• About
  • Advertise
  • Privacy & Policy
  • Contact Us
Tuesday, December 5, 2023
DATAQUEST
  • Home
  • News
    Inflection point

    Gen AI is an Inflection Point Technology That’s Here to Stay: Forrester 

    Apple

    TDK of Japan to manufacture  Li-ion cells for iPhones in Haryana

    Infosys and spotlight

    Infosys Topaz Accelerates Customer Growth for Spotlight Retail Group in Digital Commerce

    DRDO apprenticeship

    DRDO offers Apprenticeship Opportunities at DIBER-DRDO

    WhatsApp

    WhatsApp Banned Nearly 7.5 Million Indian Accounts in October 2023

    Job Market

    How Students Can Prepare for the Current Job Market

    Trending Tags

    • election update
    • trump news
    • United Nations
    • whitelisting
  • Business Technologies
    semiconductors

    Global semiconductor industry anticipated for robust recovery with estimated growth of 13.1% in 2024

    Cloud Outages

    Cloud Outages – More than a Flat Tyre

    AWS

    From the Strip to the Sphere, AWS is getting there

    Drone

    Upcoming trends for the drone industry

    Cloud

    A Walk In the Clouds and Beyond—The Significance of Cloud Security

    Volt

    Why the edge matters?

    Trending Tags

    • Nintendo Switch Pro
    • ClickShare CSE-800
    • Mark Zuckerberg
    • Silicon Valley
    • internet
  • DQDeepTech
    Careers in Blockchain

    Explore Thriving Career Opportunities in Blockchain: Discover the Essential Skills

    Dr. Akhilesh Gupta

    Dr. Akhilesh Gupta unveils quantum leap in computing: Revolution in communication and security

    Python apps

    Must-Have Python Apps to Help With Ideal Tech Jobs

    Skills

    Essential Skills for Navigating the Uncharted Future

    quantum computing

    Strengthening the quantum computing ecosystem in India

    customer experience

    A “bettaverse” can deliver superior customer experience and more! 

  • Leadership Insights
    • Interview
    • Opinion
    • Editors Blog
    • Features
  • Annuals
    A long legacy

    A long legacy of engaging with CIOs

    Sandeep Dutta and Ajay Vij

    DQ Top 20 Rank 7- Rank 7 – Accenture India, Concerns over revised guidance

    Google

    DQ Top 20 Rank 20 – Google India Driving Growth through Advertising Space Reselling 

    Genpact

    DQ Top 20 Rank 19 – Genpact Transformation Happening Here? 

    Oracle

    DQ Top 20 Rank 17 – Oracle India Business Surges, spearheading Cloud Revolution across Sectors 

    Microsoft

    DQ Top 20 Rank 16 – Microsoft India Robust Outlook Amid Driven by Hybrid Work and Cloud Adoption 

    Trending Tags

    • Data Loss Prevention 2.0
    • Technology product Development
    • Internet access in developing countries
    • Unilever Ventures
  • DQ40Years
  • Events
    Hexaware

    Hexaware Technologies Expands UK Presence in Birmingham with New Facility

    Eventus Security

    Eventus Security Expands Global Presence with New Cyber Defence Centre in Ahmedabad

    Ransomware Is the Main Threat Report

    Ransomware Is the Main Threat: Report

    Sindhu Gangadharan

    Gen-AI will be transforming our world: Juergen Mueller, CTO, SAP SE

    SAP

    AI definitely does not make the developer jobs go away: SAP

    Juergen Mueller

    Generative AI is changing the way how developers work: Juergen Mueller, SAP

    Trending Tags

    • Revenue Analytics
    • fraud prevention
    • Seven Pillars of Digital India
  • Business Solutions
    Artificial Intelligence

    Revolutionizing Travel and Hospitality: The Unprecedented Impact of Artificial Intelligence

    AWS

    From the Strip to the Sphere, AWS is getting there

    Cyber

    The Cyber Shields of Tomorrow

    cybersecurity threats

    Cybersecurity in the Digital Age: How to Protect Your Business from Emerging Threats

