Tag: gurugramcybercell
Rising Cyber Fraud
Ranjeet Yadav May 28, 2025 0 176
We’ve observed increasing cases of cyber fraud where scammers impersonate representatives of service providers or law enforcement ...
13 defendants from across India were found to have...
DEEPAK YADAV Apr 3, 2025 0 114
Gurugram: In response to 8,369 complaints, the Gurugram Police's cybercrime teams have detained 13 cybercriminals who cheated indi...
Popular Posts
-
Amroha Police Cyber Security Internship Program - 2025
DEEPAK YADAV May 20, 2025 1 2964
-
Cyber Security Summer Internship Gurugram Police 2025 1...
DEEPAK YADAV May 1, 2025 0 1327
-
Helpline for Cybercrime: How Can I Report Cybercrime in...
DEEPAK YADAV Nov 5, 2024 0 1207
-
Instagram Account Hacked Reporting Portal
DEEPAK YADAV Aug 7, 2024 2 662
-
The Defense Ministry Issues a Fake Channel Alert Here's...
DEEPAK YADAV Nov 4, 2024 0 641
Our Picks
-
Case 1 - Cheap stuff
Rupali Shukla Aug 5, 2025 0 14
-
Bank Account Unfreeze : Application for Reactivating Fr...
Rupali Shukla Jul 21, 2025 0 202
-
Fraud through ITR refund verification mail
Mahendra Sonawane Jul 20, 2025 0 37
-
Digital Forensic Acquisition — A Deep Dive
Rupali Shukla Jul 17, 2025 0 46
-
Whatsapp Helpline: Guide to Reporting WhatsApp’s Griev...
Rupali Shukla Jul 14, 2025 1 307
Categories
- Cyber Crime(55)
- Help Line(15)
- Seminars(2)
- Case Study(11)
- Trending Crime(11)
- News(154)
- Cyber News(124)
- Technology News(9)
- Latest Updates(20)
- Podcast(8)
- Blog(50)
Random Posts
Tags
- #SSHKeys
- ISCCCC
- AI-based early warning system
- SYNTHETICMEDIA
- blackmailing
- cuberdeepakyadav
- weddingcard
- 1 crore fraud in honeytrap case
- forensicinvestigation
- #CyberSecurity #DigitalSafety #CyberCrime #OnlineFraud #InternetSafety #CyberSecurityPortal
- Mumbai CBI Cyber crime
- Gujarat cyber cell
- What is e-Zero FIR
- #SocialEngineering #CyberSecurity #Phishing #Vishing #Smishing #Pretexting #Baiting #QuidProQuo #StaySafeOnline #ProtectYourData #CyberAwareness #DontShareOTP #TwoFactorAuthentication #CyberCrimePrevention #DigitalSafety #ReportCyberCrime #CyberCrimeIndia
- Cyber scam run from Dubai
Voting Poll
What is a hash function used for in digital forensics?
Total Vote: 0
Encrypting files
What does ‘write blocker’ do in forensics?
Total Vote: 1
Allows writing on drives
The most common method for identifying a person is:
Total Vote: 3
Blood type
Which of the following is an example of physical evidence?
Total Vote: 4
A confession letter
What is chain of custody?
Total Vote: 5
A prisoner's handcuff
Who is considered the "Father of Forensic Science"?
Total Vote: 4
Sir Arthur Conan Doyle
Which of these is a sign of a secure website?
Total Vote: 6
The page loads fast
What is 2FA (Two-Factor Authentication)?
Total Vote: 4
Logging in with two devices
What is the most important first step when collecting digital evidence from a suspect’s device?
Total Vote: 3
Turn off the device to preserve battery life
What is phishing?
Total Vote: 5
A method to catch fish online