Finance : The issue examined is how traditional confidentiality duties now apply in data-driven work environments. The key takeaway is that ...
CA, CS, CMA : Explore Oracle Fusion ERP’s P2P workflow covering goods, services, and Capex procurement with detailed roles, responsibilities, ...
CA, CS, CMA : SARs reward employees based on share value growth without giving equity. Learn how SARs work, their tax impact, and why companies ...
Corporate Law : Learn practical tips to create strong, memorable internet banking passwords using passphrases and safe storage methods. Enable 2FA...
Finance : Effectively handling finances is crucial for small and medium-sized businesses (SMBs) in India, where fast-changing markets requir...
Corporate Law : Critical issue: Windows hosts crashing with BSOD after CrowdStrike Falcon Sensor update. Learn how to fix and prevent further outa...
Finance : AVIF is an optimized open-source image format popular among photo editors. It can be a single image or a sequence of images stored...
Income Tax : Discover how CA-TDSMAN revolutionizes tax compliance for Chartered Accountants and Tax Professionals, fostering seamless collabora...
Corporate Law : Centre today established three Grievance Appellate Committees based on the recently amended Information Technology (Intermediary G...
Corporate Law : It has been observed that Indian banking customers are being targeted by a new type of phishing attack using ngrok platform. The m...
Income Tax : Read the detailed analysis of ITAT Delhi's decision to delete additions made on cash salary payments without proper documentation ...
Income Tax : ITAT Hyderabad held that payments made for making use of shrink wrap computer software wherein there is no transfer of any copyrig...
Corporate Law : A surge in use of data wiper malware by nation sponsored threat actors is being reported. The Primary motive of the attacker for u...
Corporate Law : A password represents a shared secret between the end user and the system they are authenticating. The system cannot differentiate...
Fema / RBI : Fraudsters attempt to get confidential details like user id, login / transaction password, OTP (one time password), debit / credit...
India IPV6 Task Force Newsletter and Compendium on IPV6 Activities Released. Sh. R Chandrashekhar, Secretary (Telecom) released the first India IPv6 (Internet Protocol IPv6 )Task Force Newsletter and technical compendium on IPv6 activities at a function held in Sanchar Bhawan on the occasion of World IPv6 day, 8th June, 2011. Sh. S. C. Misra, Member (S), Smt. Sadhana Dixit, Member (Finance), Sh.J.Gopal, Advisor (T) and other senior officers of DoT, TEC, DIT, BSNL and MTNL were also present.
A new online tracking system will allow websites to pinpoint your location to within a few hundred metres, without your permission. Internet sites will be able to work out where users are within an average of 690 metres, using information about their internet connection. At the moment they can only track users’ locations to within a radius of about 200 km, but the new technique will narrow this down to as little as 100 metres, the Daily Mail reports.
Each time you open a new Word file in Microsoft Word, from now on, there won’t be any need to save your work every few seconds, for fear of losing all your data with a power cut or a computer hang. Google’s newly launched Cloud Connect toolbar for Microsoft apps, sits inside a MS Word, Excel, or Powerpoint application.
With Nokia succumbing to pressure and recently setting up its email server in New Delhi for government authorities to snoop, the Union Home Ministry, which has tasted blood, is now exerting pressure on Google Inc to share Gmail’s encryption keys.
It’s coming to the end of 2010, and it may be coming to our mind that what to expect in terms of new threats and related trends in 2011. I have to say that I don’t see total revolutions in the threats – just continuing evolutions of the same threats
Sh. Sachin Pilot, the Minister of State for Communications and Information Technology held a meeting with officers of the Department of Information Technology, the Ministry of Home Affairs, Indian Computer Emergency Response Team (CERT-In), National
Scientists have developed a new web application which they claim could stop one from writing e-mails or posting messages on social networking sites, like Facebook and Twitter, when drunk. Once installed, the software, known as the Social Media Sobrie
Google’s methods for Internet search and ranking of websites are being scrutinised by the Texas’s Attorney General — yet another case of authorities closely looking at the core business of the company. The Attorney General’s move comes in the wake
Do you remember those “Oops” moments when you send email to someone and soon it occurs that you have missed something? This is where the “Undo Send” feature of Gmail comes in. It has saved me several times by undoing the sent emails.
The availability of password-cracking tools based on increasingly powerful graphics processors means that even carefully chosen short passwords are liable to crack under a brute-force attack. A password of less than seven characters will soon be “hopelessly inadequate” even if it contains symbols as well as alphanumerical characters, according to computer scientists at the Georgia Tech Research Institute. The security researchers recommend passwords at least 12 characters long.