    Video analytics

    Enhancing video quality for optimized analytics

    Insight EDA

    Siemens acquires Insight EDA to expand Calibre integrated circuit reliability verification offering

    Trending Tags

    • More
      • Tech4Growth
      • DQConclave Event Site
      • TechSchools Event Site
    No Result
    View All Result
    • Home
    • News
      Inflection point

      Gen AI is an Inflection Point Technology That’s Here to Stay: Forrester 

      Apple

      TDK of Japan to manufacture  Li-ion cells for iPhones in Haryana

      Infosys and spotlight

      Infosys Topaz Accelerates Customer Growth for Spotlight Retail Group in Digital Commerce

      DRDO apprenticeship

      DRDO offers Apprenticeship Opportunities at DIBER-DRDO

      WhatsApp

      WhatsApp Banned Nearly 7.5 Million Indian Accounts in October 2023

      Job Market

      How Students Can Prepare for the Current Job Market

      Trending Tags

      • election update
      • trump news
      • United Nations
      • whitelisting
    • Business Technologies
      semiconductors

      Global semiconductor industry anticipated for robust recovery with estimated growth of 13.1% in 2024

      Cloud Outages

      Cloud Outages – More than a Flat Tyre

      AWS

      From the Strip to the Sphere, AWS is getting there

      Drone

      Upcoming trends for the drone industry

      Cloud

      A Walk In the Clouds and Beyond—The Significance of Cloud Security

      Volt

      Why the edge matters?

      Trending Tags

      • Nintendo Switch Pro
      • ClickShare CSE-800
      • Mark Zuckerberg
      • Silicon Valley
      • internet
    • DQDeepTech
      Careers in Blockchain

      Explore Thriving Career Opportunities in Blockchain: Discover the Essential Skills

      Dr. Akhilesh Gupta

      Dr. Akhilesh Gupta unveils quantum leap in computing: Revolution in communication and security

      Python apps

      Must-Have Python Apps to Help With Ideal Tech Jobs

      Skills

      Essential Skills for Navigating the Uncharted Future

      quantum computing

      Strengthening the quantum computing ecosystem in India

      customer experience

      A “bettaverse” can deliver superior customer experience and more! 

    • Leadership Insights
      • Interview
      • Opinion
      • Editors Blog
      • Features
    • Annuals
      A long legacy

      A long legacy of engaging with CIOs

      Sandeep Dutta and Ajay Vij

      DQ Top 20 Rank 7- Rank 7 – Accenture India, Concerns over revised guidance

      Google

      DQ Top 20 Rank 20 – Google India Driving Growth through Advertising Space Reselling 

      Genpact

      DQ Top 20 Rank 19 – Genpact Transformation Happening Here? 

      Oracle

      DQ Top 20 Rank 17 – Oracle India Business Surges, spearheading Cloud Revolution across Sectors 

      Microsoft

      DQ Top 20 Rank 16 – Microsoft India Robust Outlook Amid Driven by Hybrid Work and Cloud Adoption 

      Trending Tags

      • Data Loss Prevention 2.0
      • Technology product Development
      • Internet access in developing countries
      • Unilever Ventures
    • DQ40Years
    • Events
      Hexaware

      Hexaware Technologies Expands UK Presence in Birmingham with New Facility

      Eventus Security

      Eventus Security Expands Global Presence with New Cyber Defence Centre in Ahmedabad

      Ransomware Is the Main Threat Report

      Ransomware Is the Main Threat: Report

      Sindhu Gangadharan

      Gen-AI will be transforming our world: Juergen Mueller, CTO, SAP SE

      SAP

      AI definitely does not make the developer jobs go away: SAP

      Juergen Mueller

      Generative AI is changing the way how developers work: Juergen Mueller, SAP

      Trending Tags

      • Revenue Analytics
      • fraud prevention
      • Seven Pillars of Digital India
    • Business Solutions
      Artificial Intelligence

      Revolutionizing Travel and Hospitality: The Unprecedented Impact of Artificial Intelligence

