Categories STO_news

SafeTeensOnline is finalist at global Impact Challenge

Vineeth Veeramachaneni’s , a delegate at the 22nd session of The Youth Assembly, reached the final round of the UN Youth Assembly’s Impact Challenge. The Challenge is open for proposals from over hundred countries looks for social impact projects seeking sustainable solutions to social, economic, and environmental challenges. The 2018 Assembly was held August 10-13 in New York City.

The Youth Assembly was created in 2002 to amplify youth engagement and participation in international dialogues at the United Nations. It fosters mutual understanding and collaboration between youth and key stakeholders in global development to support the United Nations’ Sustainable Development Goals. More than 1,000 delegates from over hundred countries attended this year.

After several rounds of application and interviews 10 finalists were selected. Vineeth presented his SafeTeensOnline project at NYU . “I just wanted to add that I am really humbled by the opportunity to present my pitch at NYU Law School in front of distinguished judges. I am really thankful to my co-finalists from India, Nepal, Brazil, Sierra Leone, South Africa, Colombia, and Canada; We had great time supporting each other and learning about our cultures and communities.” Veeramachaneni, said

Categories STO_news

Mobile Phishing and Social Engineering

Even we lock down our devices, establish network security and encrypt our e-mails we are still vulnerable to Phishing and Social engineering attacks. Recently there is news about Phishing and Social Engineering vulnerabilities with latest Justice departments Indictments related to DNC hacks.

In our “Think before your click” How to video our ambassador Sahas Gelli talks about Social engineering. In the context of information security, Social engineering refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional “con” in that it is often one of many steps in a more complex fraud scheme.