Sudheer Kabeer – Unprofessional Behavior

This is an example of the unprofessional behavior I experienced from Mr. Sudheer Kabeer, who describes himself as “an extremely competent IT professional, Hypnotist, and Mentalist” on his WhatsApp profile.

It all started when I suddenly began receiving continuous WhatsApp messages from him. Since I don’t knowingly share my phone number publicly to avoid spam and misuse, I asked him how he got my number so I could be more cautious. Instead of answering, he ignored my question and kept spamming me with self-promotional messages. When I repeatedly asked how he got my number, instead of answering, he asked for my name. This made me wonder if he was sending unsolicited advertisements without even knowing who he was messaging. He then started mocking my genuine concern about how he obtained my contact details.

Upon checking further, I found that he works in IT and runs a YouTube channel (https://www.youtube.com/@IamSudheerKabeer) with a significant number of subscribers. It was surprising to see someone in his position act so unprofessionally. It turned out that he stole my number from a group I had joined and was using it for advertising purposes without consent. Just as he stole my number, it’s possible he also took other people’s numbers from WhatsApp groups without permission and used them for illicit business or marketing purposes. This is a clear violation of your privacy and could be considered misuse of your personal information.

Full message conversation can be viewed in the below video

If you receive unsolicited messages from unknown contacts, especially for promotional purposes, it’s important to protect your privacy. Avoid sharing your phone number publicly and always be cautious about who you share it with. If someone messages you unexpectedly, ask how they obtained your number; a genuine professional will provide a clear response. If the person continues spamming or fails to answer your questions, block and report them. Additionally, be aware of privacy laws in your region that protect against unauthorized use of your contact information. If the misuse continues, especially for commercial purposes without your consent, you could file a complaint under data protection laws or cybercrime laws. Stay vigilant and share your experiences to help others avoid similar situations.

If you perform activities like this, it is important that you understand the legal implications outlined below:

IT Act, 2000:
Section 66C: Identity theft, including using someone else’s information without consent.
ection 43 — Unauthorized Access and Data Theft, including accesses, extracts, or misuses data (such as phone numbers) without authorization, they may be liable to pay compensation up to ₹5 crore to the affected person.

Bharatiya Nyaya Sanhita (BNS), 2023:
Section 302: Punishment for theft, applicable in cases involving unauthorized access and extraction of data.
Section 354: Addresses acts intended to insult the modesty of a person, particularly applicable if the communication is harassing or inappropriate.
Section 354E (Stalking): Sending repeated messages without consent can be considered stalking, punishable with imprisonment or a fine.

TCCCPR, 2018:
Sending unsolicited commercial communications (spam) without consent is illegal, and penalties can be imposed on the sender.

Violation of Privacy (Article 21 of the Indian Constitution)
Collecting personal data (like phone numbers) without consent breaches this right.

WhatsApp’s Terms of Service
Violates WhatsApp’s terms and policies, which could lead to account suspension or banning.

Article Written by:
Gem


Report any policy violation at contact@techipick.com


Blurring the Line Between Real and Digital Worlds with Augmented Reality (AR) and Virtual Reality (VR)

Category : Technology

Augmented Reality (AR) and Virtual Reality (VR) are two of the most rapidly evolving and exciting technologies in the digital world. These technologies have the potential to transform the way we interact with and experience the world around us. This blog post aims to explore the fundamental differences and similarities between AR and VR, and how they have the potential to change the way we live, work, and play.

What is Augmented Reality?

Augmented Reality is a technology that enhances or augments the real world by superimposing digital content. This technology is typically accessed through mobile devices such as smartphones or tablets, or through dedicated AR glasses. AR applications can range from fun and playful applications such as Snapchat and Instagram filters, to more practical uses such as providing users with additional information about their surroundings or enabling customers to try on clothes in a retail environment.

What is Virtual Reality?

Virtual Reality, on the other hand, creates a completely immersive and virtual environment that shuts out the real world. VR is commonly accessed through a headset that covers the user’s eyes and ears, blocking out all external stimuli. VR applications can range from gaming and entertainment to training simulations for professionals in various fields such as medicine, aviation, and engineering.

The Differences Between AR and VR

The primary difference between AR and VR is that AR enhances the real world, while VR replaces it. Additionally, AR is typically accessed through mobile devices, while VR requires a headset. The hardware requirements for VR are typically more demanding than those for AR as VR requires high-resolution displays and powerful processing capabilities to create a realistic environment.

The Similarities Between AR and VR

Despite their differences, both AR and VR share a common goal of creating more immersive and engaging experiences for users. Both technologies are still in the early stages of development, and we can expect to see new applications and use cases emerge as the technology continues to evolve.

Conclusion

AR and VR are two rapidly evolving technologies that have the potential to transform the way we interact with and experience the world around us. While they have some key differences, both AR and VR have the common goal of creating more immersive and engaging experiences for users. As technology continues to evolve, we can expect to see even more exciting and innovative uses for AR and VR in various fields such as entertainment, education, and healthcare.


AI and ML in Cybersecurity: How to Harness the Power of Technology for Better Protection

Tags :

Category : AI Technology

As technology continues to advance, so does the threat of cyber attacks. Artificial intelligence (AI) and machine learning (ML) have the potential to revolutionize cybersecurity by providing new ways to detect and respond to threats. In this blog post, we’ll explore some of the key ways AI and ML are being used in cybersecurity, and discuss best practices for harnessing their power to improve protection.

Detection and Response

  • AI and ML can be used to analyze large amounts of data in real-time, making it possible to detect and respond to threats that would have been missed by traditional security systems.
  • Advanced algorithms can be used to identify patterns and anomalies in network traffic, making it possible to detect intrusions and other malicious activity.
  • Machine learning models can be trained on historical data to detect anomalies and predict future threats.
  • Some AI-based systems can also be configured to automatically respond to threats, such as by blocking malicious traffic or quarantining infected devices.

Threat Intelligence

  • AI and ML can be used to gather and analyze threat intelligence, providing organizations with insight into the latest threats and vulnerabilities.
  • Machine learning models can be trained to identify and classify new malware, making it possible to detect previously unknown threats.
  • AI-based systems can also be used to analyze social media and other online sources to identify potential threats and vulnerabilities.

Automation

  • AI and ML can automate repetitive tasks, such as monitoring and analyzing network traffic, freeing up cybersecurity professionals to focus on more strategic tasks.
  • Automated systems can also be used to respond to threats in real-time, reducing the time it takes to contain and mitigate a breach.
  • Machine learning models can also be used to automate the process of prioritizing and triaging security alerts, reducing the number of false positives and allowing organizations to focus on the most critical threats.

Best Practices

  • It’s important to have a clear understanding of the capabilities and limitations of AI and ML-based systems to ensure they’re used effectively.
  • It’s also important to regularly update and maintain these systems to ensure they’re operating at peak performance.
  • It’s important to monitor the output of AI and ML-based systems to ensure they’re not generating false positives or false negatives.
  • It’s important to continuously train the machine learning models to ensure they are up-to-date with the latest threats and vulnerabilities.
  • It’s important to implement a robust security infrastructure to protect AI and ML systems from attacks.

The AI and ML have the potential to revolutionize cybersecurity by providing new ways to detect and respond to threats. However, organizations must approach these technologies with a clear understanding of their capabilities and limitations, and implement best practices to ensure they are used effectively. By harnessing the power of AI and ML, organizations can improve their ability to detect and respond to threats, and ultimately enhance their overall security posture.