      AWS

      From the Strip to the Sphere, AWS is getting there

      Cyber

      The Cyber Shields of Tomorrow

      cybersecurity threats

      Cybersecurity in the Digital Age: How to Protect Your Business from Emerging Threats

      Video analytics

      Enhancing video quality for optimized analytics

      Insight EDA

      Siemens acquires Insight EDA to expand Calibre integrated circuit reliability verification offering

      Trending Tags

      • More
        • Tech4Growth
        • DQConclave Event Site
        • TechSchools Event Site
      No Result
      View All Result
      DATAQUEST
      No Result
      View All Result
      Home Business Technologies

      The role of email spam in 2023 for cybercrime

      DQINDIA OnlinebyDQINDIA Online
      January 2, 2023
      in Business Technologies
      0
      email spam

      email spam

      After a notable cyberattack in November disrupted routine operations, including appointments and registration, billing, patient care records, and lab reports, India’s leading medical institute nearly came to a complete halt. On the megahospital’s primary and backup systems, the attack corrupted files and data. Chinese hackers recently used two phishing emails to launch a cyberattack on the AIIMS systems. Out of 100 physical servers, five were infected, and more than 3 crore patient records, including those of prominent politicians, were compromised. Chinese online crooks requested approximately Rs 200 crore in cryptocurrencies. 

      Further, the word “spam” has its roots in a well-known Monty Python Flying Circus sketch in which the canned meat product Spam is repeatedly mentioned. However, the ascribed connotation is that of an unwanted item distributed in large volumes. Spam mail is an extension referring to email distributed in large volumes and often without the consent of the recipient. Sources of spam include humans or botnets (a collection of malware-infected machines under the control of an attacking bot herder). The objectives of spam can range from promotion and marketing to financial gain. Common spamming techniques include botnets, snowshoe spam, blank emails, and image spam. The common types of spam include commercial advertisements, antivirus warnings, spoof emails, sweepstakes or lottery winners, and money scams.

      According to various reports, spam emails account for more than 50% of all mail sent globally, with nearly 26.5% of those used for fraudulent financial gain. Spam mail has an impact that extends beyond mailbox sizes and includes losses for individuals and organizations. In H1 2022, business email compromise (BEC) attacks like payroll redirection and invoicing fraud affected 77% of organizations. The menace of email spam can be managed using a two-level approach that begins with end-user awareness and ends with server-level deployment of anti-spam tools, including anti-spam software. A systematic way to build a good cyber posture is to keep training users and updating anti-spam tools on a regular basis. This builds a good reputation for both the domain and the sender email addresses.

      1. Email Spam

      Most spam is sent with the intention of making money. They can be sent in bulk by networks of infected computers known as “botnets.” Spam is generally disliked by most people, but they accept it as an inevitable outcome of email communication. If spam isn’t constantly filtered and deleted, it can clog email inboxes, but it can also be harmful.

      Email spammers often modify their strategies and language to trick potential victims into downloading malware, divulging personal information, or making donations. Spam emails almost always have a commercial or financial motivation. Spammers try to promote and sell questionable products, make inflated promises, and deceive recipients into believing something is true.

      A well-known Monty Python Flying Circus sketch in which the canned meat product Spam is often mentioned gave rise to the term “spam.” It’s a common misconception that the term “spam” refers to “stupid, meaningless, irritating malware.”

      2. Motivates People to Send Spam Email

      Spam email is frequently sent for business purposes. Many companies still use spam, despite the fact that some people think it’s unethical. Businesses may continuously send out large numbers of emails since the cost per email is so low. Another possibility is the harmful attempt to enter your computer through spam email.

      3. Spam Email is Risky

      Email spam can be harmful. It might contain harmful links that can install malware on your computer. Delete links to spam. The urgency of dangerous spam emails can make you feel pressured to take action. Read on to discover some of the fundamental spam categories.

      4. Common Spamming Techniques

      Spammers employ a variety of methods to send spam, such as the following:

      • Botnets
      Command-and-control servers can be used by spammers to get email addresses and send spam through botnets.

