Google

Get Paid

Thursday, December 25, 2008

Workshop on Crimeware and Financial Frauds, Delhi, India

Indian Computer Emergency Response Team organised a Workshop on
Crimeware and Financial Frauds on5th November, 2008 at CERT-In Training
Room, CERT-InDepartment of Information TechnologyElectronics Niketan,
6, CGO Complex, New Delhi
Following was the Agenda:
Crimeware Trends
Internet Banking - Frauds & Defenses
E-Commerce, Frauds and Challenges
Crimeware Threats and Countermeasures
Maninder of Team Cybersmart.in was present and noted the following
points

Tuesday, August 5, 2008

IT Services accessed by Rural poor

Over 10,000 Common Service Centres set up in villages
Over
10,300 Common Service Centre (CSC) have been set up in eight States to
provide the rural population in remote areas with a mix of government,
private and social sector services. The services which are the
initiatives of the Department of Information Technology are both IT
based and non-IT based. The states are Jharkhand, Haryana, West Bengal,
Bihar, Tripura, Gujarat, Tamil Nadu and Madhya Pradesh. The Centres
have come up as part of the Government’s plan to establish one lakh
Common Service Centres (CSCs) in six lakh villages in the country. The
establishment of most of the Centres is likely to be completed by next
year. The Scheme has been approved at a total cost of Rs 5742 Cr. over
4 years, of which the Government of India is to contribute Rs 856 Cr.
and the State Governments Rs 793 Cr. The balance resources would be
mobilized from the private sector. The Common Service Centres are
ICT-enabled Kiosks having a PC along with basic support equipment like
Printer, Scanner, UPS, with Wireless Connectivity as the backbone and
additional equipment for edutainment, telemedicine, projection systems,
etc. The contracts for setting up of the Centres are given through a
bidding process by the respective state governments. It takes about
twelve months for execution of the contract. The Scheme is being
implemented through a Public Private Partnership. CSCs constitute one
of the three pillars of the National e-Governance Plan for enabling
anytime anywhere delivery of government services, the other two being
(a) the State Wide Area Network (for Connectivity) which has already
been approved by the Government for Rs 3334 Cr. and b) the State Data
Centre Scheme (for secure hosting of data and applications) for which
implementation committees have been formed in several states.
Department of Information Technology (DIT) has appointed a National
Level Service Agency (NLSA), to coordinate the entire activity.

Mumbai Police log in to search criminals

People go on social networking sites to find old
friends and to make new ones. But Mumbai Police goes to these very
sites to hunt for criminals, not just those involved in online fraud or
phishing but cold-blooded murderers, kidnappers and rapists.Several
recent instances of crimes, where criminals have left trails on the
internet, in chat rooms, social networks has made the virtual world a
forum the Crime Branch is passionately exploring. Victims and those
accused of crimes committed in the real world often leave their
footprints in cyberspace. Like a recent rape case in Central Mumbai led
the cyber crime sleuth to establish the identity of the accused by a
video of the crime he posted online.No crime is perfect and the Mumbai
Police are now looking at newer ways to prove this. Deven Bharti,
Additional Commissioner of Police (Crime) said, ''The cyber space
offers a great degree of anonymity to the criminals. So people put
anything online. We are increasingly looking at cyber space for the pug
marks of people accused of serious crimes to get clues for its
detection. We have solved some cases this way like the Adnan Patrawala
case.''The case in question is that of a 16 year old, Adnan Patrawala
who was kidnapped in August 2007. Investigations led the Mumbai police
to his homepage on orkut to hunt for clues to his kidnappers. One of
the kidnappers was his friend on Orkut.In May 2007, a young software
professional Kaushambi Layek was murdered in a hotel room. Clues from
Layek's orkut pages led the police to Manish Thakur's homepage. What
intrigued the investigators was that Layek was Manish's only friend on
Orkut, a strange thing to happen given that a member can have as many
friends as they like. Today, Thakur is cooling his heels in jail.The
sucess of such cases has led the Mumbai police to create Maharashtra's
first cyber police station. ''The work will begin soon the police will
now have more manpower and expertise. Cyber officers will register
cases at the police station and detect them,'' said Deven Bharati.It's
a thin line that divides the real world and the virtual world and
plugging into both can mean nailing potential killers.

http://www.ndtv. com/convergence/ ndtv/story. aspx?id=NEWEN200 80057323&ch=7/16/2008% 2010:38:00% 20AM

China mounts Cyber Attacks against India

China’s cyber warfare army is marching on, and India is suffering
silently. China had mounted almost daily attacks on Indian computer
networks, both government and private, showing its intent and
capability.
The sustained assault almost coincides with the history
of the present political disquiet between the two countries. According
to senior government officials, these attacks are not isolated
incidents of something so generic or basic as "hacking" — they are far
more sophisticated and complete — and there is a method behind the
madness.
Publicly, senior government officials, when questioned,
take refuge under the argument that "hacking" is a routine activity and
happens from many areas around the world. But privately, they
acknowledge that the cyber warfare threat from China is more real than
from other countries.
The core of the assault is that the Chinese
are constantly scanning and mapping India’s official networks. This
gives them a very good idea of not only the content but also of how to
disable the networks or distract them during a conflict.
This, officials say, is China’s way of gaining "an asymmetrical advantage" over a potential adversary.

