Google

Get Paid

Monday, June 7, 2010

OXIS International

OXIS International, Inc. is engaged in the research, development and
sale of products that counteract the harmful effects of “oxidative
stress.”





Oxidative stress refers to the situations in which the body’s
antioxidant and other defensive abilities to combat free radicals (a.k.a
highly reactive species of oxygen and nitrogen) are overwhelmed and
one’s normal healthy balance is either lost or severely compromised.

There products include therapeutic nutraceutical products,
cosmeceutical products and proprietary formulations and clinical
products

that are developed internally and/or out-licensed to biotech and
pharmaceutical companies as drug candidates.

They focus on naturally occurring protective substances since they are
more likely to be both safe and efficacious. Our primary products
incorporate and emphasize the multifaceted “super antioxidant” compound,
L-­Ergothioneine (“ERGO”), as a key component. We own several patents
and pending applications related to ERGO that cover current and planned
products relevant to our nutraceutical and cosmecuetical businesses. Our
patents and patent applications address ERGO’s protective effects and
activities and the ERGO manufacturing process.


Saturday, April 3, 2010

Post Conference points - National Security and Digital Technology, New Delhi, 2010

Maninder, an Internet Psychologist based in Delhi recently attended a
cyber law related seminar organised by IAMAI at India Habitat Center in
Delhi on 24th March 2010 and noted the following points:–
1.  India has to get active in the areas of System Software Development
and DSP Chips.
2. More Training required. (You can check www.cipfo.org)

Saturday, March 27, 2010

Today's Technologies - Tomorrow's Solutions

N-Viro International Corporation
(Symbol: NVIC) utilizes patented technologies to
stabilize and disinfect municipal bio solids and other organic waste
products
. These technologies safely and efficiently transform waste
streams into beneficial reuse products.


The N-Viro technologies involve the mixing of
municipal bio solids with specific alkaline waste products from the coal
combustion electric generation, cement and lime industries. This
process stabilizes organic waste thru pasteurization and complete
disinfection.


Historically, N-Viro has operated an N-Viro Soil
processing facility under contract with the City of Toledo. Our
technology has been licensed through-out the United States and
internationally with overwhelming success. Recently N-Viro acquired the
Volusia County facility located in Daytona, Florida. Our Florida
N-Viro facility processes municipal bio solids into N-Viro Soil from
many municipalities in the central Florida area.


Our suite of green technologies
complement each other and build upon a unique concept transforming
waste products into a beneficial fertilizer or ultimately creating
N-Viro Fuel a renewable alternative fuel perfectly synergistic with the
coal combustion industry.


The N-Viro Fuel technology was recently tested on a
full-scale basis at
the Michigan State University coal-fired power plant. Two different
fuels,
one made from biosolids and the other from manure, were blended with
eastern
Ohio coal and burned in the power plant’s fluidized bed boiler. The
blended
fuels performed well compared to coal alone; air emissions were below
regulatory limits, and the boiler performed normally.


The company and management expect to develop the
N-Viro Fuel technology with other power facilities within the United
States and anticipates international acceptance for the N-Viro Fuel
technology.

Friday, March 26, 2010

Social Networking Sites and The UK Military

The UK military should learn from the Israeli armed forces and use
social networking sites such as Twitter to win public opinion, says the
head of the Royal Air Force.
According the Head, the exponential growth in the availability of
information means that we must understand how to deliver and protect our
national interests in the

Germany and Citizen Rights

Germany’s highest court recently overturned a law that let anti-terror
authorities retain data on phone calls and e-mails, saying it posed a
“grave intrusion” to personal privacy rights.
The Karlsruhe-based Federal Constitutional Court ruled that the law
violated Germans’ constitutional right to private correspondence.
If you have any query or you require consultation relating to technology
and

Privacy Policy Social Networking Sites

Social networking site Facebook outlined changes to its privacy policy
recently and is now asking for feedback from its strong user base on the
changes. The company wrote in an official blog post that members will
have until November 5 to send in their comments about the proposed
changes. According to a Canadian report Facebook was violating

