do not open it unless you know the actual dispatcher. In the majority of cases, you would find digits or letters with decimals placed between them. This, however, is not a formula. For big businesses where employees naturally have access to the internet and other services, training the employee is the only method available.

Multi-factor Authentication (MFA)- Passwords are codes; codes can be decoded or broken down. Some hackers even demonstrated on television that passwords by far are the easiest thing to crack. Having said this, having a good password is not the ultimate solution. It is equally imperative to set a two-step credentials system. MFA is a crucial[20] element of identity and access management. After applying the MFA, your device, besides asking for the main password, would inquire of an additional security code, which could be a fingerprint, facial recognition, or any other form of credentials. MFA could protect your Wifi access, VPN access, and Remote Desktop Protocol (RDP) access.

Permit to video conference- Video Conferencing apps allow restricting access to a particular group. Either you can add members manually or just restrict it to allow only the people having an email address from your company. Do not share the link randomly. If you want to conduct an openly accessible conference, you should hold the participants in a "waiting room" (this is featured in most of such apps) and only allow them admission after ascertaining that they are not eccentric. To organize such events, a person as a moderator could be of great help.

Create a Virtual Private Network (VPN) - VPN basically is your personal subway on the internet which[21] none but you can access. For people working from distant areas, VPN offers an office-like environment and allows foolproof security from external threats that are probable on public networks. You can download any VPN or subscribe to some popular ones like OpenVPN, IPSec. Some routers also offer an inbuilt VPN system.

Personal information and privacy - Now this is the most common suggestion and still the most contested one. Sharing personal information for a "survey", a fraud one, on the Internet could[22] be fatal. One can see thousands of such posts on Facebook walls, WhatsApp, and Instagram that ask for one's personal details on fraudulent links. Do not give a random survey over the Internet that asks you for personal data. If you have to confirm the authenticity of a particular link, do visit the substantial website of the organization. Also, always read the privacy policy of any application you use. It hardly takes ten minutes and could save your vital data. Do not neglect pop-ups and notifications. If you find a website risky, deactivate your account.

Thus, working from home has its fair share of advantages and disadvantages. While the option makes it convenient for one to work online, it also brings along a series of problems, one of which is the apprehension of data leakage. However, judicious use of appropriate anti-virus software and technology can keep the data safe and secure, while ensuring feasible access and availability online.