The big attacks that were sourced to China over the last few months
included an attack on NIC (National Infomatics Centre), which was aimed
at the National Security Council, and on the MEA.
Other government
networks, said sources, are routinely targeted though they haven’t been
disabled. A quiet effort is under way to set up defence mechanisms, but
cyber warfare is yet to become a big component of India’s security
doctrine. Dedicated teams of officials — all underpaid, of course — are
involved in a daily deflection of attacks. But the real gap is that a
retaliatory offensive system is yet to be created.
And it’s not difficult, said sources. Chinese networks are very porous — and India is an acknowledged IT giant!

There are three main weapons in use against Indian networks — BOTS, key
loggers and mapping of networks. According to sources in the
government, Chinese hackers are acknowledged experts in setting up
BOTS. A BOT is a parasite program embedded in a network, which hijacks
the network and makes other computers act according to its wishes,
which, in turn, are controlled by "external" forces.
The controlled
computers are known as "zombies" in the colourful language of cyber
security, and are a key aspect in cyber warfare. According to official
sources, there are close to 50,000 BOTS in India at present — and these
are "operational" figures.
What is the danger? Simply put, the
danger is that at the appointed time, these "external" controllers of
BOTNETS will command the networks, through the zombies, to move them at
will.
Exactly a year ago, Indian computer security experts got a
glimpse of what could happen when a targeted attack against Estonia
shut that country down — it was done by one million computers from
different parts of the world — and many of them were from India! That,
officials said, was executed by cyber terrorists from Russia, who are
deemed to be more deadlier.
The point that officials are making is
that there are internal networks in India that are controlled from
outside — a sort of cyberspace fifth column. Hence, the need for a more
aggressive strategy.

How to Protect Your Computer

The same advice parents might deliver to young drivers on their first
solo journey applies to everyone who wants to navigate safely online. A
special agent in our Cyber Division offered the following:
- "Don't drive in bad neighborhoods."
- "If you don't lock your car, it's vulnerable; if you don't secure
your computer, it's vulnerable."- "Reduce your vulnerability and you
reduce the threat."
Below are some key steps to protecting your computer from intrusion:
- Keep Your Firewall Turned On:
A firewall helps protect your computer from hackers who might try to
gain access to crash it, delete information, or even steal passwords or
other sensitive information. Software firewalls are widely recommended
for single computers. The software is prepackaged on some operating
systems or can be purchased for individual computers. For multiple
networked computers, hardware routers typically provide firewall
protection.
- Install or Update Your Antivirus Software:
Antivirus software is designed to prevent malicious software programs
from embedding on your computer. If it detects malicious code, like a
virus or a worm, it works to disarm or remove it. Viruses can infect
computers without users' knowledge. Most types of antivirus software
can be set up to update automatically.
- Install or Update Your Antispyware Technology:
Spyware is just what it sounds like—software that is surreptitiously
installed on your computer to let others peer into your activities on
the computer. Some spyware collects information about you without your
consent or produces unwanted pop-up ads on your web browser. Some
operating systems offer free spyware protection, and inexpensive
software is readily available for download on the Internet or at your
local computer store. Be wary of ads on the Internet offering
downloadable antispyware—in some cases these products may be fake and
may actually contain spyware or other malicious code. It's like buying
groceries—shop where you trust.
- Keep Your Operating System Up to Date:
Computer operating systems are periodically updated to stay in tune
with technology requirements and to fix security holes. Be sure to
install the updates to ensure your computer has the latest protection.
- Be Careful What You Download:
Carelessly downloading e-mail attachments can circumvent even the most
vigilant anti-virus software. Never open an e-mail attachment from
someone you don't know, and be wary of forwarded attachments from
people you do know. They may have unwittingly advanced malicious code.
- Turn Off Your Computer:
With the growth of high-speed Internet connections, many opt to leave
their computers on and ready for action. The downside is that being
"always on" renders computers more susceptible. Beyond firewall
protection, which is designed to fend off unwanted attacks, turning the
computer off effectively severs an attacker's connection—be it spyware
or a botnet that employs your computer's resources to reach out to
other unwitting users.

CYBER CRIMES DURING 2006 IN INDIA

Cyber Crimes are a new class of crimes to India rapidly expanding due
to extensive use of Internet and I.T. The Information Technology (IT)
Act, 2000, specifies the acts made punishable. Since the primary
objective of this Act is to create an enabling environment for
commercial use of I.T., certain omissions and commissions of criminals
while using computers have not been included. Several offences having
bearing on cyber-arena are also registered under the appropriate
sections of the IPC with the legal recognition of Electronic Records
and the amendments made in several sections of the IPC vide the IT Act,
2000.

142 cases were registered under IT Act during the year
2006 as compared to 179 cases during the previous year thereby
reporting a decrease of 20.7 percent in 2006 over 2005. 24.6 percent
cases (35 out of 142 cases) were reported from Maharashtra followed by
Karnataka (27), Andhra Pradesh (14) and Kerala and Punjab (12 each).

48.6
percent (69 cases) of the total 142 cases registered under IT Act 2000
were related to Obscene Publication / Transmission in electronic form,
normally known as cyber pornography. 81 persons were arrested for
committing such offences during 2006. There were 59 cases of Hacking of
computer systems during the year wherein 63 persons were arrested. Out
of the total (59) Hacking cases, the cases relating to Loss/Damage of
computer resource/utility under Sec 66(1) of the IT Act were 42.4
percent (25 cases) whereas the cases related to Hacking under Section
66(2) of IT Act were 57.6 percent (34 cases).

Maharashtra (11)
and Tamilnadu (7) registered maximum cases under Sec 66(1) of the IT
Act out of total 25 such cases at the National level. Out of the total
34 cases relating to Hacking under Sec. 66(2), most of the cases (20
cases) were reported from Karnataka followed by Andhra Pradesh and
Maharashtra (3 each).