Monday, November 9, 2009

Privacy Policy Social Networking Sites

Social networking site Facebook outlined changes to its privacy policy recently and is now asking for feedback from its strong user base on the changes. The company wrote in an official blog post that members will have until November 5 to send in their comments about the proposed changes. According to a Canadian report Facebook was violating

Thursday, April 9, 2009

Social Networking Sites versus Porn Adult Websites

Social Networking Sites versus Porn Adult Websites According to a study, traffic to social networking sites in the UK overtook adult websites for the first time in October 2008 and has remained ahead ever since. Adult sites are more popular with men, but almost 55% of visitors to the Social Networks and Forums category are female.


Thursday, December 25, 2008

Workshop on Crimeware and Financial Frauds, Delhi, India

Indian Computer Emergency Response Team organised a Workshop on
Crimeware and Financial Frauds on5th November, 2008 at CERT-In Training
Room, CERT-InDepartment of Information TechnologyElectronics Niketan,
6, CGO Complex, New Delhi
Following was the Agenda:
Crimeware Trends
Internet Banking - Frauds & Defenses
E-Commerce, Frauds and Challenges
Crimeware Threats and Countermeasures
Maninder of Team Cybersmart.in was present and noted the following
points

Tuesday, August 5, 2008

IT Services accessed by Rural poor

Over 10,000 Common Service Centres set up in villages
Over
10,300 Common Service Centre (CSC) have been set up in eight States to
provide the rural population in remote areas with a mix of government,
private and social sector services. The services which are the
initiatives of the Department of Information Technology are both IT
based and non-IT based. The states are Jharkhand, Haryana, West Bengal,
Bihar, Tripura, Gujarat, Tamil Nadu and Madhya Pradesh. The Centres
have come up as part of the Government’s plan to establish one lakh
Common Service Centres (CSCs) in six lakh villages in the country. The
establishment of most of the Centres is likely to be completed by next
year. The Scheme has been approved at a total cost of Rs 5742 Cr. over
4 years, of which the Government of India is to contribute Rs 856 Cr.
and the State Governments Rs 793 Cr. The balance resources would be
mobilized from the private sector. The Common Service Centres are
ICT-enabled Kiosks having a PC along with basic support equipment like
Printer, Scanner, UPS, with Wireless Connectivity as the backbone and
additional equipment for edutainment, telemedicine, projection systems,
etc. The contracts for setting up of the Centres are given through a
bidding process by the respective state governments. It takes about
twelve months for execution of the contract. The Scheme is being
implemented through a Public Private Partnership. CSCs constitute one
of the three pillars of the National e-Governance Plan for enabling
anytime anywhere delivery of government services, the other two being
(a) the State Wide Area Network (for Connectivity) which has already
been approved by the Government for Rs 3334 Cr. and b) the State Data
Centre Scheme (for secure hosting of data and applications) for which
implementation committees have been formed in several states.
Department of Information Technology (DIT) has appointed a National
Level Service Agency (NLSA), to coordinate the entire activity.

