CYBER GYAAN - End Now Foundation
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
CYBER GYAAN Supported by: INFORMATION SECURITY EDUCATION & AWARENESS www.isea.gov.in https://ccoe.dsci.in/ www.endnowfoundation.org
End Now Foundation is India’s first non-profit organization, Promotiing Internet Ethics and Digital Wellness to Evoke Responsible Online Behavioural Patterns amongst "Women , Teens and Children". 'Cyber Gyaan' is dedicated in the memory of our Respected Founder Trustee Late Sri. Kasinath Bathina,IPS. 23 February 1938 - 26 July 2020 https://linktr.ee/endnowfoundation
i should check the battery % i want to get more likes ! Did you notice me? SMARTPHONES THE BIGGEST NON - DRUG ADDICTION OF THE 21ST CENTURY If your smartphone has made you it’s slave, Here’s a step - by - step approach to detach from it Disable notification on Keep your phone away your smartphone. during meals with your friends and family. Charge your device outside Device free meetings. the bedroom. Access social media from Use grey scale mode on your computer instead of your phone. your smartphone. Keep only most important Screen time for IOS tools on your home and digital wellbeing for screen. android to control the technology usage. https://linktr.ee/endnowfoundation
SLEEP ! T! EA This is so exciting, I can do this all day ! REPEA T! ONLINE GAMING IS PUBGECTED TO A LOTS OF RISKS Read on to know it’s negative consequences. All day addiction to games. Bad influence on health. Isolation from family & friends. Waste of precious time. Face a problem of insomnia. An expensive hobby. Rising level of aggression. Affects the eyesight. https://linktr.ee/endnowfoundation
Should i put a new We will hack your password ?? account !! SOCIAL MEDIA IS A LOT MORE FUN WHEN YOU PAY ATTENTION TO SAFETY Here are some tips to stay safe in the cyberworld Use a strong password. Click on Links with caution. Use a different password for Be careful about the personal each of your social media information you share. accounts. Set up your security answers. Become familiar with the (this option is available in privacy policies of the social most social media platforms.) media channels. Access social media from Protect your computer by computer only. installing antivirus software. Be cautious while accepting Remember to log off when you friend requests. are done. https://linktr.ee/endnowfoundation
CYBER BULLYING TYPES Impersonation Pretending to be someone else & sending Cyber stalking or posting any material Denigration Repeatedly sending the online that makes that Dissing’ someone online. messages that include person look bad, gets Sending or posting any threats of harm or are that person in trouble. cruel gossip about a highly intimidating. person to damage his or her reputation or friendship. Harassment Outing & trickery Repeatedly sending some Sharing someone’s secret or offensive, rude, and embarrassing information insulting messages. online. Flaming Exclusion Online fights using Intentionally excluding electronic messages someone from online with angry and vulgar group, like a ‘buddy list’. language. FAILURE DEFORMED UGLY MENTALSELFISH WORTHLESS LOSER https://linktr.ee/endnowfoundation
CYBER BULLYING AFTER EFFECTS Health issues Suicide Depression Alcohol Violent FAILURE DEFORMED UGLY MENTALSELFISH WORTHLESS LOSER https://linktr.ee/endnowfoundation