64.3 percent of the 154 persons arrested
in cases relating to IT Act, 2000 were from Maharashtra (66), Karnataka
(17) and Punjab (16) alone. The age-wise profile of persons arrested in
Cyber Crime cases under IT Act, 2000 showed that 70.8 percent of the
offenders were in the age group 18 – 30 years (109 out of 154) and 25.3
percent of the offenders were in the age group 30- 45 years (39 out of
154). Gujarat and Maharashtra reported one offender each whose age was
below 18 years.

Crime head-wise and age-group wise profile of
the offenders arrested under IT Act, 2000 revealed that 52.6 percent
(81 out of 154) of the offenders were arrested under ‘Obscene
publication/transmission in electronic form’ of which 79.0 percent (64
out of 81) were in the age-group 18 –30 years. More than 65 percent (41
out of 63) of the total persons arrested for 'Hacking Computer Systems'
were in the age-group of 18-30 years.

Cyber Crimes – Cases of Various Categories under IPC Section
A
total of 311 cases were registered under IPC Sections during the year
2006 as compared to 302 such cases during 2005 thereby reporting a
marginal increase of 3 percent. Madhya Pradesh reported maximum number
of such cases, nearly 40.5 percent of total cases (126 out of 311)
followed by Andhra Pradesh 32.8 percent (102 cases). Majority of the
crimes out of total 311 cases registered under IPC fall under 2
categories viz. Forgery (160) and Criminal Breach of Trust or Fraud
(90). Though, these offences fall under the traditional IPC crimes, the
cases had the cyber tones wherein computer, Internet or its related
aspects were present in the crime and hence they were categorised as
Cyber Crimes under IPC. The Cyber Forgery (160 cases) accounted for
0.28 percent out of the 58,076 cases reported under Cheating. The Cyber
frauds (90) accounted for 0.66 percent of the total Criminal Breach of
Trust cases (13,636).


The Forgery (Cyber) cases were the
highest in Madhya Pradesh (108) followed by Andhra Pradesh (31). The
cases of Cyber Fraud were highest in Andhra Pradesh (41) followed by
Punjab (17) and Madhya Pradesh (12).

A total of 411 persons were
arrested in the country for Cyber Crimes under IPC during 2006. 47.2
percent offenders (194) of these were taken into custody for offences
under 'Cyber Forgery', 29.4 percent (121) for ‘Criminal Breach of Trust
/ Fraud’ and 21.7 percent (89) for 'Counterfeiting Currency / Stamps'.

The
States such as Andhra Pradesh (171), Madhya Pradesh (152) Chhattisgarh
(37) and Punjab (30) have reported higher arrests for Cyber Crimes
registered under IPC. The age group-wise profile of the arrested
persons showed that 53.8 percent (221 out of 411) were in the age-group
of 30-45 years and 27.5 percent (113 out of 411) of the offenders were
in the age-group of 18-30 years. Only 4 offenders (3 from Madhya
Pradesh and 1 from Chhattisgarh) were below 18 years of age and 3
offenders, reported from Andhra Pradesh, were above 60-years of age.

Crime
head-wise and age-wise profile of the offenders arrested under Cyber
Crimes (IPC) for the year 2006 revealed that offenders involved in
Forgery cases were more in the age-group of 30 -45 (53.6%) (104 out of
194). Nearly 58.7 percent of the persons arrested under Criminal Breach
of Trust/Cyber Fraud offences were in the age group 30-45 years (71 out
of 121).

Incidence of Cyber Crimes in Cities
19 out of 35 mega cities did not report any case of Cyber Crime during the year 2006.

15
mega cities have reported 89 cases under IT Act and 8 mega cities
reported 142 cases under various section of IPC. There was a decline of
nearly 5 percent (from 94 cases in 2005 to 89 cases in 2006) in cases
under IT Act as compared to previous year (2005), and an decrease of
12.9 percent (from 163 cases in 2005 to 142 cases in 2006) of cases
registered under various section of IPC.

Bangalore (27), Rajkot
(10) and Mumbai (9) cities have reported high incidence of such cases
(46 out of 89 cases) accounting for more than half of the cases (51.7%)
reported under IT Act, 2000. Bhopal has reported the highest incidence
(126 out of 142 cases) of cases reported under IPC sections accounting
for 88.7 percent.

(BASED ON REPORT BY NATIONAL CRIME RECORDS BUREAU)