Mumbai Police log in to search criminals

People go on social networking sites to find old
friends and to make new ones. But Mumbai Police goes to these very
sites to hunt for criminals, not just those involved in online fraud or
phishing but cold-blooded murderers, kidnappers and rapists.Several
recent instances of crimes, where criminals have left trails on the
internet, in chat rooms, social networks has made the virtual world a
forum the Crime Branch is passionately exploring. Victims and those
accused of crimes committed in the real world often leave their
footprints in cyberspace. Like a recent rape case in Central Mumbai led
the cyber crime sleuth to establish the identity of the accused by a
video of the crime he posted online.No crime is perfect and the Mumbai
Police are now looking at newer ways to prove this. Deven Bharti,
Additional Commissioner of Police (Crime) said, ''The cyber space
offers a great degree of anonymity to the criminals. So people put
anything online. We are increasingly looking at cyber space for the pug
marks of people accused of serious crimes to get clues for its
detection. We have solved some cases this way like the Adnan Patrawala
case.''The case in question is that of a 16 year old, Adnan Patrawala
who was kidnapped in August 2007. Investigations led the Mumbai police
to his homepage on orkut to hunt for clues to his kidnappers. One of
the kidnappers was his friend on Orkut.In May 2007, a young software
professional Kaushambi Layek was murdered in a hotel room. Clues from
Layek's orkut pages led the police to Manish Thakur's homepage. What
intrigued the investigators was that Layek was Manish's only friend on
Orkut, a strange thing to happen given that a member can have as many
friends as they like. Today, Thakur is cooling his heels in jail.The
sucess of such cases has led the Mumbai police to create Maharashtra's
first cyber police station. ''The work will begin soon the police will
now have more manpower and expertise. Cyber officers will register
cases at the police station and detect them,'' said Deven Bharati.It's
a thin line that divides the real world and the virtual world and
plugging into both can mean nailing potential killers.

http://www.ndtv. com/convergence/ ndtv/story. aspx?id=NEWEN200 80057323&ch=7/16/2008% 2010:38:00% 20AM

China mounts Cyber Attacks against India

China’s cyber warfare army is marching on, and India is suffering
silently. China had mounted almost daily attacks on Indian computer
networks, both government and private, showing its intent and
capability.
The sustained assault almost coincides with the history
of the present political disquiet between the two countries. According
to senior government officials, these attacks are not isolated
incidents of something so generic or basic as "hacking" — they are far
more sophisticated and complete — and there is a method behind the
madness.
Publicly, senior government officials, when questioned,
take refuge under the argument that "hacking" is a routine activity and
happens from many areas around the world. But privately, they
acknowledge that the cyber warfare threat from China is more real than
from other countries.
The core of the assault is that the Chinese
are constantly scanning and mapping India’s official networks. This
gives them a very good idea of not only the content but also of how to
disable the networks or distract them during a conflict.
This, officials say, is China’s way of gaining "an asymmetrical advantage" over a potential adversary.

The big attacks that were sourced to China over the last few months
included an attack on NIC (National Infomatics Centre), which was aimed
at the National Security Council, and on the MEA.
Other government
networks, said sources, are routinely targeted though they haven’t been
disabled. A quiet effort is under way to set up defence mechanisms, but
cyber warfare is yet to become a big component of India’s security
doctrine. Dedicated teams of officials — all underpaid, of course — are
involved in a daily deflection of attacks. But the real gap is that a
retaliatory offensive system is yet to be created.
And it’s not difficult, said sources. Chinese networks are very porous — and India is an acknowledged IT giant!

There are three main weapons in use against Indian networks — BOTS, key
loggers and mapping of networks. According to sources in the
government, Chinese hackers are acknowledged experts in setting up
BOTS. A BOT is a parasite program embedded in a network, which hijacks
the network and makes other computers act according to its wishes,
which, in turn, are controlled by "external" forces.
The controlled
computers are known as "zombies" in the colourful language of cyber
security, and are a key aspect in cyber warfare. According to official
sources, there are close to 50,000 BOTS in India at present — and these
are "operational" figures.
What is the danger? Simply put, the
danger is that at the appointed time, these "external" controllers of
BOTNETS will command the networks, through the zombies, to move them at
will.
Exactly a year ago, Indian computer security experts got a
glimpse of what could happen when a targeted attack against Estonia
shut that country down — it was done by one million computers from
different parts of the world — and many of them were from India! That,
officials said, was executed by cyber terrorists from Russia, who are
deemed to be more deadlier.
The point that officials are making is
that there are internal networks in India that are controlled from
outside — a sort of cyberspace fifth column. Hence, the need for a more
aggressive strategy.