COMMON Here are some common CYBER forms of cyber threats THREATS to protect against. RANSOMWARE MALWARE Malicious software installed on a machine Malevolent software which locks user unknowingly and performs criminal actions access by encrypting data using for a third party. cryptovirology while extorting the payment from the victim in order to dencrypt and restore the files. BOTNETS SPOOFING A "secret key" that provides entry to devices Email messages sent from a fraudulent and connections to be controlled by an account masquerading as a legitimate attacker for criminal purpose. and trusted source as an attempt to gain access to a user's system or confidential information. WORM TROJANS DENIAL OF SERVICE {DDOS} Stand alone software which does not Computer program that require a host program in order to contains destructive code Floods bandwidth propagate and replicate itself onto other disguised as the harmless which makes online networks and drives damaging data and programming. systems unavailable. software as it spreads. VIRUS PHISHING A type of malware that when executed A DNS server software vulnerability is exposed or a spreads from computer by replicating host file is swapped and a legitimate website is its programming and infecting user maliciously redirected to a scan site where programs and files to change the way unknowing visitors enter their confidential they operate or to stop working information. altogether. SPYWARE PHARMING ADWARE Criminal malware on A DNS server software Can redirect the the hard drive used to vulnerability is exposed or a search requests covertly monitor user host file is swapped and a or automatically activities. legitimate website maliciously render some of redirects to a scam site where advertisements unknowing visitors can enter producing the into their own confidential revenue for its information. creator. https://linktr.ee/endnowfoundation
PHISHING ATTACK ALERT Gear up to protect yourself from cyber criminals. TOP 5 RED FLAGS HOW TO STAY PROTECTED Web links can lead to unfamiliar sites (hover over them to check). 1 Do not click on any links or attachments you can't verify There is an attachment you weren't expecting. 2 You notice poor spelling & grammar throughout. Call to verify requests for info (even if it seems to come from someone you know!) It asks for personal info (passwords, all of bank information, etc.) 3 The sender doesn’t address Whenever in doubt, always you by name. contact optimal for help! https://linktr.ee/endnowfoundation
HOW EXPOSURE TO BLUE LIGHT AFFECTS YOUR BRAIN AND BODY By disrupting melatonin, smartphone light ruins sleep schedules. This leads to all kinds of health problems: The disruption to your There's some evidence that sleep schedule might blue light could damage our leave you distracted vision by harming the Retina and also impair your over time — though some Memory the next day. more research is needed. A poor night's sleep Researchers are investigating caused by smartphone whether or not blue light light can make it Harder could lead to Cataracts. To Learn. Over the long term, not There is a connection getting enough sleep between light exposure at can lead to Neurotoxin night and the disturbed buildup that makes it sleep that come with it and even harder for you to an increased risk of breast get good sleep. and prostate Cancers. People whose melatonin By disrupting melatonin and levels are suppressed and sleep, smartphone light can whose body clocks are also mess with the hormones thrown off by light exposure that can control hunger and are more prone to Depression. potentially increasing Obesity Risk. https://linktr.ee/endnowfoundation
Call at 919xxxxxxx to know more This looks interesting. i should call ! PEOPLE ARE MISUSING SOCIAL MEDIA, MESSAGING AND INTERNET TO SPREAD FAKE NEWS Here are ways how you can spot fake news. Check the source and url. Refer fact checking sites (www.factly.in). Read beyond the headline. Check if it's a joke. Check the date. Check your biases before judgement. Watch for any unusual Do Google Reverse Image formatting. Check. https://linktr.ee/endnowfoundation