REFERENCES

[1] Alex Webb, ‘We weren’t Ready to work from Home’ The Washington Post ( April 28, 2020) ( available at: https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.washingtonpost.com/business/we-really-werent-ready-to-work-from-home/2020/04/27/a209f9f4-8850-11ea-80df-d24b35a568ae_story.html&ved=2ahUKEwigj9SvnuPqAhVQ8XMBHct1A8kQFjADegQIBRAB&usg=AOvVaw1xMMEehHbZPxOrDJiyWMPr.) [2] Ibid. [3]Why Your Antivirus Is Useless Against The #1 Security Threat To Your Business’ Juern Tech (Dec 23, 2019) (available at: https://www.juerntech.com/2019/12/23/why-your-antivirus-is-useless-against-the-1-security-threat-to-your-business/) [4] World Health Organization, ‘WHO reports fivefold increase in cyber attacks, urges vigilance’ (April 23, 2020) (available at: https://www.who.int/news-room/detail/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance) [5] Adrian Humphreys, ‘Hackers target Canadians with fake COVID-19 contact-tracing app disguised as official government software’ (Jun 24, 2020) (available at: https://www.journalpioneer.com/news/canada/hackers-target-canadians-with-fake-covid-19-contact-tracing-app-disguised-as-official-government-software-465837/) [6] World Health Organization, ‘Beware of criminals pretending to be WHO’ (available at: https://www.who.int/about/communications/cyber-security.) [7] Seal Fadipasic, ‘Agent Tesla Malware Receives Module for stealing Wi-Fi Passwords, IT Pro Portal’ (First Published 4 months ago) (available at: https://www.itproportal.com/amp/news/agent-tesla-malware-receives-module-for-stealing-wi-fi-passwords/) [8] Sanjay Katkar, ‘How safe it is to use the Zoom video-conferencing app?’ Seqrite (April 17, 2020) (available at: https://www.seqrite.com/blog/how-safe-it-is-to-use-the-zoom-video-conferencing-app/) [9] ‘Zoom Users Surge to 300 million in 3 Months’ Business Today (May 25, 2020) (available at: https://m.businesstoday.in/lite/story/zoom-users-surge-to-300-million-in-3-weeks-despite-security-issues/1/401789.html) [10] Vijaita Singh, ‘Zoom is not a safe Platform, says MHA’ The Hindu (April 16, 2020) (available at: https://www.thehindu.com/news/national/zoom-is-not-a-safe-platform-says-mha-advisory/article31355460.ece/amp/) [11]Zoom app's privacy concerns: Miscreants hack into BARC's COVID-19 conference post abusive messages’ Money Control News, (April 6, 2020) (available at:https://www.moneycontrol.com/news/eye-on-india/videos/barcs-covid-19-viewership-conference-hacked-miscreants-deface-slides-post-abusive-messages-5099321.html/amp. ) [12] Martin Farrer, ‘Singapore bans teachers using Zoom after hackers post obscene images on screens’ The Guardian (April 11, 2020) (available at: https://amp.theguardian.com/world/2020/apr/11/singapore-bans-teachers-using-zoom-after-hackers-post-obscene-images-on-screens.) [13] Micah Lee, ‘Zoom Meetings aren’t end-to-end encrypted’ The Intercept (March 31, 2020) (available at: https://theintercept.com/2020/03/31/zoom-meeting-encryption/) [14] ‘Zoom won’t Provide end-to-end Encryption’ The Indian Express (June 4, 2020) (available at: https://indianexpress.com/article/technology/tech-news-technology/zoom-wont-provide-end-to-end-encryption-to-free-users-6441806/lite/) [15] Khamosh Pathak, ‘Google Meet vs. Zoom: Which One is Right for You’ Howtogeek (Jun 10, 2020) (available at: https://www.howtogeek.com/674928/google-meet-vs.-zoom-which-one-is-right-for-you/amp/) [16] Anand Narayanaswamy, ‘Zoom ban in 20 countries led India in Trouble’ Netans (May 30, 2020) (available at: https://www.netans.com/2020/05/30/zoom-ban-india/. ) [17] Kevin Purdy, ‘You Don’t Need to buy Antivirus Software’ New York Times (April 21, 2020) (available at:https://www.nytimes.com/wirecutter/blog/best-antivirus/amp/) [18] Leah Yecla, ‘Malware uses Google Play Store to bypass Google Defence’ Micky (May 3, 2020) (available at:https://micky.com.au/malware-uses-google-play-store-to-bypass-google-defence/) [19] Tom Kelly, ‘How Hackers are Using Covid-19 to find new Phishing Victims’ Security Magazine (Jun 23, 2020) (available at: https://www.securitymagazine.com/articles/92666-how-hackers-are-using-covid-19-to-find-new-phishing-victims) [20] ‘Multi-factor Authentication: What is it and Why do you need it?’ CMU.EDU, (Sep 25, 2019) (available at: https://www.cmu.edu/iso/news/mfa-article.html.) [21] Max Eddy, ‘What is VPN, and Why You need One’ PcMAag (Jul 1, 2020) (available at: https://www.pcmag.com/news/what-is-a-vpn-and-why-you-need-one?amp=true) [22] Eric Rosenbaum, ‘Phishing Scam, spa hike as Hackers are Using Coronavirus to Prey new Victims’ CNBC (March 20, 2020) (available at: https://www.cnbc.com/amp/2020/03/20/phishing-spam-spike-as-hackers-use-coronavirus-to-hit-remote-work.html) ulnerability of Video Conferencing apps

Prior to the lockdown, the video conferencing applications were infrequently[8] utilized and most of the matters used to be dealt in person. However, the pandemic led to a technological shift, which made it easy to connect over geographical boundaries, paving the way for a new normal. From Courts to Cabs, Police to Peons, Money to Marriages, everything was switched to ‘online platforms. People separated by thousands of miles could see each other on these applications. Considering the convenience offered by these video- calling application and the pace disseminated by them in the past few months, it can be deciphered that this innovation is here to last for a long time. Zoom, the most[9] downloaded video conferencing app, had 300 million users in April 2020, compared to just 10 million in December last year.