TIE ORGANISED ONE DAY SEMINAR ON CYBER CRIME & CYBERLAW AT NEW DELHI

Internet has made real what in the 1970's that visionary of the
communications Marshall McLuhan (1911-1980) called the “ Global Village
”.
Internet is actually the most democratic of all the mass media.
With a very low investment, anyone can have a web page in Internet.
This way, almost any business can reach a very large market, directly,
fast and economically, no matter the size or its location of your
business similarly almost anybody in civil society that can read and
write can have access to the World Wide Web.
TiE Delhi launched the
Special Interest Group (SiG) covering the Internet sector with the aim
to inspire the next generation of Internet entrepreneurs by creating a
cutting edge platform for showcasing ‘next’ practices and focused
discussions on emerging issues.
One of the most critical roadblocks
& less understood issue faced by internet entrepreneurs &
professionals is the issue of Cyber Crime & Cyber Law.
Compared
to conventional crime, cyber-crime presents a different set of
challenges. From a victim’s perspective, the cyber-criminal is a
faceless entity with whom he rarely comes into physical contact. The
criminal has the capability to simultaneously attack several persons,
each sitting thousands of miles away from the other. He is not bound by
national boundaries and earns the proceeds of crime through electronic
channels with just the click of a computer key. Notwithstanding a few
notable exceptions, law enforcement officers mostly find the pattern
difficult to understand. Until recently, even cyber-laws were not
geared up to deal with the special evidentiary requirements of
cyber-crime. There is a strong need, therefore, for concerted efforts
for capacity-building and training of all those associated with the
criminal justice system
TiE Delhi Internet Special Interest Group
organised a day long session on Cyber Crime & Cyber Law ON 5TH
JULY, 2008 to demystify & more importantly get clarity on cyber
crime related issues from Policy makers, Internet entrepreneurs who
have experienced dealing with cyber crime first hand and legal experts.
Key Highlights Session:
1. Key note sessions by IT Policy Makers
2.
Overview of IT Act 2000, the trends in cyber crime/Internet fraud &
its implications for internet entrepreneurs & professionals
3. Importance of Data Security, steps to protect organizations from threats and Internet frauds
4. Legal Aspects- What are your options both from an individual & organization perspective if you are a victim
5. Enforcement Agencies- How are they on top of things?
6. Internet Entrepreneurs Experiences- A first hand Review

How is cyber crime different?

Information technology (IT) has increasingly become a part of our life
but while it gives a lot of positive benefits, it has also provided
criminal minds with new opportunities. Cyber crimes are increasingly
becoming a common phenomenon. According to a recent report, the United
States, which has integrated information technology to a much greater
extent as compared to other countries, also leads in cyber attacks. The
annual loss to US organisations in 2005 was estimated to be around
$67.2 billion (Rs 2,68,000 crore). Virus attacks continue to be the
source of the greatest financial losses in the US and unauthorised
access is the second greatest source of cyber crime. The US-based
businesses are the most targeted organisations in phishing e-mails and
account for 71.37 per cent of all phishing e-mails. The government
sector accounted for 25 per cent of all identity theft related data
breaches more than any other sector. There are a lot of common elements
between crimes in the cyberworld and those in the brick-and-mortar
world. Nevertheless, cyber crimes sometimes may not be committed only
by criminals, but highly intelligent people to whom breaking into a
system or hacking is an intellectual challenge. This has a hoary
tradition. In the 1940s, when the Manhattan Project for building the
first atom bomb was on, one of the most intelligent scientists in the
project was Richard Feynman who went on to win the Nobel Prize in
Physics. For Feynman, breaking security locks of classified papers in
this highly sensitive project was an intellectual challenge. In his
book, ‘Surely you are joking’, Feynman reports how he was able to beat
the system most of the time. The most striking aspect of cyber crime is
that computers enhance the power of intelligent criminals in terms of
magnitude. Thanks to the Internet, the world has become a global
village. Communication is at the speed of light. In this incredibly
fast world, crimes can be committed with devastating effect.
The
enhancement of the individual’s power and disproportionate power he
derives in committing crimes is an aspect where cyber crimes differ
from conventional brick-and-mortar crimes. The world of computers and
Internet is a 24x7 world. The cyberworld never sleeps. There is no time
when one can relax. Eternal vigilance, it used to be said, is the price
of liberty. Eternal alertness is the solution to tackling cyber crime.
Even though technology provides the basis for the cyberworld, the same
technology is used for detecting and tackling cyber crimes. In this
eternal game of catching up, one has to always remember Oscar Wilde’s
perceptive comment -- ‘The thief is an artist and the policeman is only
a critic’. Apart from the technology aspect, perhaps the more important
factor is the human dimension. The motive for most cyber crime may not
only be an intellectual challenge for the hacker, but also a sense of
frustration and impotent anger of some employees who feel that an
organisation or the world, has not been fair to them. Studies of cyber
crimes have shown that 80 per cent of cyber crimes are committed by
insiders. And in a typical reflection of the helplessness and
pragmatism of the victims, 80 per cent of the cyber crimes are not
reported. Hence an understanding of human psychology and motivation
becomes very significant. Apart from tackling the problem of attracting
and retaining talent in an increasingly competitive world of IT, one
also has to retain the loyalty of employees. In the ultimate analysis,
it is the human aspect that is the key.

Wednesday, July 2, 2008

Student's life as a hacker exposed by eBay tip-off

CHENNAI: Police on Tuesday arrested a college student for purchasing
electronic goods online using credit card details of card holders from
across the world. T Bharathwaj Purohit (20), a resident of MKB Nagar
and a member of a community of hackers, had been buying electronic
goods online using other people's credit cards since April. Police
recovered an electric guitar, a printer, an LCD TV, a digital camera, a
weighing scale, a mobile and a laptop all worth Rs three lakh, and Rs
38,500 in cash from him. Purohit met Charu Sharma of Mumbai and Hathi
Gogaiyan of Ahmedabad online a few months ago. They introduced him to
an online hackers' community on the net and gave him credit card
details to make purchases. "Following Sharma and Gogaiyan's advice,
Purohit tried to book an expensive mobile and i-pod using the data they
provided. To his surprise, he received the items within a week. He also
couriered the valuables to them as gifts. He started buying more goods
online on 'eBay', an online auction website," deputy commissioner of
police B Vijayakumari said. Sharma and Gogaiyan had given Purohit
details of US credit card holders. Following complaints from an eBay
investigation officer, the city police arrested Purohit. He had made
his purchases from his personal computer. The police, with the help of
the cyber crime wing, tracked down his IP address. Preliminary inquires
revealed that this group of hackers got bank accounts and credit card
details of people for a price. "We have received information that the
Mumbai police cornered Sharma and Gogaiyan a few days ago for another
credit card cheating case in Mumbai. We have taken Purohit into custody
to get more details," a senior police officer said. Police booked
Purohit under several sections of the IPC, including 420 (cheating). He
was remanded in judicial custody after being produced before the
magistrate court on Tuesday.