      • Snowshoe spam
      In order to deliver spam to a large number of recipients, spammers employ a large number of Internet Protocol (IP) addresses and email accounts with a good reputation.

      • Blank email spam
      Sending an email with a blank subject line and message body is the method used here. By finding incorrect bounced addresses, it might be used in a directory harvest attack to validate email addresses. In emails that appear to be blank, Hypertext Markup Language (HTML) code that is occasionally used to propagate viruses and worms can be found there.

      • Image spam
      The email body contains a JPEG (Joint Photographic Experts Group) or GIF (Graphics Interchange Format) file that contains the message content, which is computer-generated and unreadable to human users. By using this technique, text-based spam filters attempt to be missed.

      5. Common Types of Spam

      • Commercial advertisements
      The CAN-SPAM act’s rules apply regardless of whether an email message is spam or a legal advertisement. When businesses obtain your email address as a free way to market to you, they frequently subscribe you to their newsletter by default. To opt in or out of receiving marketing emails, look for a checkbox whenever you fill out an online form. While some of these emails may be bothersome, the majority are innocuous, and by law, they must offer a clear unsubscribe or opt-out option. If you’ve unsubscribed but are still getting spam, change your email settings so that you don’t get messages from the sender’s address.

      • Antivirus warnings
      Ironically, spammers frequently use antivirus alerts as a technique. These emails inform you that your computer may be infected with a virus and provide a fix—often an antivirus scan—to eliminate the purported online danger. But if you fall for the trick and click the link, the hacker could get into your computer or download a file that does bad things. Do not click on a strange email link if you think your computer may be infected. To safeguard your endpoints, seek out reliable cybersecurity software solutions.

      • Email spoofing
      Why do phishing email schemes work so well? Because scam emails expertly imitate official business messaging to persuade you to take action. In a spoofing attack, a spammer chooses a firm brand that their target audience will recognise and trust, such as a bank or an employer, and then replicates its formatting and logos. Check the From line to ensure that the sender’s email address—not merely the

      alias—is valid before responding or clicking anything. If in doubt, get in touch with the business to make sure the email is legitimate.

      • Sweepstakes winners
      Spammers frequently send emails stating that the recipient has won a contest or prize. They might ask you to click a link or provide some personal information in exchange for your prize and push you to act swiftly. Don’t click on any links or reply with any personal information if you don’t know the contest or the email address sounds untrustworthy.

      • Money scams
      Sadly, spammers take advantage of people’s benevolence. Emails requesting assistance in urgent situations are a popular starting point for money scams. The spammer makes up a tale about requiring money for a horrible life event or a family emergency. Some con artists, like the perpetrators of the Nigerian prince hoax, want only your bank account details or a minor processing fee in exchange for money. Never transmit money or give out personal information without thinking first.

      6. Spam Email Statistics

      Nearly half of emails sent globally, according to Statista, are spam. And the US, China, and Russia are among the nations from which the majority of these spam emails originate. Read on to learn the most recent email spam statistics and how many spam emails are sent every day from various locations around the world.

      • Worldwide email spam statistics
      Find out how many spam emails are sent globally by taking a broad perspective. You must first be aware of how many emails are sent globally in order to know that, though. In H1 2022, nearly 319.6 billion emails per day are expected to be sent and received.

      •  45.37% of all emails in H1 2022 were classified as spam.
      • Spam volume peaked between 2021 and H1 2022, when 283 billion out of 336.41 billion emails were junk.
      • Out of 105.67 billion emails, there were about 88.88 billion spam emails sent globally in H1 2022.
      • The carbon footprint of one spam email is around 0.03g of CO2e. Thus, the quantity of spam emails sent in H1 2022 could have caused the release of around 4.5 tonnes of CO2e.

      Different types of spam emails
      Spam emails can contain ads, chain letters, phishing scams, hoaxes, money scams, malware warnings, adult content, etc.