How to Protect Your Computer

The same advice parents might deliver to young drivers on their first
solo journey applies to everyone who wants to navigate safely online. A
special agent in our Cyber Division offered the following:
- "Don't drive in bad neighborhoods."
- "If you don't lock your car, it's vulnerable; if you don't secure
your computer, it's vulnerable."- "Reduce your vulnerability and you
reduce the threat."
Below are some key steps to protecting your computer from intrusion:
- Keep Your Firewall Turned On:
A firewall helps protect your computer from hackers who might try to
gain access to crash it, delete information, or even steal passwords or
other sensitive information. Software firewalls are widely recommended
for single computers. The software is prepackaged on some operating
systems or can be purchased for individual computers. For multiple
networked computers, hardware routers typically provide firewall
protection.
- Install or Update Your Antivirus Software:
Antivirus software is designed to prevent malicious software programs
from embedding on your computer. If it detects malicious code, like a
virus or a worm, it works to disarm or remove it. Viruses can infect
computers without users' knowledge. Most types of antivirus software
can be set up to update automatically.
- Install or Update Your Antispyware Technology:
Spyware is just what it sounds like—software that is surreptitiously
installed on your computer to let others peer into your activities on
the computer. Some spyware collects information about you without your
consent or produces unwanted pop-up ads on your web browser. Some
operating systems offer free spyware protection, and inexpensive
software is readily available for download on the Internet or at your
local computer store. Be wary of ads on the Internet offering
downloadable antispyware—in some cases these products may be fake and
may actually contain spyware or other malicious code. It's like buying
groceries—shop where you trust.
- Keep Your Operating System Up to Date:
Computer operating systems are periodically updated to stay in tune
with technology requirements and to fix security holes. Be sure to
install the updates to ensure your computer has the latest protection.
- Be Careful What You Download:
Carelessly downloading e-mail attachments can circumvent even the most
vigilant anti-virus software. Never open an e-mail attachment from
someone you don't know, and be wary of forwarded attachments from
people you do know. They may have unwittingly advanced malicious code.
- Turn Off Your Computer:
With the growth of high-speed Internet connections, many opt to leave
their computers on and ready for action. The downside is that being
"always on" renders computers more susceptible. Beyond firewall
protection, which is designed to fend off unwanted attacks, turning the
computer off effectively severs an attacker's connection—be it spyware
or a botnet that employs your computer's resources to reach out to
other unwitting users.

CYBER CRIMES DURING 2006 IN INDIA

Cyber Crimes are a new class of crimes to India rapidly expanding due
to extensive use of Internet and I.T. The Information Technology (IT)
Act, 2000, specifies the acts made punishable. Since the primary
objective of this Act is to create an enabling environment for
commercial use of I.T., certain omissions and commissions of criminals
while using computers have not been included. Several offences having
bearing on cyber-arena are also registered under the appropriate
sections of the IPC with the legal recognition of Electronic Records
and the amendments made in several sections of the IPC vide the IT Act,
2000.

142 cases were registered under IT Act during the year
2006 as compared to 179 cases during the previous year thereby
reporting a decrease of 20.7 percent in 2006 over 2005. 24.6 percent
cases (35 out of 142 cases) were reported from Maharashtra followed by
Karnataka (27), Andhra Pradesh (14) and Kerala and Punjab (12 each).

48.6
percent (69 cases) of the total 142 cases registered under IT Act 2000
were related to Obscene Publication / Transmission in electronic form,
normally known as cyber pornography. 81 persons were arrested for
committing such offences during 2006. There were 59 cases of Hacking of
computer systems during the year wherein 63 persons were arrested. Out
of the total (59) Hacking cases, the cases relating to Loss/Damage of
computer resource/utility under Sec 66(1) of the IT Act were 42.4
percent (25 cases) whereas the cases related to Hacking under Section
66(2) of IT Act were 57.6 percent (34 cases).

Maharashtra (11)
and Tamilnadu (7) registered maximum cases under Sec 66(1) of the IT
Act out of total 25 such cases at the National level. Out of the total
34 cases relating to Hacking under Sec. 66(2), most of the cases (20
cases) were reported from Karnataka followed by Andhra Pradesh and
Maharashtra (3 each).