Credit card blues: Cops unearth Rs 1-cr fraud

Unearthing a major credit card fraud, the Crime Branch of Pune police
have arrested a gang of four persons for cheating people and creating
duplicate credit cards. The gang is alleged to have cheated over 30
customers of Hotel Le Meridien to the tune of Rs 1 crore, according to
the police.
The gang was headed by 24 year-old Asif Zaidi Mirza of
Borivli, Mumbai, who though only a HSC pass, is technically quite
savvy. Among the other accused, Wasim Salim Patel (21) of Sainik Nagar
in Yerwada was a cashier at Chingari Restaurant in Hotel Le Meridien.
The other two accomplices were identified as Ubed Ajmat Sayyad (26) of
Mumbai East and Bharat Tansukhbhai Soni (28) of Goregaon, Mumbai.
Senior
police inspector Sunil Pawar said the accused had been stealing the
credit card details of the Le Meridien customers with the help of
devices like “credit card skimmer” and “credit card reader” that they
had purchased from a Nigerian national for Rs 60,000.
“When a
customer gave credit card for paying the hotel bill, Patel used to
swipe the card using the skimmer whereby the credit card details were
recorded for later use,” said Pawar.
“The accused then copied these
details on the magnetic strips of blank or blocked plastic cards using
computer technology. In this manner, they prepared at least 33 credit
cards of 27 multinational and international banks. These credit cards
were circulated among the gang members, who used it for shopping costly
items,” he said.
“The fraudsters were mostly targeting customers
having platinum, gold and corporate credit cards who have credit limit
of about Rs 15 lakh in India,” Pawar added.
The fraud came to light,
when Sunil Nade (33), manager of Financial Resource Management (FRM)
division of Citibank’s East Street branch lodged a complaint with the
Bund Garden police station a few days back.
Nade and three of his
bank customers had gone to Hotel Le Meridien on May 7 for dinner during
which time the accused Soni, Asif and Ubed were also present.
The
police suspected that when Nade gave the credit card for making the
payment, the cashier Patel either stole the credit card details himself
or passed these cards to his accomplices for the purpose. Then they
used the duplicate card for shopping goods worth Rs 10 lakh.
Nade
and the other three bank customers were shocked when they came to know
that such a huge amount was withdrawn from their account without
consent between May 7 and June 13. And they approached the police.
Acting
on a tip-off, the crime branch sleuths first nabbed Soni at Mumbai.
Later, they arrested Asif, Ubed and Patel. Police have seized the
skimmer, credit card reader, laptop and 20 duplicate credit cards.
Investigations
revealed that Patel was working at the hotel for last three years.
Asif, the gang leader, was taking as his cut 50 per cent of the money
made from the fraud. “It is very easy to identify a duplicate credit
card. Still some shop owners have allowed shopping through such cards.
We suspect that fraudsters paid some part of their income through the
racket to the shop-owners,” said Pawar, whose was assisted in the
investigation by sub inspectors N V Avhad and R M Gaikwad.
When
contacted, Jaswinder Narang, General Manager of Le Meridien said that
police had apprehended Patel about three days back. “Police have not
communicated with us later. Also, we have not received any complaints
from the customers,” he said.

Wednesday, June 11, 2008

Bloggers meet held in Chennai

Bloggers in the Chennai city got together to talk about the art of
blogging and to promote it.A blogging portal along with Microsoft
recently conducted their fifth bloggers meet at Hotel Dee Cee Manor at
T.Nagar on Sunday.
Many enthusiastic bloggers from the Chennai city took part in this
meet. Statistics say that of the 3000 bloggers already registered in
the directory of indiblogger.in, 500 are from Chennai.
Since blogging is an online activity, bloggers finally got the chance
to mee...

Facebook and social networking sites are the biggest office time-wasters

According to Rik Ferguson, of Trend Micro which carried out a survey on
work wasting unofficial breaks, says that in the past, cigerette breaks
caused major headaches, but times have changed.
The latest breaks wasting office time and giving bosses headaches are
social networking sites like Facebook and MySpace. Four in ten managers
say they now find that workers addicted to sites like Facebook and
online shops are the biggest office time-wasters.
Employees who respond to non-work emails...

Saturday, June 7, 2008

Online fraud: Cops to probe Meerut techies

AHMEDABAD: The four accused in Rs 1-lakh online fraud case will be brought to Ahmedabad from Meerut for interrogation on Saturday.
The
cyber sleuths of the city crime branch in late March had tracked down a
software engineer, Sourav Sharma, involved in a online fraud case and
through him reached to the other accused in the case.
According to the case Sharma and three others are accused of duping Dehgam-based Dr Chandrakant Shah of Rs 1 lakh.
“Shah, had received an email asking for his account details. As the website had a private bank logo and even the similar colour scheme, the doctor was convinced and provided his bank details.
However,
the mail was sent by the fraudsters in which they had used the
pseudo-website to get the details. Soon, the fraudsters transferred the
amount of Rs 1 lakh from two interlinked accounts. Shah had then
registered a case in this regard on January 3,” said an Ellisbridge
police official.
According to the city
police, Sharma, Kuldip Verma, Faizal-ur-Rahman and Mohammed Gulrez -
all residents of Meerut in Uttar Pradesh, were tracked down by city
cyber crime cell late in March and a team headed by a sub-inspector was
sent to Uttar Pradesh.
However, due to
cases registered against the gang in the local police, the team could
not get hold of the members and had to wait for four months. Sources
added that the accused will be questioned by Usha Rada, assistant
commissioner of police, Crime (women cell).