      • Marketing and advertising emails are the most prevalent kinds of spam, making up around 36% of all spam emails.
      • About 31.7% of all spam is made up of emails with explicit content. This is the second most common type of spam.
      • As the third most prevalent kind of spam, financial-related emails account for around 26.5% of all spam emails.
      • 5% of spam emails contain fraud or schemes. Seventy-three percent of these are phishing emails.

      Email spam statistics

      • Email is used in about 96% of phishing attacks.
      • In H1 2022, business email compromise (BEC) attacks affected 77% of organisations.
      • Attacks like supplier invoicing fraud and payroll redirection are examples of BEC.
      • In H1 2022, the average price of a BEC exploit was $5.96 million.
      • In H1 2022, 83% of businesses experienced successful email-based phishing attacks.
      • 39% of people reported getting at least one questionable email attachment.
      • 15% of people reported receiving an email from someone posing as their company.

      • Spam emails percentage

      •  With an estimated 8.61 billion spam emails sent annually, the United States of America leads the world.
      • China is in second place, with 8.53 billion spam emails sent, is China. In third position, with 8.09billion spam emails, is Russia.
      • Brazil ranks fourth with 8.03 billion spam emails sent.
      • India ranks fifth with 7.97 trillion spam emails sent.
      • With 7.9 billion spam emails, Germany is sixth.
      • The Czech Republic ranks eighth with 7.83 billion spam emails sent, just behind Germany.
      • Poland, Bulgaria, and the UK take the final three spots, sending 7.77,7.73, and 7.71 billion emails, respectively.

      7. How do You Stop Spam Email?

      Because it can come from botnets, spam email can be challenging to stop. Botnets are collections of infected computer systems. As a result, it may be challenging to identify and stop the initial spammer. Mark any messages you get that seem suspiciously like spam in your email programme, such as those from senders you don’t know. Don’t open any links or files that are attached, not even the ones that say “opt-out” or “unsubscribe.” These links could take you to dangerous websites or downloads, or spammers could put them there to make sure your email address is real.

      Users can reduce their vulnerability to spam emails via the following:

      • Reporting, preventing, and deleting any messages that appear suspicious in their inboxes, such asspam.
      • For local email clients, add an anti-spam filter from a third party.
      • Modifying the filter to prevent messages containing specific terms or phrases that are frequentlyused in spam emails from being delivered.
      • Creating a list of domains, IP addresses, and email addresses that the user trusts and wishes toreceive email from.
      • Using a temporary email address or a fake email address online, such as on forums.
      • Never open attachments or links in emails from senders you don’t recognise.

       Legitimate senders can stop their emails from being mistaken as spam by doing the following:

      • Keeping their sender’s reputation in good shape;
      • Using authentication systems like Sender Policy Framework and Domain Keys Identified Mail
      • Getting rid of words that can cause anti-spam filters to mark the email as spam;Creating useful and user-friendly information and enhancing email delivery with appealing subjectlines;
      • Utilizing a trustworthy bulk email service;
      • Asking users to opt in can help to ensure that they are interested and less likely to mark the emailas spam.
      • Using a reliable bulk email service.

      8. We can Use Anti-Spam Software

      Software known as “anti-spam” seeks to identify and prevent potentially harmful email from user inboxes. Spam is often an unwanted message that you didn’t ask for, and it’s also often an ad for a product that may be harmful or real, but is still unwanted.

      9. Anti-Spam Software Working

      Filters used by anti-spam software restrict access to user inboxes to known and authorised email addresses only. If anti-spam software marks a legitimate email as spam by mistake, it usually lets you look at emails that have been marked as spam.

      10. Importance of an Anti-Spam Software

      • Email inboxes are”decluttered” by anti-spam software, which removes time-wasting and annoying emails.
      • Anti-spam software aids in preventing fraudulent emails that deceive recipients into disclosing private information.
      • Anti-spam software helps keep viruses, malware, and ransomware from getting into the computer networks of a business.

