News

In this week's edition, we are sharing insights on how telecom companies in our country are using AI to fight cyber frauds, spam calls, fake messages and online scams. As with every innovation, AI ...
The department clarified that it has no affiliation with the TikTok account, which has unlawfully used Japem’s official logo as its profile picture. The department urged the public to exercise ...
Patna: CBI has arrested a man from Patna for allegedly using the logo of Delhi Jal Board (DJL) to deceive gullible persons into installing a malicious software on their phones to steal sensitive ...
Patna (Bihar) [India], April 19 (ANI): The Central Bureau of Investigation (CBI) arrested a private person in a case related to cyber fraud for using Delhi Jal Board logo to cheat unsuspecting ...
A man identified as 'Bittu Kumar' was arrested by the Central Bureau of Investigation (CBI) in Patna, Bihar for allegedly using the logo of Delhi Jal Board (DJB) to cheat people. The DJB is a ...
We got our first look at the new-for-2026 Mazda EZ-60 electric crossover just last week, but Mazda played coy with the interior, leading many in the media (including us) to believe that the ...
Patna (Bihar) [India], April 19 (ANI): The Central Bureau of Investigation (CBI) arrested a private person in a case related to cyber fraud for using Delhi Jal Board logo to cheat unsuspecting ...
The new hub is inspired by the DOST logo, featuring four interconnected circular segments that reflect the iconic DOST emblem.
It was exciting news at Auburn when Chad Baker-Mazara realized midseason that he might get an extra year of eligibility and suggested he wouldn't mind spending it with the Tigers. But, on Thursday ...
With rising cyber threats, stricter regulations and growing concerns over ownership costs, the guide also urges enterprises to treat connectivity as a core part of their IoT strategy rather than an ...
The computer science program provides students with a broad and deep foundation in theory and modern software and hardware concepts as well as introduces students to numerous programming languages and ...
While the country’s hackers are far less known and capable than those of other countries with state-sponsored hackers, such as North Korea, China, or Russia, they can also be a threat, and their cyber ...