SPOTTING FAKE NEWS ON SOCIAL MEDIA & INTERNET ! Consider the source Check the url Is the source credible, Does it seem legitimate? trustworthy and well Does the website have a known? i.e. Consider the track record of being source that is from a reliable? Many sites use reputed news paper, similar sites ending with news channel or online .io .co .com. news website. Who’s the author? Read beyond headline Did you search for the Does the article seems author’s name online to balanced, fair & objective? see if they are credible & Always study it critically, very well respected? detecting the tone & Many fake sites won’t viewpoint while checking use the author’s name. your bias at the door. Disregard your bias Get a second opinion It is easier to believe If a story makes you very stories that confirm your angry and a dig deeper, internal views. But the consult known contact next time you see on or use debunking sites social media post that before forwarding. flames your political, racial or religious views. https://linktr.ee/endnowfoundation
SPOTTING FAKE NEWS 9 TYPES OF MIS AND DISINFORMATION False Connection False Context Manipulated Content When the headlines, When the genuine content When some of genuine visuals or the captions is shared with the false information or the do not support the contextual information. imagery is manipulated content. to deceive. Satire or Parody Misleading Content Imposter Content No intention to cause Misleading the use of When genuine sources harm but has potential information to frame an are impersonated. to fool. issue or individual. Fabricated Content Propaganda Sponsored Content Content that is 100% When content is used to Advertising or PR is false, and designed to manage attitudes, values disguised as editorial deceive and do harm. and knowledge. content. https://linktr.ee/endnowfoundation
SPOTTING FAKE NEWS PHOTO VERIFICATION Identify and verify the Always use tools like original source and the FotoForensics/Findexif content (which includes for the information on location, date and the camera model/timestamp. approximate time). Try to find multiple Using Wolfram Alpha, sources. Challenge the check if the weather original source to prove captured in photo (e.g. veracity - ask follow up sunny, rainy, overcast) questions. was actually the weather in that area. Always use tools like www.tineye.com and https://images.google.com on Google. https://linktr.ee/endnowfoundation
SPOTTING FAKE NEWS VIDEO VERIFICATION Identify and verify the Try to find some multiple Use the Amnesty original source and the sources. Challenge the International's Data content (which includes original source to prove Viewer.(https://citizen location, date and the veracity - ask follow up evidence.amnestyusa.o approximate time). questions. rg). Scrutinize uploader's What information does the How long have these name and the date of social media / affiliated accounts been active? upload. accounts give that indicate How active are they? location, activity, reliability, bias or agenda of uploader? Is the person listed in Are the other accounts, online databases or the including social media, a networking platforms e.g. blog or website - affiliated Linkedln? with the uploader? https://linktr.ee/endnowfoundation
10 SECURITY TIPS FOR WORK FROM HOME Use your workplace device Always use the two - factor - having all of the security authentication and complex precautions in place. passwords for all accounts and devices. Use VPN to access the data Always enable the Data Loss through secure connection. Prevention (DLP) tools to ensure sensitive data is not lost. Regularly update OS and Be aware of the COVID-19 Antivirus to protect against scams, phishing, e-mails, malware attacks. malicious domains and fake apps. Avoid using the unsecured, Ensure that only authentic free, public wi-fi hotspot or verified URLs are accessed. network. Regular backup of data in Disable USB ports & System your system and cloud (One Bluetooth connectivity. Drive, G-Drive, etc.). https://linktr.ee/endnowfoundation
I will steal all your money ! I got a nice job instantly ! THOUSANDS ARE FALLING PREY TO ONLINE JOB SCAMS EACH DAY. DON'T BE ONE OF THEM ! Here’s how you can spot an internet job scam You are immediately selected The interview is scheduled for the Job. on the instant messaging platforms. Vague job requirement and Search results about the job description. Company or the job doesn't show up. Unprofessionally written You are asked to provide e-mails. Confidential Information. E-mails with no contact You're asked to Pay. information or Company Signature. https://linktr.ee/endnowfoundation