American University and Pirated Songs

American University and Pirated Songs
The music industry is tightening its grips on University of Utah
students who they believe have pirated songs.
The Recording Industry Association of America, a trade group that
represents the U.S. recording industry, notified the university of its
intent to sue individuals who it contends have illegally shared
copyrighted music.

Monday, May 12, 2008

Global phishing racket busted, 3 held

The crime branch busted an international phishing racket on Tuesday and arrested three persons who were involved in duping as many as 23 bank customers of about Rs 35 lakh from all over the country. The gang comprised two Nigerian nationals who had been living in India without proper identification, visa or passport for last three years.

Two laptops, Rs 60,000 in cash, two forged and one expired passport, five mobile phones, 17 debit and credit cards in different names, 19 cheque books, 50 duplicate mobile phone bills, five SIM cards, seven forged driving licences, a PAN card, withdrawal slips and Western Union Money transfer receipts were confiscated from their possession on arrest.

The accused have been identified as Nur-ul-Huda Khan(26) from Manipur and the two Nigerian nationals, Ibimina Joshua alias Odi (38) staying in Munirka and Felix Awatefe (33) residing in Hauz Khas. They reportedly mainly targeted HDFC bank and ICICI bank customers.

The trio allegedly used to send out fake e-mails to bank customers on their e-mail IDs and ask for account details like net banking username and password on a downloadable link. The e-mails looked genuine and also bore the bank's logo which they copied from the official bank website.

"After the customer gave these details, they used to access their account and transfer all the money to a separate account from where money could be withdrawn and given to Khan. He then handed the money to the Nigerians who would send it to Nigeria through Western Union money transfer where they would divide their share," said DCP (crime and railways) Anil Shukla.

He added that the crime branch was informed of this scam by HDFC bank's Risk Control Unit manager who had received several complaints about large sums being withdrawn from their customers' accounts. They also received complaints from customers in Bangalore, Chennai and Mumbai. The crime branch team checked the account opening information of beneficiaries who received the funds transfer and tracked down their IP addresses. They then realised that it was an international scam.

On further investigation, they found out Khan's whereabouts and laid a trap with the help of HDFC officials and nabbed him from his residence. Khan then led them to the two Nigerians who were arrested later in the day.

New Media Congress New Delhi, India

New Media Congress New Delhi, India Team Cybersmart.in was present at NDTV Convergence - New Media Conference New Delhi, 2008. Some of the key points as noted by Maninder of Cybersmart.in were as follows: Mobile TV Internet Penetration Social Networks TV, Internet, Mobile Converge ? User Generated Content Text Messaging Digital Rights Localised Content Piracy Online Advertising Technorati Tags: new media delhi, india, ndtv, 2008

Japanese Government and iPods Digital Music Players

Japanese Government and iPods Digital Music PlayersTHE Japanese government will this week propose a plan to charge copyright royalties on sales of iPods and other portable digital music players, as well as on digital hard disk recorders, a major daily newspaper reported yesterday. The Agency of Cultural Affairs has not yet decided the amount

University of Chicago Law School and Web Surfing

University of Chicago Law School and Web Surfing The University of Chicago Law School has banned internet access during class time The school announced April 11 that the distractions afforded by wireless internet access no longer will be available during class time, although laptops still will be permitted for note taking. The move comes as educators at schools

Internet Filters and Olympic Games China

Internet Filters and Olympic Games China WASHINGTON - A Senate lawmaker accused the Chinese government of ordering U.S.-owned hotels in China to install Internet filters that can spy on international visitors coming to see the summer Olympic games.

Controversial Ownership of Domain Name

Controversial Ownership of Domain Name Domainer Anything.com will be handing over the domain name JerrySeinfeld.com (jerryseinfeld.com) to its “rightful” owner, stand-up comedian Jerry Seinfeld, after facing the National Arbitration Forum (arb-forum.com) last week for its “controversial” ownership of the domain name and its suspected exploitation of the TV funnyman’s self-titled website. The website, at first glance,

New Technology by Google YouTube

New Technology by Google YouTube NEW YORK - The fight against child pornography is getting an assist from technology designed by Google Inc. to help identify copyright-protected clips on its YouTube video-sharing site. Google Employees have tried customize the copyright software for the National Center for Missing and Exploited Children’s program for identifying children in sexually explicit

Employee emails Australia

Employee emails Australia Australian employers would be able to read their staff’s e-mails under proposed new national security laws being considered by the Federal Government. According to reports the new laws would give companies extra powers to monitor their computer networks to prevent cyber-attacks. They would be allowed to check staff e-mails and internet communications without their consent.

Tuesday, April 22, 2008

Customer data 'needs protection'

Companies and public bodies are not doing enough to protect customers' data, the UK's privacy watchdog and a major survey of security have said.

The Information Commissioner said that the 94 security breaches reported to him last year was an "alarming" number.

The survey of more than 1,000 firms suggested that almost 90% of them let staff leave offices with potentially confidential data stored on USB sticks.