But popularity doesn't guarantee safety and privacy. It is sometimes an antithesis to it, especially during the corona time frame, when it is relatively difficult for the manufacturers to resolve the security issues which exist in thousands, particularly in Zoom. The Computer Emergency Response Team of India (CERT-In) had recently declared[10] that unguarded usage of these apps could lead to the " leakage of sensitive information to the cybercriminals". In a sensational[11] instance, the video conference by BARC, the nodal agency in India informing people about the TV and smartphone consumption, got hacked and subsequently stopped. The events jeopardized the personal data of 600 people, who were attending the meeting. Subsequently, the government of India banned the use of Zoom for public officials. This was followed[12] by Singapore after witnessing to a similar incident. In a report, the Cyble founded more than 50,000 unused accounts of people, who possibly had forgotten their passwords and made new accounts thereafter, without turning off the earlier ones. These accounts could easily be used by hackers and could even make it much difficult to trace them due to a "real" identity conundrum. In the USA, the Federal Bureau of Investigation(FBI) investigated a case where child pornography was displayed during zoom meetings for Texas school. Furthermore, in London, an academic meeting was hacked to show a child abuse video.

This susceptibility is further acutely explained[13] by a report from Intercept, which accused zoom of unavailability of end to end encryption. This could be the succor behind so-called "zoom bombing". This assertion was then[14] dramatically accepted by the application. In addition, another deplorable instance is when Zoom was accused of selling data of users, claimed research by Motherboard. A legal suit has been filed against Zoom, accusing it to be delinquent in maintaining privacy.

Google meet is a great application for this purpose, but what makes zoom distinctive[15] is the wide range of features it provides for free. Although banned[16] or restricted in various nations like Taiwan, few states in the US and Australia and private giants like Google and SpaceX, Zoom still is the first choice of users around the globe, pertaining to its convenient use and and accessibility. Zoom, inrguably has become a synonym for video conferencing!

Are you sufficiently guarded?

It is axiomatic that the majority of hackers are tech masters. Although antiviruses are the first-choices people make when it comes to system protection, yet a good number of experts toil[17] to confess their unfailing protection.

Windows offers some outstanding third-party antivirus softwares. Apple's app store has a strong defense against malware, something not done by Play Store, which[18] only 'removes' but does not act as a deterrent. A malicious app on the Play Store could be downloaded before the store removes it.

Now we have some commonly used applications like Adobe, Word, etc. where the encryption is done due to an unintentional act of the user. Employees in this perspective are the weakest link in the security system. A malicious file opened “voluntarily" by an employee could encrypt the data in the impugn software, which would latch all data in the system and require an encryption key to unlock it. The employee is unaware of how their data has been confiscated. Then comes the ransom demand- “give or lose your data”. Your antivirus wouldn't guard you against your own employee's blunder. Instances affirm how hackers devoted ninety percent of their time phishing through people and not software, for there would be no antivirus in the former. Thus, these security layers are useless when the weakest link, that are humans, are targeted, and for our dismay, hackers know this!

Let us Protect Ourselves!

The question that arises asks for methods to secure our data from this awful virtual deception.

As per experts and nerds, the following points become of utmost essence:

Be cautious about emails- As mentioned above, Covid-19 is being used[19] as a smokescreen by the cyberpunks to accomplish their scandalous activities. An email you open could lead to the installation of malware in your device's processing system. Do not open it unless you know the actual dispatcher. In the majority of cases, you would find digits or letters with decimals placed between them. This, however, is not a formula. For big businesses where employees naturally have access to the internet and other services, training the employee is the only method available.

