Select Page

Mobile Phone and SMS Crimes

Mobile Phone and SMS Crimes Communication technology has left no aspect of human life untouched. Even our morning alarm clocks are been replaced by the mobile cell phones. With the advancement of the telecommunication, technology there is increase in cyber crime in...

Digital Identity Frauds

Digital Identity Frauds A digital identity is information on an entity used by computer system to represent an external agent. That agent may be a person, organization, application, or device. The information contained in a digital identity allows assessment and...

Phishing Attacks

Phishing Attacks Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money) often for malicious reasons by disguising as a trustworthy entity in an electronic communication. It is typically carried out by...

Cyber Stalking

Cyber Stalking To use the Internet or other electronic means to stalk or harass an individual, group or organization is known as Cyber Stalking. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats,...

Cyber Bullying

Cyber Bullying It has become increasingly common, especially among teenagers to bully others using electronic means. Posting of rumors in social media website, threats, sexual remarks, Display of victims’ personal information, or pejorative labels (i.e., hate...

Pin It on Pinterest

*DISCLAIMER BEFORE ACCESSING THE WEBSITE

The information contained in this website is for general information purposes only. The information is provided by Cyber Law Solution and while we endeavour to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk.