Connect with us

Auto & Tech





By Rahul Goyal, Student of KIIT School of Law, Bhubaneswar

This article discusses cybercrime in India rapidly rising. In reality, you hear about many scams, tricks, and other offences being done online every single day. According to the Information Technology Act of 2000, there are numerous categories of cybercrime in India, indicating a wide range of offences. Numerous cyber crime cells have been established in India’s major cities in order to adhere to the regulations of the country’s cybercrime statute.

Technology development has led to an increase in recent cybercrime instances in India. Many crimes, including kidnapping, fraud, hacking, and data theft, are now carried out with the aid of the internet. These kind of criminals are frequently referred to as “hackers.” Under the IT Act, there are several cybercrime cases filed in India.

Nowadays, digitalization is out of control, and the Internet has made life easier for everyone by putting everything at the click of a button. Cybercrimes have increased in India along with other types of crimes, such as white collar crimes and terrorist group assaults. Man has become totally reliant on technology for even the most basic needs. Today, anything can be done online, including shopping, ordering food, playing games, paying bills, and other needs.


In India, a crime or illegal act can be classified as cybercrime if a computer is utilised as a tool, a target, or both. In other words, cybercrimes in India include any illegal access to a computer system without the consent of the owner or the scene of the crime. They range from online cracking to denial-of-service assaults.

Phishing, spoofing, DoS (Denial of Service) attacks, credit card fraud, online transaction fraud, cyberdefamation, child pornography, etc. are a few instances of cybercrime.


Cybercriminals always go for the fastest route to a large profit. They target wealthy individuals or wealthy institutions like banks, casinos, and financial corporations, where large sums of money are transacted on a regular basis, and they hack private data.

It is challenging to apprehend such crooks. As a result, there are more cybercrimes. Because of their vulnerability, computers must be protected and secured from cybercriminals by regulations. The following are the causes of computers’ vulnerability:

It is difficult to protect a computer system against unauthorised access since there are numerous ways for a breach to occur because the technology is so advanced. Hackers may simply get past many security systems by stealing access codes, retinal pictures, advanced voice recorders, etc. that can easily trick biometric systems and break firewalls.

Ability to store data in a relatively small amount of space – The computer has the special ability to store data in a very little amount of space. As a result, it is much simpler for individuals to steal data from other storage devices and sell it for their own gain.

Complexity: The operating systems that power computers are composed of millions of lines of code. Because the human mind is flawed, mistakes can be made at any point. These holes are exploited by online fraudsters.

Negligence – One of the traits of human behaviour is negligence. So, there’s a chance that by failing to defend the computer system, we can give a cybercriminal access to and control over the computer system.

Loss of Evidence – Information pertaining to the crime is quickly erasable. Loss of evidence is now a widespread and visible issue that paralyses the system for investigating cybercrimes.


Cybercrime can be perpetrated in one of two ways: either the computer is the victim of a cyberattack, or it is utilised to commit a cybercrime against someone or something else.

The categories of cybercrime in India are as follows:

  1. Cybercrime committed against a person: This kind of cybercrime uses an electronic domain as a medium to be perpetrated against a person.
  1. Cyberstalking: In general, the term “stalking” refers to a pattern of harassing behaviour. In contrast, cyber stalking refers to online harassment that uses the internet as a means for the stalking of a person. In most cases, the stalker is aware of the victim or learns about the victim’s family and their activities; instead of physically following the victim, the stalker keeps tabs on the person’s internet activity. A stalker might annoy his victim by using the internet, emails, SMS, webcams, phone calls, webpages, or even movies.
  1. Hacking: Hacking is the act of gaining unauthorised access to a person’s personal information that is stored on a computer system without the knowledge of the computer’s legitimate owner or the person in charge of that specific system for the purpose of making money illegally or misusing the information. Hacking is the term

for any action taken to gain access to a computer system or network. Hackers gain access to the user’s confidential and personal data. They can also keep track of a person’s whole internet behaviour, including signing in, adding credentials, making bank transactions, etc. 

  1. Cracking: The term “crack” often refers to the methods used to crack software. Cracking is the process of digitally erasing the copyright protection code that stops copied or pirated software from running on devices without the vendor’s or owner’s permission. The person engaged in such conduct is known as a cracker and differs from a hacker. Cracker tampers with the computer and breaks the law online using his knowledge.
  1. Online or cyber defamation entails harming a person’s reputation in society through the use of a computer or the internet. This can be accomplished by posting vulgar content online, writing disparaging comments about someone, sending the victim’s friends disparaging emails, etc.
  1. One of the most prevalent types of cybercrime is online fraud. It entails exploiting phishing websites to obtain a person’s personal information, such as banking passwords, and taking money out of the victim’s account. These days, there are many online lottery scams, with the Nigeria lottery scams being one such example.
  1. Dissemination of Obscene Material: This covers the posting of pornographic or obscene content on social media. It involves hosting websites that provide pornographic content, which has a propensity to corrupt or deprave people’s minds.
  1. Child pornography: Distributing any content that has the potential to corrupt young people’s minds is also a form of cybercrime. It entails the use of electronic devices to produce, share, or access content that is pornographic in nature and has a propensity to defile young minds.
  1. The act of spoofing entails misrepresenting the source of any data. An email or SMS can be generated from one source, but it can also be generated from another source. Cybercriminals utilise this method to obtain the user’s personal information, such as bank account information.
  1. Phishing: This is the practise of sending spam emails to a user while impersonating a well-known company in an effort to steal his personal information.
  1. Property-related cybercrime: This type of crime is carried out using an electronic device as a conduit. The term “property” in this context refers to both moveable and intangible assets, such as computers, intellectual property, and other assets. Various online crimes against property include:
  • Virus transmission: A malware software known as a computer virus infects programmes, disc drives, and files. Worms are computer programmes that replicate like viruses and spread from computer to computer. Malicious software that infects the computer includes viruses, worms, Trojan horses, time bombs, logic bombs, rabbits, and bacterium.
  • Cybersquatting is when two or more people attempt to register the same domain name. Unlawfully occupying an empty space is known as squatting. The hacker contends that he used the domain name prior to the legitimate owner for the first time.
  • Cyber Vandalism is the act of erasing data from any electronic medium while the network service is unavailable.
  • Intangible property rights (IPRs) are the subject of intellectual property crimes. IPR thefts, which include internet piracy, software piracy, infringement of patents, designs, trademarks, and copyrights, theft of source code, etc., are the most frequent cybercrimes in India.
  1. Cybercrime against the Government: A nation’s government can also be the target of a cybercrime. Threatening the unity, honour, and security of the target nation is the goal of any cybercrime conducted against a government. Governmental targets ofcybercrime include:
  • Cyberwarfare: Cyberwarfare is an online fight where the motive for the cybercrime is political. It has the ability to shut down official websites and networks, interfere with crucial services like Internet connectivity, steal sensitive information like Sensex details, and compromise sensitive data like the payment gateway.
  • Cyberterrorism is the use of the internet as a tool to instil fear in others’ minds. Cyberterrorism is covered in Section 66-F of the Information Technology Act of 2002.
  1. Cybercrime against Society: Cybercrime against Society is when a cybercrime is committed against a large group of people. Socially destructive cybercrime includes:
  • Online gambling: The Public Gambling Act of 1867 forbids gambling in India. Aside from Sikkim, all of India prohibits online gambling.
  • Trafficking involves dealing with unlawful trade practises like the trafficking of people as slaves and other forms of slavery.


Establishing multifaceted public-private partnerships involving law enforcement agencies, the information technology sector, information security groups, internet firms, and financial institutions is necessary to effectively address the issue of cybercrime.

Cybercriminals do not compete with one another for dominance or control like they do in the physical world. Instead, they cooperate to develop their abilities and even support one another in finding new opportunities. As a result, India’s cybercrimes cannot be combated through the traditional means of criminal justice.

  • Use Secure Passwords: Avoid writing down your passwords and usernames by using different password and username combinations for each account.
  • Be sure to keep your social media profiles (such as those on Facebook, Twitter,YouTube, and other platforms) secret. Verify your security settings to be sure. Take care when posting information online. Once something is online, it remains there permanently.
  • Protect your Mobile Devices: Many individuals are unaware that unwanted software, such as computer viruses and hackers, can also infect their mobile devices. Make cautious to only get software from reliable sources. Maintaining an updated operating system is also essential. Make careful to set up antivirus protection and a secure lock screen. Otherwise, if you misplace your phone or merely leave it on the table for a little while, anyone can access all of your sensitive information. Even worse, someone may put malicious software on your computer and use your GPS to track your every move.
  • Safeguard your data: For your most sensitive information, such as financial records and tax returns, use encryption to safeguard your data.
  • Online identity protection: It is preferable to be overly cautious than underly cautious when it comes to online identity protection. You must use extreme caution while disclosing personal information online, such as your name, address, phone number, and/or financial information. When making online purchases or other transactions, make sure the websites are secure. In order to do this, you must enable your privacy settings when using or logging onto social networking sites.
  • Maintain the most recent patches and upgrades on your computer: Applying patches and other software fixes as soon as they are made available is one of the best strategies to prevent hackers from accessing your computer. By keeping your computer updated, you prevent hackers from exploiting software faults (vulnerabilities) that they would otherwise use to gain access to your system.
  • Several different kinds of security software are required for fundamental internet security. Protect your machine with them. Firewall and antivirus software are vital components of security software. The first layer of defence for your computer is typically a firewall. It regulates what and who is allowed to communicate online with your computer. A firewall could be compared to a kind of “policeman” who keeps an eye on all data that is trying to enter and exit your computer over the Internet, permitting communications that it knows are secure and preventing “bad” traffic like attacks from ever getting to your computer.

The Daily Guardian is now on Telegram. Click here to join our channel (@thedailyguardian) and stay updated with the latest headlines.

For the latest news Download The Daily Guardian App.


Auto & Tech

YouTube concludes experiment that showed some users 10 unskippable ads



YouTube concludes experiment that showed some users 10 unskippable ads

Over the years, advertisements have crept into the YouTube experience as a way to support creators financially and maintain the platform.

However, it appears like YouTube is now going above and beyond with its advertising, playing up to 10 non-skippable adverts in a row.

YouTube has given a statement in this regard informing that this experiment with advertisements has now “concluded”.

 On YouTube, commercial breaks generally show before the start of a video as well as throughout it if the creator permits it. These breaks can typically last a few seconds or a few minutes, but longer adverts typically offer the option to skip that ad after a certain amount of time.

Some YouTube users have noticed that, over the past few months, the number and length of adverts on the site have significantly increased, especially for unskippable formats.

Some Twitter users recently took to Twitter to mention, or rather claim that the application showed them breaks with as many as 10 ads in a row that can’t be skipped.

9to5 Google further reports that these longer breaks seem to be happening more frequently lately, though not with all films or with all viewers. 

Users with about five ads every break are more common than users with ten ads per break.

9to5 Google spoke to the Youtube spokesperson who revealed that the expanded number of ads was a part of a “small experiment” that has since “concluded.”

He said, “At YouTube, we’re focused on helping brands connect with audiences around the world, and we’re always testing new ways to surface ads that enhance the viewer experience. 

We ran a small experiment globally that served multiple ads in an ad pod when viewers watched longer videos on connected TVs. 

The goal is to build a better experience for viewers by reducing ad breaks. We have concluded this small experiment.”

Continue Reading

Auto & Tech

World’s most Aerodynamic car, Mercedes-Benz EQS is now in India

According to Mercedes, the EQS is the world’s most aerodynamic car and boasts of a drag coefficient from 0.20. Streamlining, seam sealing and minimization, wheel design, tyre spoilers, underbody panelling, a rear lip spoiler, and self-lowering air suspension ensure better comfort, stable handling, driving range and efficiency.



World’s most Aerodynamic car, Mercedes-Benz EQS is now in India


ercedes-Benz has launched the ‘Made in India’ EQS 580 4MATIC in the market, a car that marks some significant firsts in India both for the German Luxury brand as well as the overall EV luxury space in our country. India becomes the first market outside of Germany to manufacture this luxury EV, which can also be dubbed as the S-Class of electric cars. 

The EQS also becomes India’s longest-range EV with a range of 857 kms on a single charge, a number verified by Automotive Research Association of India (ARAI). The car has been priced at Rs. 1.55 crore, ex-showroom.


According to Mercedes, the EQS is the world’s most aerodynamic car and boasts of a drag coefficient from 0.20. Streamlining, seam sealing and minimization, wheel design, tyre spoilers, underbody panelling, a rear lip spoiler, and self-lowering air suspension ensure better comfort, stable handling, driving range and efficiency.

The doors are frameless, something that always adds to the premium quotient of a luxury car. Mercedes says that the fact that the EQS is based on an all-electric architecture also opened new design possibilities. As there is no large engine block on board, the behaviour in a frontal crash could be modelled even better. 


The sustainability in the EQS is enhanced through recycled & renewable raw materials as well as usage of recycled steel among other elements. One of the standout features in the cabin is indeed big 56-inch MBUX Hyperscreen. 

This includes the digital cluster, touchscreen system as well as a secondary screen for the front passenger. In addition, this the car also comes with a head-up display and a Burmester surround sound system comprises 15 speakers with a total output of 710 watts.


The high-power density of the lithium-ion battery comes with usable energy content of 107.8 kWh and is equipped with a powerful 400-volt battery manufactured using the lithium-ion technology. 

Maximum output generated is 385 kW while you get a peak torque figure of 855 Nm. Remember this is an electric car so all that torque is available right from the word go. Because of this car accelerates from 0-100 km/h in mere 4.3 seconds and reaches a maximum speed of 210 km/h. The big talking point is of course the range. 

At 857 kms on a single charge, the EQS has become the EV with the maximum range being sold currently in India.

The inclusion of rear-axle steering with 10° steering angle adjustment is a feature that works well looking at the congested Indian roads, tight parking spaces as well as the size of this luxury saloon. 

You also get to choose between Eco, Comfort, Sport and Individual drive modes, which change the accelerator pedal characteristic and agility, among other things.

In the Eco mode, the focus is on efficiency and an energy-efficient driving style. The car also gets a predictive route planning feature where the car plans the fastest and most convenient route, including charging stops, based on numerous factors and reacts dynamically to traffic jams or a change in driving style.


The EQS comes with a EURO NCAP rating of 5 star and gets as many as 9 airbags. 

In addition to driver and front passenger airbags, a knee airbag on the driver’s side is also standard. It protects the legs from contact with the steering column or instrument panel in a severe frontal crash. It also features a rigid passenger cell, special deformation zones and restraint systems. 

Designer belt buckles at the front and rear support buckling up, because the lights of the belt buckle pulsate at that time. The car also gets an acoustic vehicle alert system where a special sound acts as a warning for pedestrians.


The car comes with a 22-kW standard wall box AC charger while supporting a maximum DC charging power of 200 kW. Mercedes-Benz India says it will set up the largest ‘Ultra-fast charging network’, covering 80% of the country by end of 2022. 

This network will be exclusive to brands’ customers, with free and round the clock charging services being offered, for the first year.

The author is a senior editor at carandbike.com

Continue Reading

Auto & Tech

On Dussehra, Reliance launches Jio True 5G in four cities for select customers



On the occasion of Dussehra, telecom giant Reliance Jio launched a beta trial of 5G services in four Indian cities on Wednesday. The Jio True 5G services will be available by invitation only to a select group of customers.

“Jio’s True-5G is built on the “We Care” principle and will bring transformational changes across Education, Healthcare, Agriculture, Skill Development, Small, Medium, and Large enterprises, IoT, Smart homes, and Gaming, impacting 1.4 billion Indians,” the company said in a statement yesterday.

By invitation, the Jio True 5G service is being launched in Delhi, Mumbai, Kolkata, and Varanasi for existing Jio users. Customers who are invited will receive unlimited 5G data at speeds of up to 1 gigabyte per second.

The company stated that it will announce beta trial services for other cities as they prepare for 5G technology. The invited users will continue to use the beta trial services until the network coverage of a city is complete, in order to provide the best coverage and user experience to each customer.

Customers on the ‘Jio Welcome Offer’ will have their service automatically upgraded to Jio True 5G without having to change their existing Jio SIM or 5G handset.

Reliance Jio stated that it is working with all handset manufacturers to ensure that their 5G smartphones work seamlessly with Jio True 5G services, providing customers with the most comprehensive range of 5G devices.

“India is leading the Digital revolution. Jio 5G will be True 5G, and we believe India deserves nothing less than TRUE-5G. Jio 5G will be the world’s most advanced 5G network, built for every Indian, by Indians”, Reliance Jio chairperson Akash Ambani said in a statement.

During his speech at the India Mobile Congress, Reliance Industries chairman Mukesh Ambani stated that Jio’s 5G network will cover the most remote corners of India by December next year, and the services will be more affordable than anywhere else in the world.

“India may have started a little late, but we’ll finish first by rolling out 5G services that are of higher quality and more affordable,” quoted Ambani.

Continue Reading

Auto & Tech

‘5G to reach over 200 cities’, says Ashwini Vaishnaw



Ashwini Vaishnaw

Prime Minister Narendra Modi on Saturday launched 5G technology in India. After the launch, Airtel launched its 5G services in 8 cities and by March 2024 they will cover the entire country.

Meanwhile, by December 2023 Reliance Jio will introduce its 5G services and Vodafone Idea will launch its 5G services too. 

Moreover, Union telecom minister Ashwini Vaishnaw on Saturday said state-owned Bharat Sanchar Nigam Limited (BSNL), too, will offer 5G technology. The 5G services of BSNL will begin by 15 August 2023. 

Addressing the event Union telecom minister Ashwini Vaishnaw said, “This would make the company a powerful entity in the telecom sector.”

However, in his speech, Vaishnaw said that in the coming 6 months the 5G services will be available in 200 cities in the country.

“By 2024, the government wants to bring 80-90 percent people under 5G coverage,” Vaishnaw stated.

Continue Reading

Auto & Tech

Using 5G technology, PM Modi test drives a car from Delhi in Europe




Using the newly launched 5G technology, Prime Minister Narendra Modi conducted a test drive of a car in Europe from Delhi’s Pragati Maidan on Saturday. Union minister Piyush Goyal tweeted the photo and wrote, “India driving the world’.PM Modi inaugurated the India Mobile Congress 2022 exhibition before he launched the 5G mobile telephony services in India. At the exhibition, he visited the pavilions of the different telecom operators to experience the first-hand experience of the 5G technology.PM Modi was briefed about the technology by Mukesh Ambani and Akash Ambani at Reliance Jio stalls.Then PM Modi went to the stalls of Airtel, Vodafone Idea, C-DOT and others.Union telecom minister Ashwini Vaishnaw said, “Telecom is the gateway, the foundation of Digital India. It is the mode to bring digital services to every person.”Reliance Industries chairman Mukesh Ambani promised to deliver 5G to every town, every taluka by December 2023. He said, “I can say we are ready to take leadership and Indian Mobile Congress should now become Asian Mobile Congress & Global Mobile Congress. India may have started a little late, but will finish first.”

Continue Reading

Auto & Tech

20 Essential Tips for Optimizing Your Site for Mobile Search



As more and more people use mobile devices to access the internet, it’s important to make sure your website is optimized for mobile search. 

Here are 20 essential tips for optimizing your site for mobile search:

1. Use responsive design: Responsive design is a type of web design that makes websites look good on all devices, including small screens.

2. Use large font sizes: Make sure your font sizes are large enough to be easily readable on small screens.

3. Use short and descriptive titles: Keep your titles short and descriptive so they can be easily read on small screens.

4. Use mobile-friendly content: Make sure your content is easy to read and navigate on small screens.

5. Use images wisely: Use images sparingly and make sure they’re optimized for small screens.

6. Use simple menus: Keep your menus simple and easy to navigate on small screens.

7. Use social media buttons: Make it easy for visitors to share your content on social media by adding social media buttons to your website.

8. Use mobile-specific design elements: Use design elements that are specifically designed for mobile devices, such as click-to-call buttons and maps.

9. Use Accelerated Mobile Pages (AMP): AMP is a type of code that makes pages load faster on mobile devices.

10. Use Google Search Console: Google Search Console is a free tool that helps you track your website’s search performance on Google. 

11. Use Google Analytics: Google Analytics is a free tool that helps you track your website’s traffic and performance.

12. Use keyword research: Use keyword research to find the right keywords to target for your mobile website.

13. Use backlinks: Backlinks are links from other websites to your website. They help improve your website’s search engine ranking.

14. Use sitemaps: Sitemaps are files that contain a list of all the pages on your website. They help search engines index your website more effectively.

15. Use structured data: Structured data is code that helps search engines understand the content on your website.

16. Use robots.txt: Robots.txt is a file that tells search engines which pages on your website they should index.

17. Use hreflang tags: Hreflang tags are tags that tell search engines which version of your website to show users in different languages.

18. Use mobile-friendly URLs: Make sure your website’s URLs are easy to read and remember on small screens.

19. Use local SEO: Local SEO is a type of SEO that helps you rank higher in search results for local searches. 

20. Use Google My Business: Google My Business is a free tool that helps you manage your business’s information on Google.

By following these tips, you can make sure your website is optimized for mobile search and get the most out of your mobile traffic.


1. What is responsive design? 

Responsive design is a type of web design that makes websites look good on all devices, including small screens.

2. What are the benefits of using responsive design? 

The benefits of using responsive design include improved user experience, better search engine optimization, and higher conversion rates.

3. What is AMP? 

AMP is a type of code that makes pages load faster on mobile devices.

4. What are the benefits of using AMP? 

The benefits of using AMP include improved page loading speed, reduced data usage, and improved user experience.

5. What is Google Search Console? 

Google Search Console is a free tool that helps you track your website’s search performance on Google.

6. What are the benefits of using Google Search Console? 

The benefits of using Google Search Console include improved search engine ranking, higher click-through rates, and more website visitors.

7. What is Google Analytics? 

Google Analytics is a free tool that helps you track your website’s traffic and performance.

8. What are the benefits of using Google Analytics? 

The benefits of using Google Analytics include improved website traffic, higher conversion rates, and better marketing insights.


As you can see, there are many benefits to using responsive design and mobile-friendly design elements on your website. By following these tips, you can make sure your website is optimized for mobile search and get the most out of your mobile traffic.

Continue Reading