64.3 percent of the 154 persons arrested
in cases relating to IT Act, 2000 were from Maharashtra (66), Karnataka
(17) and Punjab (16) alone. The age-wise profile of persons arrested in
Cyber Crime cases under IT Act, 2000 showed that 70.8 percent of the
offenders were in the age group 18 – 30 years (109 out of 154) and 25.3
percent of the offenders were in the age group 30- 45 years (39 out of
154). Gujarat and Maharashtra reported one offender each whose age was
below 18 years.

Crime head-wise and age-group wise profile of
the offenders arrested under IT Act, 2000 revealed that 52.6 percent
(81 out of 154) of the offenders were arrested under ‘Obscene
publication/transmission in electronic form’ of which 79.0 percent (64
out of 81) were in the age-group 18 –30 years. More than 65 percent (41
out of 63) of the total persons arrested for 'Hacking Computer Systems'
were in the age-group of 18-30 years.

Cyber Crimes – Cases of Various Categories under IPC Section
A
total of 311 cases were registered under IPC Sections during the year
2006 as compared to 302 such cases during 2005 thereby reporting a
marginal increase of 3 percent. Madhya Pradesh reported maximum number
of such cases, nearly 40.5 percent of total cases (126 out of 311)
followed by Andhra Pradesh 32.8 percent (102 cases). Majority of the
crimes out of total 311 cases registered under IPC fall under 2
categories viz. Forgery (160) and Criminal Breach of Trust or Fraud
(90). Though, these offences fall under the traditional IPC crimes, the
cases had the cyber tones wherein computer, Internet or its related
aspects were present in the crime and hence they were categorised as
Cyber Crimes under IPC. The Cyber Forgery (160 cases) accounted for
0.28 percent out of the 58,076 cases reported under Cheating. The Cyber
frauds (90) accounted for 0.66 percent of the total Criminal Breach of
Trust cases (13,636).


The Forgery (Cyber) cases were the
highest in Madhya Pradesh (108) followed by Andhra Pradesh (31). The
cases of Cyber Fraud were highest in Andhra Pradesh (41) followed by
Punjab (17) and Madhya Pradesh (12).

A total of 411 persons were
arrested in the country for Cyber Crimes under IPC during 2006. 47.2
percent offenders (194) of these were taken into custody for offences
under 'Cyber Forgery', 29.4 percent (121) for ‘Criminal Breach of Trust
/ Fraud’ and 21.7 percent (89) for 'Counterfeiting Currency / Stamps'.

The
States such as Andhra Pradesh (171), Madhya Pradesh (152) Chhattisgarh
(37) and Punjab (30) have reported higher arrests for Cyber Crimes
registered under IPC. The age group-wise profile of the arrested
persons showed that 53.8 percent (221 out of 411) were in the age-group
of 30-45 years and 27.5 percent (113 out of 411) of the offenders were
in the age-group of 18-30 years. Only 4 offenders (3 from Madhya
Pradesh and 1 from Chhattisgarh) were below 18 years of age and 3
offenders, reported from Andhra Pradesh, were above 60-years of age.

Crime
head-wise and age-wise profile of the offenders arrested under Cyber
Crimes (IPC) for the year 2006 revealed that offenders involved in
Forgery cases were more in the age-group of 30 -45 (53.6%) (104 out of
194). Nearly 58.7 percent of the persons arrested under Criminal Breach
of Trust/Cyber Fraud offences were in the age group 30-45 years (71 out
of 121).

Incidence of Cyber Crimes in Cities
19 out of 35 mega cities did not report any case of Cyber Crime during the year 2006.

15
mega cities have reported 89 cases under IT Act and 8 mega cities
reported 142 cases under various section of IPC. There was a decline of
nearly 5 percent (from 94 cases in 2005 to 89 cases in 2006) in cases
under IT Act as compared to previous year (2005), and an decrease of
12.9 percent (from 163 cases in 2005 to 142 cases in 2006) of cases
registered under various section of IPC.