DON'T BE A VICTIM OF FRAUD! You can instantly pay Great Deal, When will I through your phone ! get my bike ?? DO NOT Pay in Advance. Check before approving Payment Requests. Share Personal Details Report the Questionable like PIN , OTP, Account Accounts immediately. Number, etc. Facilitate any Monetary Transactions while on Call. BEWARE : Payments through Online Platforms are robust but Susceptible to Fraud. 99% of Payments are prone to Phishing and Social Engineering Crimes. https://linktr.ee/endnowfoundation
CARD FRAUD Always guard your Cards and the Do not let your Card out of your Ask the retailer to confirm the Card details. sight when making a transaction. amount being debited from your Card. Sign the New Cards as soon as they Check your Receipts against your Carefully discard your receipts arrive. Online Statements. from Card transactions and the Information related to your financial affairs. Don't leave your cards Unattended Never write down your PIN nor When making Online transactions in a Public Place. Keep personal disclose to anyone. make sure you are using Updated belongings with you at all time. Antivirus & Operating System Software. Only buy from trusted sources. When replacement card arrive, For Internet purchases, use the cut Expired / Unused / Blocked Security Protocol 3D - Secure. cards into several pieces, inluding through the magnetic strip and / or chip. CASH MACHINES (ATM'S) PAYMENT TERMINALS (POS) Always try to be If the ATM Card - skimming Never lose sight aware of others does not return can also occur at (and if possible, around you. your Card,then the retail outlets, touch) of ATM card ATM report it to during the payment particularly bars, your Bank. restaurant areas, transactions. Don't use the the parking ticket ATM if there machines & the are any signs Sheild your PIN. (unnamed) petrol Insist that your of tampering. stations. card is visible to you at all times. https://linktr.ee/endnowfoundation
HOW THE ‘KYC’SCAM WORKS You get a call that your wallet or bank KYC Is Invalid. 1 Caller says It can be validated 2 online so that your account is active again. You are asked to download an app to facilitate step-by-step 3 guidance. When you use the app, caller 4 can see your phone screen. He asks you to transfer a small token amount to your 5 wallet. He uses them simultaneously 6 to transfer larger amounts from your bank. When you do so, he can see your password and other 7 details. Victim gets OTPs for all transfer requests but these can 8 be seen by scamster via the app. In a matter of minutes, the scamster cleans out the bank 9 account. https://linktr.ee/endnowfoundation
Can I have your OTP ! NO Way ! https Your OTP is : **** GUARD THAT OTP Your one-time password can be used to steal money from your bank account. Refrain from sharing it to stay out of trouble. Never share your One Time Keep Changing Your ATM **OTP** Password (OTP). Pin frequently. Never share your CVV. Check for https:// and the Lock Icon for Secure Online Transaction. Never save Credit / Debit - Card details on Ecommerce Websites. https://linktr.ee/endnowfoundation
THINK BEFORE YOU ENTER YOUR SAY NO TO Advance Payments. Sharing Personal Details, PIN Number, OTP, Account Number, etc. Transferring, Receiving Money while on Call. Your PIN is NOT required when RECEIVING UPI Payments via BEWARE: Payments through Online Platforms are Robust but Susceptible to Fraud. 99% of Payments are Prone to Phishing and Social Engineering Crimes. https://linktr.ee/endnowfoundation