Multi-factor Authentication (MFA)- Passwords are codes; codes can be decoded or broken down. Some hackers even demonstrated on television that passwords by far are the easiest thing to crack. Having said this, having a good password is not the ultimate solution. It is equally imperative to set a two-step credentials system. MFA is a crucial[20] element of identity and access management. After applying the MFA, your device, besides asking for the main password, would inquire of an additional security code, which could be a fingerprint, facial recognition, or any other form of credentials. MFA could protect your Wifi access, VPN access, and Remote Desktop Protocol (RDP) access.

Permit to video conference- Video Conferencing apps allow restricting access to a particular group. Either you can add members manually or just restrict it to allow only the people having an email address from your company. Do not share the link randomly. If you want to conduct an openly accessible conference, you should hold the participants in a "waiting room" (this is featured in most of such apps) and only allow them admission after ascertaining that they are not eccentric. To organize such events, a person as a moderator could be of great help.

Create a Virtual Private Network (VPN) - VPN basically is your personal subway on the internet which[21] none but you can access. For people working from distant areas, VPN offers an office-like environment and allows foolproof security from external threats that are probable on public networks. You can download any VPN or subscribe to some popular ones like OpenVPN, IPSec. Some routers also offer an inbuilt VPN system.

Personal information and privacy - Now this is the most common suggestion and still the most contested one. Sharing personal information for a "survey", a fraud one, on the Internet could[22] be fatal. One can see thousands of such posts on Facebook walls, WhatsApp, and Instagram that ask for one's personal details on fraudulent links. Do not give a random survey over the Internet that asks you for personal data. If you have to confirm the authenticity of a particular link, do visit the substantial website of the organization. Also, always read the privacy policy of any application you use. It hardly takes ten minutes and could save your vital data. Do not neglect pop-ups and notifications. If you find a website risky, deactivate your account.

Thus, working from home has its fair share of advantages and disadvantages. While the option makes it convenient for one to work online, it also brings along a series of problems, one of which is the apprehension of data leakage. However, judicious use of appropriate anti-virus softwares and technology can keep the data safe and securing, while ensuring feasible access and availability online