Bangalore (27), Rajkot
(10) and Mumbai (9) cities have reported high incidence of such cases
(46 out of 89 cases) accounting for more than half of the cases (51.7%)
reported under IT Act, 2000. Bhopal has reported the highest incidence
(126 out of 142 cases) of cases reported under IPC sections accounting
for 88.7 percent.

(BASED ON REPORT BY NATIONAL CRIME RECORDS BUREAU)

TIE ORGANISED ONE DAY SEMINAR ON CYBER CRIME & CYBERLAW AT NEW DELHI

Internet has made real what in the 1970's that visionary of the
communications Marshall McLuhan (1911-1980) called the “ Global Village
”.
Internet is actually the most democratic of all the mass media.
With a very low investment, anyone can have a web page in Internet.
This way, almost any business can reach a very large market, directly,
fast and economically, no matter the size or its location of your
business similarly almost anybody in civil society that can read and
write can have access to the World Wide Web.
TiE Delhi launched the
Special Interest Group (SiG) covering the Internet sector with the aim
to inspire the next generation of Internet entrepreneurs by creating a
cutting edge platform for showcasing ‘next’ practices and focused
discussions on emerging issues.
One of the most critical roadblocks
& less understood issue faced by internet entrepreneurs &
professionals is the issue of Cyber Crime & Cyber Law.
Compared
to conventional crime, cyber-crime presents a different set of
challenges. From a victim’s perspective, the cyber-criminal is a
faceless entity with whom he rarely comes into physical contact. The
criminal has the capability to simultaneously attack several persons,
each sitting thousands of miles away from the other. He is not bound by
national boundaries and earns the proceeds of crime through electronic
channels with just the click of a computer key. Notwithstanding a few
notable exceptions, law enforcement officers mostly find the pattern
difficult to understand. Until recently, even cyber-laws were not
geared up to deal with the special evidentiary requirements of
cyber-crime. There is a strong need, therefore, for concerted efforts
for capacity-building and training of all those associated with the
criminal justice system
TiE Delhi Internet Special Interest Group
organised a day long session on Cyber Crime & Cyber Law ON 5TH
JULY, 2008 to demystify & more importantly get clarity on cyber
crime related issues from Policy makers, Internet entrepreneurs who
have experienced dealing with cyber crime first hand and legal experts.
Key Highlights Session:
1. Key note sessions by IT Policy Makers
2.
Overview of IT Act 2000, the trends in cyber crime/Internet fraud &
its implications for internet entrepreneurs & professionals
3. Importance of Data Security, steps to protect organizations from threats and Internet frauds
4. Legal Aspects- What are your options both from an individual & organization perspective if you are a victim
5. Enforcement Agencies- How are they on top of things?
6. Internet Entrepreneurs Experiences- A first hand Review

How is cyber crime different?

