Author Archives: Vijayashankar Na

About Vijayashankar Na

Naavi is a veteran Cyber Law specialist in India and is presently working from Bangalore as an Information Assurance Consultant. Pioneered concepts such as ITA 2008 compliance, Naavi is also the founder of Cyber Law College, a virtual Cyber Law Education institution. He now has been focusing on the projects such as Secure Digital India and Cyber Insurance

Virtual Address of UPI scheme.. A pandora’s box

One of the suggestions under the Unified Payment Interface is that the participating bank would issue a “Virtual Address” to the customer. This will replace the account number. This virtual address would be used by remitters to send payment. This … Continue reading

Posted in Cyber Law | Leave a comment

The Unification of Fraud possibilities through UPI

The Unified Payment System launched by RBI on 12th April 2016 on a platform managed by National Payment Corporation of India (NPCI) poses a huge challenge to the security of public money held in Banks. As we go forward, the … Continue reading

Posted in Cyber Law | Leave a comment

Biggest data breach in Indian Banking ?

If you are an ICICI bank customer, beware that your Bank account information is open to anybody who is in possession of your mobile. This is breach of privacy under the age old Banking laws besides it is a violation … Continue reading

Posted in Cyber Law | 4 Comments

Unified Payment Interface introduced… New Threats unleashed…

The RBI has introduced the Unified Payment Interface that is expected to change the way the current payment systems especially over mobile wallets change…hopefully for the better. NPCI (National Payment Corporation of India) has released the details of the architecture … Continue reading

Posted in Cyber Law | Leave a comment

True Caller is abetting Cyber Frauds in India… Is it only a compromise? or Is it Recklessness?

True Caller is a reasonably popular mobile App which many mobile users in India have downloaded and installed. When the user receives a call from another True Caller user, though his name may not be in the contact list of … Continue reading

Posted in Cyber Law | Leave a comment

Bug Bounty Policy as part of Corporate Governance Responsibilities

Software is a unique industry where from Operating Systems to applications, programs are released for public use, without any real commitment from the software developers as to whether the program is free from vulnerabilities. In fact, vulnerabilities give raise to … Continue reading

Posted in Cyber Law | 3 Comments