[1] Alex Webb, ‘We weren’t Ready to work from Home’ The Washington Post ( April 28, 2020) ( available at: https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.washingtonpost.com/business/we-really-werent-ready-to-work-from-home/2020/04/27/a209f9f4-8850-11ea-80df-d24b35a568ae_story.html&ved=2ahUKEwigj9SvnuPqAhVQ8XMBHct1A8kQFjADegQIBRAB&usg=AOvVaw1xMMEehHbZPxOrDJiyWMPr.) [2] Ibid. [3]Why Your Antivirus Is Useless Against The #1 Security Threat To Your Business’ Juern Tech (Dec 23, 2019) (available at: https://www.juerntech.com/2019/12/23/why-your-antivirus-is-useless-against-the-1-security-threat-to-your-business/) [4] World Health Organization, ‘WHO reports fivefold increase in cyber attacks, urges vigilance’ (April 23, 2020) (available at: https://www.who.int/news-room/detail/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance) [5] Adrian Humphreys, ‘Hackers target Canadians with fake COVID-19 contact-tracing app disguised as official government software’ (Jun 24, 2020) (available at: https://www.journalpioneer.com/news/canada/hackers-target-canadians-with-fake-covid-19-contact-tracing-app-disguised-as-official-government-software-465837/) [6] World Health Organization, ‘Beware of criminals pretending to be WHO’ (available at: https://www.who.int/about/communications/cyber-security.) [7] Seal Fadipasic, ‘Agent Tesla Malware Receives Module for stealing Wi-Fi Passwords, IT Pro Portal’ (First Published 4 months ago) (available at: https://www.itproportal.com/amp/news/agent-tesla-malware-receives-module-for-stealing-wi-fi-passwords/) [8] Sanjay Katkar, ‘How safe it is to use the Zoom video-conferencing app?’ Seqrite (April 17, 2020) (available at: https://www.seqrite.com/blog/how-safe-it-is-to-use-the-zoom-video-conferencing-app/) [9] ‘Zoom Users Surge to 300 million in 3 Months’ Business Today (May 25, 2020) (available at: https://m.businesstoday.in/lite/story/zoom-users-surge-to-300-million-in-3-weeks-despite-security-issues/1/401789.html) [10] Vijaita Singh, ‘Zoom is not a safe Platform, says MHA’ The Hindu (April 16, 2020) (available at: https://www.thehindu.com/news/national/zoom-is-not-a-safe-platform-says-mha-advisory/article31355460.ece/amp/) [11]Zoom app's privacy concerns: Miscreants hack into BARC's COVID-19 conference post abusive messages’ Money Control News, (April 6, 2020) (available at:https://www.moneycontrol.com/news/eye-on-india/videos/barcs-covid-19-viewership-conference-hacked-miscreants-deface-slides-post-abusive-messages-5099321.html/amp. ) [12] Martin Farrer, ‘Singapore bans teachers using Zoom after hackers post obscene images on screens’ The Guardian (April 11, 2020) (available at: https://amp.theguardian.com/world/2020/apr/11/singapore-bans-teachers-using-zoom-after-hackers-post-obscene-images-on-screens.) [13] Micah Lee, ‘Zoom Meetings aren’t end-to-end encrypted’ The Intercept (March 31, 2020) (available at: https://theintercept.com/2020/03/31/zoom-meeting-encryption/) [14] ‘Zoom won’t Provide end-to-end Encryption’ The Indian Express (June 4, 2020) (available at: https://indianexpress.com/article/technology/tech-news-technology/zoom-wont-provide-end-to-end-encryption-to-free-users-6441806/lite/) [15] Khamosh Pathak, ‘Google Meet vs. Zoom: Which One is Right for You’ Howtogeek (Jun 10, 2020) (available at: https://www.howtogeek.com/674928/google-meet-vs.-zoom-which-one-is-right-for-you/amp/) [16] Anand Narayanaswamy, ‘Zoom ban in 20 countries led India in Trouble’ Netans (May 30, 2020) (available at: https://www.netans.com/2020/05/30/zoom-ban-india/. ) [17] Kevin Purdy, ‘You Don’t Need to buy Antivirus Software’ New York Times (April 21, 2020) (available at:https://www.nytimes.com/wirecutter/blog/best-antivirus/amp/) [18] Leah Yecla, ‘Malware uses Google Play Store to bypass Google Defence’ Micky (May 3, 2020) (available at:https://micky.com.au/malware-uses-google-play-store-to-bypass-google-defence/) [19] Tom Kelly, ‘How Hackers are Using Covid-19 to find new Phishing Victims’ Security Magazine (Jun 23, 2020) (available at: https://www.securitymagazine.com/articles/92666-how-hackers-are-using-covid-19-to-find-new-phishing-victims) [20] ‘Multi-factor Authentication: What is it and Why do you need it?’ CMU.EDU, (Sep 25, 2019) (available at: https://www.cmu.edu/iso/news/mfa-article.html.) [21] Max Eddy, ‘What is VPN, and Why You need One’ PcMAag (Jul 1, 2020) (available at: https://www.pcmag.com/news/what-is-a-vpn-and-why-you-need-one?amp=true) [22] Eric Rosenbaum, ‘Phishing Scam, spa hike as Hackers are Using Coronavirus to Prey new Victims’ CNBC (March 20, 2020) (available at: https://www.cnbc.com/amp/2020/03/20/phishing-spam-spike-as-hackers-use-coronavirus-to-hit-remote-work.html)

29 views0 comments

Recent Posts

See All

Cross-Border Data Transfers in DPDP Act

By Uddhav Gupta (2nd Year MNLU , Nagpur) The DPDP Act  establishes a framework which safeguards digital personal data in India. It...

Comments


bottom of page