Information technology (IT) has increasingly become a part of our life
but while it gives a lot of positive benefits, it has also provided
criminal minds with new opportunities. Cyber crimes are increasingly
becoming a common phenomenon. According to a recent report, the United
States, which has integrated information technology to a much greater
extent as compared to other countries, also leads in cyber attacks. The
annual loss to US organisations in 2005 was estimated to be around
$67.2 billion (Rs 2,68,000 crore). Virus attacks continue to be the
source of the greatest financial losses in the US and unauthorised
access is the second greatest source of cyber crime. The US-based
businesses are the most targeted organisations in phishing e-mails and
account for 71.37 per cent of all phishing e-mails. The government
sector accounted for 25 per cent of all identity theft related data
breaches more than any other sector. There are a lot of common elements
between crimes in the cyberworld and those in the brick-and-mortar
world. Nevertheless, cyber crimes sometimes may not be committed only
by criminals, but highly intelligent people to whom breaking into a
system or hacking is an intellectual challenge. This has a hoary
tradition. In the 1940s, when the Manhattan Project for building the
first atom bomb was on, one of the most intelligent scientists in the
project was Richard Feynman who went on to win the Nobel Prize in
Physics. For Feynman, breaking security locks of classified papers in
this highly sensitive project was an intellectual challenge. In his
book, ‘Surely you are joking’, Feynman reports how he was able to beat
the system most of the time. The most striking aspect of cyber crime is
that computers enhance the power of intelligent criminals in terms of
magnitude. Thanks to the Internet, the world has become a global
village. Communication is at the speed of light. In this incredibly
fast world, crimes can be committed with devastating effect.
The
enhancement of the individual’s power and disproportionate power he
derives in committing crimes is an aspect where cyber crimes differ
from conventional brick-and-mortar crimes. The world of computers and
Internet is a 24x7 world. The cyberworld never sleeps. There is no time
when one can relax. Eternal vigilance, it used to be said, is the price
of liberty. Eternal alertness is the solution to tackling cyber crime.
Even though technology provides the basis for the cyberworld, the same
technology is used for detecting and tackling cyber crimes. In this
eternal game of catching up, one has to always remember Oscar Wilde’s
perceptive comment -- ‘The thief is an artist and the policeman is only
a critic’. Apart from the technology aspect, perhaps the more important
factor is the human dimension. The motive for most cyber crime may not
only be an intellectual challenge for the hacker, but also a sense of
frustration and impotent anger of some employees who feel that an
organisation or the world, has not been fair to them. Studies of cyber
crimes have shown that 80 per cent of cyber crimes are committed by
insiders. And in a typical reflection of the helplessness and
pragmatism of the victims, 80 per cent of the cyber crimes are not
reported. Hence an understanding of human psychology and motivation
becomes very significant. Apart from tackling the problem of attracting
and retaining talent in an increasingly competitive world of IT, one
also has to retain the loyalty of employees. In the ultimate analysis,
it is the human aspect that is the key.

Wednesday, July 2, 2008

Student's life as a hacker exposed by eBay tip-off

CHENNAI: Police on Tuesday arrested a college student for purchasing
electronic goods online using credit card details of card holders from
across the world. T Bharathwaj Purohit (20), a resident of MKB Nagar
and a member of a community of hackers, had been buying electronic
goods online using other people's credit cards since April. Police
recovered an electric guitar, a printer, an LCD TV, a digital camera, a
weighing scale, a mobile and a laptop all worth Rs three lakh, and Rs
38,500 in cash from him. Purohit met Charu Sharma of Mumbai and Hathi
Gogaiyan of Ahmedabad online a few months ago. They introduced him to
an online hackers' community on the net and gave him credit card
details to make purchases. "Following Sharma and Gogaiyan's advice,
Purohit tried to book an expensive mobile and i-pod using the data they
provided. To his surprise, he received the items within a week. He also
couriered the valuables to them as gifts. He started buying more goods
online on 'eBay', an online auction website," deputy commissioner of
police B Vijayakumari said. Sharma and Gogaiyan had given Purohit
details of US credit card holders. Following complaints from an eBay
investigation officer, the city police arrested Purohit. He had made
his purchases from his personal computer. The police, with the help of
the cyber crime wing, tracked down his IP address. Preliminary inquires
revealed that this group of hackers got bank accounts and credit card
details of people for a price. "We have received information that the
Mumbai police cornered Sharma and Gogaiyan a few days ago for another
credit card cheating case in Mumbai. We have taken Purohit into custody
to get more details," a senior police officer said. Police booked
Purohit under several sections of the IPC, including 420 (cheating). He
was remanded in judicial custody after being produced before the
magistrate court on Tuesday.