HOW DEBIT CARD SKIMMING WORKS Here are some of the ways thieves steal bank information from atms : Fraudsters switch Fraudsters install a Fraudsters install a Fraudsters install a the entire device. Skimmer. new keypad. camera. Store card reader Card skimmer Thief's key pad Thief's card reader Hidden micro camera How to protect yourself ATMs at banks may be safer than Don't use an ATM or payment those at gas stations and stores. machine if it appers altered. Jiggle the card as you withdraw it If having trouble using an ATM, from the slot, it might loose a card don't accept help from strangers. skimmer. As you enter your PIN, cover the Check your bank statements keypad with your other hand. regularly to see any suspicious activity. https://linktr.ee/endnowfoundation
WHAT IS SIM SWAP FRAUD? STEP 1 STEP 2 Fraudsters gather customer's They then approach the mobile personal information through operator and get the SIM Phishing, Vishing, Smishing or blocked. After this, they visit the any other means. mobile operator's retail outlet with the take ID proof posing as the Customer. STEP 4 STEP 3 Fraudster then generates One The mobile operator deactivates Time Password (OTP) required the genuine SIM card and issues to facilitate transactions, using a new one to the fraudster. the stolen banking information. This OTP is received on the new SIM held by the fraudster. https://linktr.ee/endnowfoundation
IT’S A Hello Hello Baby MATCH AVOID FALLING PREY TO ROMANCE FRAUD Do not indulge in online chatting, dating or get emotionally involved with people without verifying the truthfulness of clients. Never spend money or your details to online strangers/social media friends. Online follower asks to communicate outside the dating website/platform only after a few contacts or conversations. Do a www.tineye.com or Google Reverse Image Check of your fan to help determine if they really are who they say. No sharing of intimate pictures or videos online. Scammers are known to blackmail theur targets using past shared pictures or videos of you that you don’t want others to see. https://linktr.ee/endnowfoundation
PREVENT MATRIMONIAL FRAUDS How to prevent yourself from being a victim of matrimonial fraud : Do a thorough Profile Check. Always look for ‘Verified’ Profile Matches on Marriage Portal. Never give money to anyone. Never reveal your Portal Account Information. Stay Informed while meeting in person. Stay Informed while signing on any document. https://linktr.ee/endnowfoundation
BEWARE OF LOAN FRAUD WARNING SIGNS No credit check required. Lender is not registered with the Government Legally. No Physical Address. Advance Payment. Offer Expired in a few days. SAFETY TIPS Look for a secure Payment (https:// URL with a Pad Lock Symbol). Never share OTP/PIN Numbers to the buyer or seller. Never do the Payment while you are on the call. Do not click and fill up any Shirt Links provided by the buyer or seller. Do no fill google form links provided by the buyer or seller. Do not Scan the QR Code. Never pay advance loans fees for any loans. https://linktr.ee/endnowfoundation
N !!! U L ATIO 0,000 T 0 GRA $1,0 CON E WON HAV YOU ERE TO CLICH H EWARD!! YOUR R CLAIM GUARD YOURSELF AGAINST LOTTERY FRAUD FEW FRAUDS Kaun Banega Karodpathi Scratch Card Gift RBI Lottery European Lottery SAFETY TIPS Never Click on Short Links sent through e-mail/SMS. Click on Websites that start with https://. There is an Attachment that you were not expecting. Sender doesn’t address you by name. No need to pay advances for winning a Lottery Prize. We cannot win money in a lottery or competition unless we have purchased or participated personally. Competitions and lotteries do not require you to pay advance fee to collect winnings. Never transfer funds to unknown person or entities in anticipation of high returns. https://linktr.ee/endnowfoundation
