Cyber Jagrookta Diwas - Deepfake

Cyber Jagrookta Diwas - Deepfake

Case Study - Safety precaution for hacked

Case Study - Safety precaution for hacked

Safety precaution for hacked

Case Study - Do we need to change old mobile phone for security updates

Case Study - Do we need to change old mobile phone for security updates

Do we need to change old mobile phone for security updates

Case Study - How to check whether the device is infected or compromised

Case Study - How to check whether the device is infected or compromised

How to check whether the device is infected or compromised

Case Study - How to stop circulation of fake links

Case Study - How to stop circulation of fake links

How to stop circulation of fake links

Case Study - 100 Solution to safeguard program file folders

Case Study - 100 Solution to safeguard program file folders

100 Solution to safeguard program file folders

Case Study - Difference between 67 & 67A IT Act

Case Study - Difference between 67 & 67A IT Act

Difference between 67 and 67A IT Act

Case Study - What are proof required for sexual harassment

Case Study - What are proof required for sexual harassment

What are proof required for sexual harassment

Case Study - What are require to submitted as proofs in court of law

Case Study - What are require to submitted as proofs in court of law

What are require to submitted as proofs in court of law

Case Study - How to stop spoofed messages or emails

Case Study - How to stop spoofed messages or emails

How to stop spoofed messages or emails

Case Study - Insurance Frauds

Case Study - Insurance Frauds

Insurance Frauds

Case Study - How to Safeguard from Fake Profiles

Case Study - How to Safeguard from Fake Profiles

How to Safeguard from Fake Profiles