Firms and public bodies were urged to make data protection a priority.

Information Commissioner Richard Thomas said of the 94 data breaches, two thirds were committed by government or other public sector bodies.

Data had been recovered in only three of the 94 cases, he said.

Stolen computers

The material included personal details of UK citizens, including health records.

"The evidence shows that more must be done to eradicate inexcusable security breaches," he said.

Mr Thomas' findings and the separate Information Security Breaches Survey will be detailed at the InfoSec show in London, the world's largest event of its kind.

The survey was carried out by Price Waterhouse Coopers on behalf of the Department for Business Enterprise and Regulatory Reform.

According to the survey, almost 80% of firms that had reported a stolen computer had not encrypted data on the hard drive.

Chris Potter, from PricewaterhouseCoopers, which compiled the survey, told BBC News that overall attitudes to security had improved in the last 12 months.

System failures

"Companies have focused on the areas which have caused them most damage in the past, such as viruses and system failures.

"These tend to have caused the greatest cost in terms of business interruption."

But he said the "biggest concern is around the protection of customer data, which companies clearly want to be good at.

"Sometimes that's not translating into real action."

He said particular threats were around the lack of encryption of data on laptops, the use of USB memory sticks and newer technologies like Voice over Internet Protocol.

"In all these areas the controls are not as strong as they are over traditional threats," he said.

Mr Potter's comments were echoed by those of the Information Commissioner.

Mr Thomas said: "The government, banks and other organisations need to regain the public's trust by being far more careful with people's personal information.

"Once again I urge business and public sector leaders to make data protection a priority in their organisation."

Of the total reported to the commissioner, 62 security breaches were in the public sector, 28 were in the private sector and four in the charity or third sector.

Of those reported by public sector bodies, almost a third happened in central government and associated agencies, and a fifth in the NHS.

According to the PricewaterhouseCoopers report, fewer companies today are encrypting data on laptops than two years ago, despite a recent spate of high-profile instances of laptop losses with unencrypted information.

Mr Potter said: "We have seen in successive surveys that companies tend to be very good with preventing yesterday's problems. Companies need to say on their toes to make sure they are addressing tomorrow's problems."

Risen dramatically

The report found that the number of attempts to hack into company networks had risen dramatically over the last two years.

"What is a really big concern is the proportion of large businesses that say hackers have got into their networks," said Mr Potter.

Two years ago one percent of large businesses reported a hacker penetration compared to 13% in the current report.

The survey also said that figure was likely to be under-reported because many large firms did not admit to successful hacks on their networks.

Security breaches cost UK business roughly several billions pounds a year, said the report.

Thursday, April 10, 2008

Beijing Olympic Games and Cyber Security

Beijing Olympic Games and Cyber Security In order to meet the city’s demand for information security during the Olympic Games, the first municipal Information Security Emergency Response and Disposal Centre was set up in Beijing on April 1; and it will operate 24 hour a day. The Information Security Emergency Response and Disposal Centre has set up

Dot Asia Domain Names Sex all the Way

Dot Asia Domain Names Sex all the Way The ‘Landrush’ period for .asia domain names has just closed. Almost 300 domain names beginning with ’sex’ received more than one request for registration and will be auctioned to the highest bidder. And 14 organisations claimed prior right to use sex.asia. Of the names receiving multiple requests,

INDONESIAN SENTENCED TO 10 MONTHS IN PRISON FOR HACKING INTO HOTEL

A Lomita resident who admitted hacking into business kiosks at hotels and stealing credit card information that he used to obtain credit was sentenced this afternoon to 10 months in federal prison. Hario Tandiw idjojo, 28, an illegal alien from the Indonesia, was sentenced by United States District Judge Gary A. Feess, who also ordered the defendant to pay $34,266 in restitution.
In December, Tandiwidjojo pleaded guilty to one count of unauthorized access to a protected computer to conduct fraud. In a plea agreement, Tandiw idjojo admitted that he hacked into approximately 60 computers inside business kiosks operated by Showcase Business Centers, Inc. Tandiw idjojo bypassed four password checks that Showcase Business Centers had in place on their computers, using passwords he obtained while employed by a company that serviced the business kiosks.
After hacking into the computers, Tandiw idjojo installed malicious software that allowed him to intercept data, such as credit card information from customers who used the business kiosks. The malicious software transferred the stolen customer data to a website Tandiwidjojo controlled. Tandiwidjojo then used this information to fraudulently make charges to the stolen credit card accounts. The $34,266 in losses resulted from only three days of computer intrusions in February 2007.
When FBI agents searched Tandiwidjojo' s residence in August, they discovered a credit card writer that is used to put information on magnetic strips on credit cards, a credit card terminal used to process credit card transactions, multiple bank and gift cards, and a California driver' s license with Tandiwidjojo' s picture but another individual' s name.This case was the result of an investigation by the Federal Bureau of Investigation.