i STAY SECURE FROM IDENTITY FRAUD How to safeguard yourself being an identity victim : Do not open short links that have been sent via e-mail or SMS. Update Antivirus software both on PC and Mobile phone. Don’t communicate about financial / password information on e-mail or SMS. Do not post D.O.B, Birthplace or Mailing Address on Social Media Platforms. Change Passwords periodically. Don’t have same format of passwords for all applications. Periodically check the Bank Statements and Credit Card Statements. Mention the purpose when you give Xerox copy of the PAN Card/Aadhar Card. https://linktr.ee/endnowfoundation
CYBER SAFETY How to stay safe online Alawy keep your Be careful of what Always check your Shop safely on the information & the you are posting privacy settings trusted websites passwords private online Choose the strong Protect all of your Remember to log Check the website passwords devices with an off url antivirus Always check the Avoid phishing & Always keep your Respect yourself & e-mails before you other scams children safe online others online open them https://linktr.ee/endnowfoundation
KEEPING YOUR SMARTPHONES & TABLETS SAFE ! Smartphones and Tablets need Use 'Automatically Update' even more Protection than and keep your devices (and all your 'Desktop' equipment. installed apps) up to date. Switch on the PIN / Password Don't connect to Public Wi-Fi, or the Protection / Fingerprint use 3G or 4G connections or Recognition for mobile devices. use VPNs. Configure that can be Tracked, Replace devices that are Remotely wiped or Remotely no longer supported by the locked. manufacturers with up-to- date alternatives. https://linktr.ee/endnowfoundation
BACKING UP YOUR DATA A better approach ! Take the regular backups Test the restoration of data of your important data at regular intervals to an and test that they can be alternate device. restored. Identify what needs to be Consider backing up to the backed up, i.e. documents, cloud and you'll also be able photos, e-mails, contacts to access it from anywhere. and calenders. Ensure that the device containing your backup is not permanently connected to any network. https://linktr.ee/endnowfoundation
PREVENTING MALWARE DAMAGE Avoid unexpected pop-ups , strange e-mails & .exe extension files Use Antivirus Software Control all of the access to on all devices. Install only the removable media. approved software. Encourage to transfer files via e-mail or cloud storage instead. Prevent from downloading Switch on your firewall third party apps from to create a buffer zone ? unknown sources. between your network and the internet. Patch all Software and Firmware by using the 'Automatic Update' option. https://linktr.ee/endnowfoundation
USING PASSWORDS To protect your data ! Make sure all use encryption Enforce Password changes at products that require a password Periodic Intervals. to boot. Switch on the password / PIN Change manufacturers' default protection or the fingerprint passwords on device. recognition for all devices. Use Two Factor Authentication Provide secure storage and user can reset their own passwords 2FA (2FA) for banking, e-mail & *** easily. social media sites. Avoid using easily predictable Use a Password Manager passwords (i.e. Family, Pet, First Tool ‘Master Password’ (that D.O.B Names, etc). provides access to all other passwords) https://linktr.ee/endnowfoundation
N A T I ’S RY M I N E L CAR E CHAN T U B ) G O T YOU RYISLIVE (CAR K E DC H A ENABLE TWO - FACTOR AUNTHENTICATION If their accounts are hacked, yours can be easily hacked too WHO IS CARRYISLIVE NEXT ? Follow the steps for two-factor authentication Settings Security Settings Security & Login Two Factor Authentication Two Factor Authentication Settings & Privacy Ac- Settings & Privacy Login counts Security & Security Two Step Text Message Verification Google Account Security 2 - Step Verification https://linktr.ee/endnowfoundation