      11. Features of Anti-Spam Software

      • 0.0001%falsepositives,itprevents99%ofspamfromenteringanorganization’snetworksystem.
      • With a 100% availability SLA, we block 100% of malware attacks.
      • Clear out your inboxes by using graymail products that are simple to file, including mailing listsand newsletters.
      • It provides users with the resources they require to maintain their own lists of permitted and blocked senders. As a result, tech support will become less necessary.
      • Allow administrators to manage anti-spam software policies centrally and precisely.

      12. Popular Anti-Spam Techniques

      • ➢  Spam email addresses that have been designated by the user.
      • ➢  Automatic spam detection by users or admins
      • ➢  Researchers and law enforcement personnel can recognise spam.

      13. Conclusion

      Spam is unwanted and undesirable junk email that is occasionally sent in large volumes to a large recipient list. Sending undesirable email to a large list of subscribers in bulk is known as “email spam,” sometimes referred to as “trash email.” Spam can be sent by real people, but more often than not it is sent by a botnet, which is a group of computers that have been infected with malware and are controlled by one attacking party (the bot herder). Spam can also be distributed through social media platforms, text messaging, and email. In this article, we are discussing email spam from the perspective of common users. Further, maintaining current with email security advances is crucial for your company in this situation. More than 440 million emails containing phishing scams and malware were found in H1 2022, according to several studies, proving that cybercriminals are still as active and driven as ever. We explain this in this article to assist you in improving your cybersecurity posture.

      The article has been written by

      Dr. Rajeev Kumar is Assistant Professor, Centre for Innovation & Technology, Administrative Staff College of India (ASCI), Hyderabad, and also, he is cyber security practitioner.

      Prof. Valli Manickam is Professor and Director, Center for Innovation and Technology, ASCI, and is also currently Dean of Training Programs (Short and Long Duration).

      Katyayani Palaparty is an IT manager at the ASCI.

      Previous Post

      Unemployment Rate in India Reached a 16-month High of 8.3%: Is Inflation the Cause?

      Next Post

      Netflix Password Sharing Could Be Prohibited from 2023

      Related Posts

      semiconductors
      Business Technologies

      Global semiconductor industry anticipated for robust recovery with estimated growth of 13.1% in 2024

      December 5, 2023
      Cloud Outages
      Business Technologies

      Cloud Outages – More than a Flat Tyre

      November 30, 2023
      AWS
      Business Solutions

      From the Strip to the Sphere, AWS is getting there

      November 29, 2023
      Drone
      Business Technologies

      Upcoming trends for the drone industry

      November 28, 2023
      Cloud
      Business Technologies

      A Walk In the Clouds and Beyond—The Significance of Cloud Security

      November 27, 2023
      Volt
      Business Technologies

      Why the edge matters?

      November 17, 2023
      Next Post
      Netflix

      Netflix Password Sharing Could Be Prohibited from 2023

      Digital Personal Data Protection Bill

      Digital Personal Data Protection Bill is industry-friendly: IAMAI

      Online Gaming

      Digital security in online gaming

      Leave a Reply Cancel reply

      Your email address will not be published. Required fields are marked *

      • Trending
      • Comments
      • Latest
      Hybrid Cloud

      Run complex workloads with ease: Switch to Lenovo Hybrid Cloud solutions

      August 18, 2023
      IIT Madras

      IIT Madras Invites Applications for Two Year Artificial Intelligence Fellowship with Stipend of Rs 40,000

      August 18, 2023
      DRDO

      DRDO CEPTAM 2022 Notification: 1901 New Vacancies Announced, Salary up to Rs 1,12,400

      August 26, 2022
      WhatsApp no valid QR code

      Here’s How to Activate a Banned WhatsApp Number

      January 14, 2020
      WhatsApp no valid QR code

      Here’s How to Activate a Banned WhatsApp Number

      1652
      Exams in India

      CBSE Board Exams 2021: Students Request Indian Government to Cancel Board Exams Due to Rising COVID-19 Cases

      893
      Delhi Schools

      CBSE Board Exams 2021: Do Not Postpone or Cancel Board Exams, Say Section of Students

