What is Tax Evasion?
Tax evasion is an activity that aims to hide, understate or falsely report income to reduce your tax liability. It comes under Tax fraud which consists not paying tax, paying less than what is due, not declaring cash transactions, fabricating income, falsifying deductions without proof etc.
Tax evasion is important because it is considered illegal in India and leads to severe penalties. The penalty for not disclosing income ranges from 100% - 300% of the tax. But, yo
List of all Military Exercises of India 2021
Military Exercises of India with Neighbours
Sampriti: India & Bangladesh
Mitra Shakti: India & Sri Lanka
Surya Kiran: India & Nepal
Hand in Hand Exercise: India & China
Ekuverin: India & Maldives
Military Exercises of India with Other countries
Maitree Exercise: India & Thailand
Vajra Prahar: India & US
Yudh Abhyas: India & US
Nomadic Elephant: India & Mongolia
Garuda Shakti: Indi
The Cyber Surakshit Bharat initiative was launched in January 2018 by the Ministry of Electronics and Information Technology (MeitY). It is the first public-private partnership of its kind that leverages the expertise of the IT industry in cyber security along with MeitY’s organizations such as CDAC, CERT-In, NIC, and STQC as the knowledge partners in this training program.
Aimed at creating awareness around cyber security and developing an empowered and strong cyber ecosystem in
What is a malware?
Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.”
Examples of common malware includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.
Types of Malware
Viruses are a subgroup of malware. A virus is malicious software attached to a document or file that supports macros to execute its code and spread from host to host. On
Center has approved the Production-Linked Incentive (PLI) scheme for drones and drone components on 15 Sep 2021.
The total amount allocated for the PLI scheme for drones and drone components is INR 120 crore spread over three financial years. This amount is nearly double the combined turnover of all domestic drone manufacturers in FY 2020-21.
This amount is 1.5 times the combined size of the manufacturing drone sector.
Over a period of three years, estimated investment
North-east is very important for our country from the aspects of security.
Our aim is to end all disputes in the Northeast by 2022 and usher in a new era of peace and development in the Northeast in 2023.
India has made efforts to establish peace by enriching the dignity, culture, language, literature and music of the Northeast.
We believe that development cannot happen without peace, and if employment, health, education and home and electricity for everyone are needed, then these can
About Karbi Anglong
Karbi Anglong district is one of the 33 administrative districts of Assam in India.
Diphu is the administrative headquarter of the district.
Karbi Anglong, the largest district in Assam, comprises various tribal and ethnic groups — Karbis, Bodos, Kukis, Dimasas, Hmars, Garos, Rengma Nagas, Tiwas, and Man (Tai Speaking). Apart from these groups, a lot of non-tribals also reside in the hilly district.
The Karbis racially belong to the Mongoloid group and
There are numerous aspects pertaining to refugees which are of major importance both to India, as a country and to the refugees, particularly in the context of law enforcement.
Given the security scenario prevailing in the country, particularly arising out of the role of some of the neighbours in this regard, an utterly humanitarian matter like the ‘refugees’ has come to be influenced by considerations of national security.
While law and order is a State subj
Human rights and press freedom activists are up in arms about a new report on NSO Group, the notorious Israeli hacker-for-hire company.
The report, by a global media consortium, expands public knowledge of the target list used in NSO's military-grade spyware. According to the report, that now not only includes journalists, rights activists and opposition political figures, but also people close to them, the groups have decried the virtual absence of regulation of commercial surveillance t
It is a spyware that works by sending an exploit link, and if the target user clicks on the link, the malware or the code that allows the surveillance is installed on the user’s phone.
Pegasus is installed without the user’s knowledge or permission.
Once Pegasus is installed, the attacker has complete access to the target user’s phone.
Pegasus delivers a chain of zero-day exploits to penetrate security features on the phone and instal