10 INTERNET SAFETY TIPS FOR PARENTS Digital citizenship and internet safety Don't block all access to technology. Help your child learn to use tech safely and positively. Take interest in your child's favourite applications or sites. Co-view or co-create at times. Be the parent. You are in charge. Set boundaries and consider using the filtering software. Create the family media agreement with tech free zones such as bedrooms, cars, and meals. Always teach your child what personal informations they should never reveal online (YAPPY acronym). Help your child learn to filter information online and also navigate fact from fiction. Navigate digital dilemmas with your child. Avoid using devices as the rewards or punishments. Balance the Green time and Screen time at home. Focus on the basic developmental needs. Don't support your child to sign up for sites with the age restrictions (e.g. 15+) if they are underage. Learn more: Explore reliable resources for parents so you can educate yourself. https://linktr.ee/endnowfoundation
10 INTERNET SAFETY TIPS FOR KIDS Digital citizenship and internet safety Laws : Many sites and web tools are 13+. Most images and work online are protected by copyright. Talk : Tell your parents what you're doing online. Always ask a trusted adult if you're unsure of anything. Friends : Don't add or meet online friends without parent permission. Do not trust on everything friends tell you. Privacy : Keep your personal info private : Your full name, address, phone number, your plans, password and your Reputation : Do not post birthday. anything you wouldn't want teachers, family, friends, and future employers to see. Question : You can't believe everything you read and see online as there is a lot of incorrect and biased info. Bullying : Tell someone if you think / see cyberbullying is happening to you or other people you know. Accounts : Choose some sensible email addresses and usernames and use strong passwords and don't share them with others. Manners : Be polite and respectful at all times. Treat others online how you'd like to be treated. Unplug : Balance your screen time and green time. Get outdoors, move, play, and interact face to face. https://linktr.ee/endnowfoundation
Nodal Cyber Cell Officers Cyber Crime Reporting Portal www.cybercrime.gov.in JAMMU & KASHMIR HIMACHAL PRADESH UTTARAKHAND Sh Mukesh Singh Sh Narveer Rathore Ms. Riddhima Aggarwal (IGP) DSP DIG igcrime-jk@nic.in polcyberps-shi-hp@nic.in ccps.deh@uttarakhandpolice.uk.gov.in CHANDIGARH Sh Omvir Singh Bishnoi DIG dig-chd@nic.in UTTAR PRADESH BIHAR ARUNACHAL PRADESH PUNJAB Shri Rohan P Kanay Sh D. Amarcase Shri Navdeep Singh Brar SP Cyber Crime, Lucknow ASP SP Sh Inderbir Singh sp-cyber.lu@up.gov.in cybercell-bih@nic.in spcr@arunpol.nic.in AIG aigcc@punjabpolice.gov.in HARYANA SIKKIM ASSAM Shri Pankaj Nain, IPS Sh Manish Kumar Verma Shri Lachit Baruah, IPS SP/Cyber Crime SP DIGP shocyberpkl.pol-hry@gov.in digp-cid@assampolice.gov.in spcid@sikkimpolice.nic.in DELHI Sh Anyesh Roy DCP acp.cybercell@delhipolice.gov.in RAJASTHAN Sh Umesh Nitharwal Dy. SP CCPS ccps-raj@nic.in NAGALAND Sh Zekotso Mero IGP MADHYA PRADESH cybercrimeps-ngl@gov.in Sh Niranjan B Vayangankar DIGP mpcyberpolice@mppolice.gov.in MANIPUR Ms. Joyce Lalremmawi GUJARAT SP cidcb-mn@nic.in Sh Rajesh Gadhiya SP cc-cid@gujarat.gov.in WEST BENGAL Sh Dhruba Das, IPS MIZORAM Addl. SP ccpwb@cidwestbengal.gov.in Sh Lalhuliana.Sanai DAMAN AND DIU SP Sh. Hareshwar V. Swami,IPS cidcrime-mz@nic.in SP sp-diu-dd@nic.in ODISHA Sh Bijay Kr Mallick DSP TRIPURA dirscrb.odpol@nic.in DADRA & NAGAR HAVELI Sh. Ajit Pratap Singh SP Crime Ms. Manasvi Jain spcybercrime@tripurapolice.nic.in Dy. SP itcell-dnhp@mha.gov.in CHATTISGARH Ms. Manisha Thakur Rawte AIGP MEGHALAYA aigtech-phq.cg@gov.in MAHARASHTRA Sh M.G.T Sangma SP Sh Balsing Rajput sspcid-meg@gov.in SP PUDUCHERRY sp.cbr-mah@gov.in Sh Mahesh kumar Barnwal SSP cybercell-police.py@gov.in JHARKHAND GOA Ms. Vijaya Laxmi Sh Pankaj Kumar Singh SP ANDHRA PRADESH TELANGANA cyberps@jhpolice.gov.in DIGP picyber@goapolice.gov.in Ms. G. Radhika Sh B. Ravi Kumar Reddy SP DySP cybercrimes-cid@ap.gov.in ccps.cid@tspolice.gov.in KARNATAKA LAKSHADWEEP Sh S. Badrinath Sh Ramdulesh Meena ANDAMAN & NICOBAR Dy. SP DSP TAMIL NADU badri@ksp.gov.in lak-sop@nic.in Sh. Madhup Tiwari Sh G Shashank Sai (for OTHER CYBER CRIMES) IGP SP igpint.and@nic.in sp1-ccdtnpolice@gov.in KERALA Smt. Jayashree V. (for Women and Children related) Sh Sreejith SP IGP sp1-cwctnpolice@gov.in igpcrimes.pol@kerala.gov.in https://linktr.ee/endnowfoundation