      577
      Online courses

      AWS Announces Free 12-week Course on Cloud Computing for Unemployed People Interested in Cloud Careers

      510
      Inflection point

      Gen AI is an Inflection Point Technology That’s Here to Stay: Forrester 

      December 5, 2023
      semiconductors

      Global semiconductor industry anticipated for robust recovery with estimated growth of 13.1% in 2024

      December 5, 2023
      Gemini

      Google’s AI Chatbot Gemini Faces Delay in Launch Due to Failure in Non-English Queries

      December 5, 2023
      Careers in Blockchain

      Explore Thriving Career Opportunities in Blockchain: Discover the Essential Skills

      December 5, 2023
      Inflection point
      News

      Gen AI is an Inflection Point Technology That’s Here to Stay: Forrester 

      Global market research company Forrester revealed in an event held in New Delhi that Gen AI is an inflection point ...

      December 5, 2023
      semiconductors
      Business Technologies

      Global semiconductor industry anticipated for robust recovery with estimated growth of 13.1% in 2024

      World Semiconductor Trade Statistics (WSTS) recently published its latest forecast for the semiconductor market, generated in November 2023. Exceeding the ...

      December 5, 2023
      Gemini
      Uncategorized

      Google’s AI Chatbot Gemini Faces Delay in Launch Due to Failure in Non-English Queries

      Google’s highly anticipated large language model (LLM) Gemini has faced a delay in its launch due to its failure to ...

      December 5, 2023
      Careers in Blockchain
      DQDeepTech

      Explore Thriving Career Opportunities in Blockchain: Discover the Essential Skills

      There is a tremendous need for qualified professionals in the Blockchain area, yet such individuals still need to be made ...

      December 5, 2023
      IT
      Interview

      Flexiple sources talent, evaluates, and gives handpicked matches for each role: Karthik Sridharan

      Flexiple is an exclusive community of full-time self-employed professionals. They assist top-tier independent professionals to work with scaling startups across ...

      December 5, 2023

      Industry Insights

      Generative AI

      AI and sustainability driving changes in technology adoption and talent development in Asia Pacific and Japan in 2024

      December 4, 2023
      Theres a rat under the hood

      There’s a rat under the hood

      December 2, 2023
      ChatGPT

      ChatGPT beyond borders: A closer look into the balance of the AI tool

      December 1, 2023
      IT jobs

      2024 to be a progressive year for IT job seekers

      December 1, 2023
      Load More
      DATAQUEST

      Launched in 1982 as India’s first IT print publication, Dataquest is known as the “Bible of Indian IT.”
      Features business technologies, enterprise tech, cloud, hybrid multi-cloud, data management, security, IT Infrastructure, emerging technologies, analysis of market trends, a new development in the IT industry and needs of corporate users, Jobs, Deep Tech, interviews of CEOs / CIO's / MDs, and Annual surveys.

      Category Links

      • Annuals
      • Business Solutions
      • Business Technologies
      • DQDeepTech
      • Editors Blog
      • Events
      • Features
      • Interview
      • Module
      • News
      • Opinion

      Newsletter

      Subscribe to our mailing list to receives daily updates direct to your inbox!

      *Invalid email address.
      • About
      • Advertise
      • Privacy & Policy
      • Contact Us
      • PCQuest
      • DataQuest
      • Voice&Data
      • CIOL
      • DQ Channels

      © Copyright © 2023 Cyber Media (India) Ltd. All rights reserved.
      Reproduction in whole or in part in any form or medium without written permission is prohibited.

      No Result
      View All Result
      • Home
      • News
      • Business Technologies
      • DQDeepTech
      • Leadership Insights
        • Interview
        • Opinion
        • Editors Blog
        • Features
      • Annuals
      • DQ40Years
      • Events
      • Business Solutions
      • More
        • Tech4Growth
        • DQConclave Event Site
        • TechSchools Event Site

      © Copyright © 2023 Cyber Media (India) Ltd. All rights reserved.
      Reproduction in whole or in part in any form or medium without written permission is prohibited.