










• Includes Physical forensics, Digital forensics, and Hardware forensics
• With crime detection in place, the first step in routine investigations is examining the evidence.
• Developmental efforts by our team are focussing on the less trodden path of detection of media manipulation and cross-referencing images for better detection.
• This research is mainly essential to help cases of missing persons against databases, find doctored multimedia to avoid the spread of misinformation, and study embedded malware multimedia closely.
• Stress testing a system till it breaks is an exercise to check the resilience of the system and find the bugs and ensure that the system is safe
• It is different than security testing as here the goal is to break the system
Studying the laws from various countries and international laws, catalog the specific laws/rules used to solve a case, and maintaining a repository to further streamline forensic cases
• Design bots to scrap the web to find threats and give alerts, study virality diamonds, and more
• Involves working with Python, JAVA
• Also includes OSINT, finding what is not available on the normal web, going beyond the reach of the normal populace to find details and information
Studying the mindset of criminals, motivation behind it, circumstances, etc, and understanding the agenda to devise better strategies to combat future cases
This sector works on using AI to combat cybercrime and automate general tests and processes ensuring maximum efficiency and effectiveness.
• When the internet alone could not help, perpetrators explored new ways and what better way than to exploit the shortcomings of the hardware all around?
• IoT sensors are being used to play with the system, and IC malware is being manufactured (a type of malware that directly targets specific chips or the family to which the chip belongs. These can be installed remotely by taking advantage of the vulnerabilities of the chip family or installed during the time of manufacturing and code-flash stage)
• The study of these will help combat the crimes happening due to the disadvantages/bugs/loopholes present in the hardware
• With the menace growing daily by leaps and bounds, we have envisaged India’s first Ransomware Research Lab. This helps us catalog the ever-evolving malware threats found around us and mitigate the same.
• Ransomware alone is on the path to causing losses of 1 lakh crore+ INR in the next 3 years coupled with irreparable data loss.
• The lab is fortunate enough to be backed by the support of Microsoft and Cornell University
With our able research and the reach that our company has on National television for demystifying the cybercrime status, we alongside our outreach partners have launched a Pro Bono national helpline for:
A. General masses – Senior Citizens, Duped Masses, and Victims of cyberbullying.
B. Corporates and Mid-sized companies
C. Assistance to Law Enforcement spread across 14 states with investigation pointers and contribute to building a cyber-safe world.
Creating easily understandable and informative blogs for broad awareness. We excel at simplifying complex information to make it accessible to a diverse audience, bridging the gap between technical knowledge and general understanding. The content created is shared with multiple Law Enforcement Agencies and others, thus creating an impact at a mass scale.
3.0 University is a pioneering academic initiative for creating a comprehensive knowledge ecosystem for emerging technologies. We have developed an in-house suite of course offerings for retail, institutional market participants and industry-at-large.Â
FT Tower, CTS No. 256 & 257, Suren Road, Chakala, Andheri (E), Mumbai-400093 India.
+91 8657961141
support@3university.io
Not a member yet? Register now
Are you a member? Login now
Not a member yet? Register now
Are you a member? Login now