Credit card blues: Cops unearth Rs 1-cr fraud

Unearthing a major credit card fraud, the Crime Branch of Pune police
have arrested a gang of four persons for cheating people and creating
duplicate credit cards. The gang is alleged to have cheated over 30
customers of Hotel Le Meridien to the tune of Rs 1 crore, according to
the police.
The gang was headed by 24 year-old Asif Zaidi Mirza of
Borivli, Mumbai, who though only a HSC pass, is technically quite
savvy. Among the other accused, Wasim Salim Patel (21) of Sainik Nagar
in Yerwada was a cashier at Chingari Restaurant in Hotel Le Meridien.
The other two accomplices were identified as Ubed Ajmat Sayyad (26) of
Mumbai East and Bharat Tansukhbhai Soni (28) of Goregaon, Mumbai.
Senior
police inspector Sunil Pawar said the accused had been stealing the
credit card details of the Le Meridien customers with the help of
devices like “credit card skimmer” and “credit card reader” that they
had purchased from a Nigerian national for Rs 60,000.
“When a
customer gave credit card for paying the hotel bill, Patel used to
swipe the card using the skimmer whereby the credit card details were
recorded for later use,” said Pawar.
“The accused then copied these
details on the magnetic strips of blank or blocked plastic cards using
computer technology. In this manner, they prepared at least 33 credit
cards of 27 multinational and international banks. These credit cards
were circulated among the gang members, who used it for shopping costly
items,” he said.
“The fraudsters were mostly targeting customers
having platinum, gold and corporate credit cards who have credit limit
of about Rs 15 lakh in India,” Pawar added.
The fraud came to light,
when Sunil Nade (33), manager of Financial Resource Management (FRM)
division of Citibank’s East Street branch lodged a complaint with the
Bund Garden police station a few days back.
Nade and three of his
bank customers had gone to Hotel Le Meridien on May 7 for dinner during
which time the accused Soni, Asif and Ubed were also present.
The
police suspected that when Nade gave the credit card for making the
payment, the cashier Patel either stole the credit card details himself
or passed these cards to his accomplices for the purpose. Then they
used the duplicate card for shopping goods worth Rs 10 lakh.
Nade
and the other three bank customers were shocked when they came to know
that such a huge amount was withdrawn from their account without
consent between May 7 and June 13. And they approached the police.
Acting
on a tip-off, the crime branch sleuths first nabbed Soni at Mumbai.
Later, they arrested Asif, Ubed and Patel. Police have seized the
skimmer, credit card reader, laptop and 20 duplicate credit cards.
Investigations
revealed that Patel was working at the hotel for last three years.
Asif, the gang leader, was taking as his cut 50 per cent of the money
made from the fraud. “It is very easy to identify a duplicate credit
card. Still some shop owners have allowed shopping through such cards.
We suspect that fraudsters paid some part of their income through the
racket to the shop-owners,” said Pawar, whose was assisted in the
investigation by sub inspectors N V Avhad and R M Gaikwad.
When
contacted, Jaswinder Narang, General Manager of Le Meridien said that
police had apprehended Patel about three days back. “Police have not
communicated with us later. Also, we have not received any complaints
from the customers,” he said.

Wednesday, June 11, 2008

Bloggers meet held in Chennai

Bloggers in the Chennai city got together to talk about the art of
blogging and to promote it.A blogging portal along with Microsoft
recently conducted their fifth bloggers meet at Hotel Dee Cee Manor at
T.Nagar on Sunday.
Many enthusiastic bloggers from the Chennai city took part in this
meet. Statistics say that of the 3000 bloggers already registered in
the directory of indiblogger.in, 500 are from Chennai.
Since blogging is an online activity, bloggers finally got the chance
to mee...

Facebook and social networking sites are the biggest office time-wasters

According to Rik Ferguson, of Trend Micro which carried out a survey on
work wasting unofficial breaks, says that in the past, cigerette breaks
caused major headaches, but times have changed.
The latest breaks wasting office time and giving bosses headaches are
social networking sites like Facebook and MySpace. Four in ten managers
say they now find that workers addicted to sites like Facebook and
online shops are the biggest office time-wasters.
Employees who respond to non-work emails...