Grievance Officers Cyber Cell Cyber Crime Reporting Portal www.cybercrime.gov.in JAMMU & KASHMIR HIMACHAL PRADESH UTTARAKHAND Sh. B Srinivas Sh. Sandeep Dhawal Sh. Deepam Seth ADGP (0191-2582996) SP (0177-2627955) IGP (0135-2712563) adgpcidjk@jkpolice.gov.in sp-cybercr-hp@nic.in dgc-police-ua@nic.in CHANDIGARH Ms. Nilambari Jagadale SSP (0172-2760001) pssput-chd@nic.in UTTAR PRADESH BIHAR ARUNACHAL PRADESH PUNJAB Dr. Kalluri SP Kumar Sh. Shiv Kumar Jha Sh. Take Ringu ADG(Crime) (0522-2208598) DIGP (0612-2238098) DIGP (0360-2215518) Sh. Hardial Singh Mann ccpsstf.gb-up@gov.in dgp-bih@nic.in sit@arunpol.nic.in DIGP (0172-2226258) aigcc@punjabpolice.gov.in shocc@punjabpolice.gov.in HARYANA SIKKIM ASSAM Shri Desh Raj Singh, IPS Sh. Sonam Detchu Bhutia Sh. Surendra kumar ADGP(Crime) (01733-253230) DySP (03592-204297) IGP (0361-2524494) adgp.crime@hry.nic.in DELHI spcid@sikkimpolice.nic.in igp-cid@assampolice.gov.in Mr. Prem Nath Addl.CP (011-20892633) addlcp.cybertech@delhipolice.gov.in RAJASTHAN Sh. Abhijeet Singh SP SOG (0141-2309547) singh.kadian@ips.gov.in NAGALAND Sh. Renchamo P. Kikon ADGP (0370-2223897) MADHYA PRADESH renchamo.p@gov.in Smt. Aruna Mohan Rao SPL DGP (0755-2770248) spl.dgp-cybercell@mppolice.gov.in MANIPUR Sh. Themthing Ngashangva GUJARAT DIGP (0385-2450573) themthing.ng@gov.in Dr. Shamsher Singh ADGP (079-23250798) cc-cid@gujarat.gov.in WEST BENGAL Sh. Ashok Kumar Prasad MIZORAM IGP (033-24791830) ig2@cidwestbengal.gov.in Sh.Balaji Srivastava IPS DAMAN AND DIU DGP (0389-2334682) polmizo@rediffmail.com Sh. Vikramjit Singh IPS SP (0260-2250942) sp-dmn-dd@nic.in ODISHA Sh. Madkar Sandeep Sampat SP (0671-2306071) TRIPURA sp1cidcb.orpol@nic.in DADRA & NAGAR HAVELI Shri Subrata Chakraborty AIGP,Crime (0381-2321741) Sh. Sharad Bhaskar aigcrime@tripurapolice.nic.in SP (0260-2643022) sp-sil-dnh@nic.in CHATTISGARH Sh. R K Vij SPL DGP (0771-2511623) MEGHALAYA vijrk@gov.in MAHARASHTRA Sh. F G Kharshiing DIGP (364-2550141) Sh. Brijesh Singh fg.kharshiing@ips.gov.in SPL IGP/ DGP (022-22160080) PUDUCHERRY ig.cbr-mah@gov.in Sh. Dr. VJ Chandran GOA DIGP (0413-2231386) dig.pon@nic.in JHARKHAND Sh. Ranjit Prasad Sh. Paramaditya IGP (0651-2490046) ANDHRA PRADESH TELANGANA DIGP (0832-2420883) ig-orgcid@jhpolice.gov.in digpgoa@goapolice.gov.in Shri M.Sunil Kumar Naik IPS Smt. Swathi Lakra IPS DIGP (0863-2340152) ADGP (040-23147604) cybercrimes-cid@ap.gov.in igp_wpc@cid.tspolice.gov.in KARNATAKA LAKSHADWEEP Sh. T D Pawar Sh. Shibesh Singh ANDAMAN & NICOBAR DIGP (080-22251817) SSP (04896-262258) TAMIL NADU digadmincod@ksp.gov.in lak-sop@nic.in Sh.Deependra Pathak KERALA Shri Shankar K. (FOR OTHER CYBER CRIMES) DGP (03192-230216) IGP (044-28447712) dgp.and@nic.in sp1-ccdtnpolice@gov.in KERALA Shri Shankar K. (FOR WOMEN & CHILDREN RELATED) Sh. Dr. Shaik Darvesh IGP (044-28447620) ADGP (0471-2722215) sp1-cwctnpolice@gov.in adgpcrimes.pol@kerala.gov.in https://linktr.ee/endnowfoundation
Credits : Ms. Mitushee Bairagee Uttar Pradesh Institute Of Design, Noida Ms. Shruti Singh Uttar Pradesh Institute Of Design, Noida https://www.canva.com/ https://slidesgo.com/ https://linktr.ee/ https://www.freepik.com/ https://internshala.com/ https://linktr.ee/endnowfoundation
www.endnowfoundation.org Hyderabad - Telangana, India. (Reg. No: ) CYB ER r a k s h a S u 91.9 FM Radio City R DIGITAL WELLBEING CYBER CY BE COUNCIL a jagran initiative CYBER S HA K GUARD GURU RA K Advocacy by Research & Advocacy by Advocacy by Advocacy by Advocacy By News Paper Development Digital Safety Advocates FM Radio Student Ambassadors Organisations
You can also read