Cyber crime stays one step ahead

What started as the preserve of geeky hackers has become a multibillion-pound, international criminal industry, reports Sarah Arnott
Saturday, 22 March 2008

Computer crime is not only exploding in volume but is mutating faster than it can be contained, a new report to be published next week will warn.
Some 2.5 million new types of malicious programme have been launched in the past two months alone – more than the previous 15 years put together, according to the latest data from the security firm Trend Micro. The UK now has around 1.25 million “infected” computers. And the average number of PCs across the world sending out spam emails every month shot up to 10 million last year, more than double the 4.2 million in 2006, which was double the 2.1 million in 2005.
What began as the preserve of geeky hackers showing off to their peers has become a multi-billion-pound, international criminal, industry including unsolicited email “phishing” campaigns to con people out of financial details and passwords, and complex extortion rackets.
In the age-old cat and mouse of the good guys against the bad, each side inspires the other to ever greater levels of sophistication. And as viruses evolve, taking root on everything from digital cameras to USB memory sticks, simply securing a corporate infrastructure may no longer be enough.
A key tool for the cyber-criminal is the botnet – an array of computers that are recruited by a virus and can then be controlled from one place, often without their owner’s knowledge. Botnets can include tens of thousands of individual PCs, and have all manner of nefarious uses, including mass spamming, propagating yet more viruses, and crashing target websites by bombarding them with visitors.
The latest versions may even have automatic-recovery and self-healing features that parallel the most advanced corporate networks. And botnets are now rented out – for around $1,000 (£504) for 10,000 computers.
“These criminals are clever, and there’s lots of money to be made, so they are motivated to create more and more sophisticated infrastructures,” Dave Rand, the chief technology officer at Trend Micro, said. “Part of the problem is that they no longer set out to take down the computer, but continue operating it without anyone’s knowledge.”
The current estimate is that there are 175 million infected computers live on the internet today. And cyber crime is worth billions of dollars. But incidences are so diverse, and the techniques are evolving so quickly, that it is almost impossible to gauge the true scale of the problem.
In value terms, the biggest scam at the moment is “click fraud”, where scurrilous websites that are being paid by advertisers on a per-click basis use botnets to bombard the site with apparent interest. Second is good, old-fashioned, fraud – using credit-card details, online accounts or electronic transfers – based on information stolen either from individuals’ computers or from insecure company databases. Third is extortion – often against gambling sites in the run-up to major sporting events – where botnets are used to prove the site can be knocked down unless payment is received.
The criminals’ techniques are continually developing. This month, for example, saw the first botnet involving both humans and machines. To circumvent security measures in signing up free email accounts, a criminal group set up a high-tech sweat shop in India to process the part of the application that cannot be done automatically.
And hardware is starting to become infected in the manufacturing process, before it has even left the factory. Though the numbers are small so far, there have been recorded problems with Apple iPods, TomTom satnavs and, most recently, digital picture frames. “Anything which has storage capacity and can be plugged into a computer could now be carrying a virus,” Graham Cluley, the senior technology consultant at Sophos, said.
How to enforce the law in the new Wild West
*The problem with cyber crime is that it is ahead of the game. It is ill-defined, international and difficult to trace. And it is often not even clear which laws are being broken.
However, it is possible to have an impact. International comparisons show that developed economies – with stricter copyright laws, higher awareness levels and more modern technology – have lower virus levels. Turkey, for example, has 2.5 million infected computers, double the number in the UK and five times that of the Netherlands.
But even in countries with a sense of the problem, there are no easy answers as to who takes responsibility for what.
Some point the finger at the internet service providers (ISPs). “If the top 10 ISPs in the world spam league did anything, we would all be getting two orders of magnitude less,” Dave Rand, chief technology officer at Trend Micro, said.
But the internet industry says legitimate providers already have complex and effective anti-spam measures.
“For any measures to be truly effective, every network operator in the world has to do likewise because there is no discrimination in terms of where an infected computer is,” a spokesman for BT said. “And consumers also have a role to play in ensuring they protect their system appropriately.”
Any success in tackling the problem will rely on a co-ordinated approach – including the internet industry, the Government, and end users. It will also mean finding ways to frame laws that are sufficiently loose to keep up with technological change, but sufficiently strict to be enforceable.
“Online crime is on the rise, and there is a growing awareness that it can only be addressed collectively,” Jeremy Beale, head of ebusiness at the CBI, said.
Critics say the Government needs to put its money where its mouth is.
Lord Broers – who chairs the House of Lords committee that branded the internet as the new Wild West – says online law enforcement should be a priority.
“The Government should do a better job in gathering data on internet crime and fraud,” Lord Broers said. “And we have to shift resources into this sort of policing.”

RETIREMENT AGE OF JUDGES

A proposal to increase the retirement age of the Judges of the Supreme Court and the High Courts by three years is under examination of the Government. As regards increase in the retirement age of District/Subordinate Court Judges, it is the concern of the respective State Governments. This information was given by Minister of Law and Justice, Shri H. R. Bhardwaj in written reply to a question in Rajya Sabha.

Friday, March 14, 2008

Smart Technology. Reliable Solutions.

Many of us often think of doing there organization work streamline and automate but are confused in taking the right decision, the right decision and the right choice of service provider. The same happened with one of my friend who wanted to do this but was very confused to make the right choices until he found this cool site, Axacore for provide core technology and it really helped him a lot. A much as i know about his work, he was very much happy with his decision and also he enjoyed his organization work.

Axacore is a core technology provider of Faxing and Document imagin solution. He develops solution that help organizations streamline paper-intensive business processes and automate the flow of documents of team members, customers,partners and vendors.

My friend enjoy the service provided to his organization like fax service,document management, fax software, fax to email etc.

I hope you will like my idea of sharing my views over Technology and solution. May it help some of you make your work better.

Thursday, March 13, 2008

Smart Technology. Reliable Solutions.

Many of us often think of doing there organization work streamline and automate but are confused in taking the right decision, the right decision and the right choice of service provider. The same happened with one of my friend who wanted to do this but was very confused to make the right choices until he found this cool site, Axacore for provide core technology and it really helped him a lot. A much as i know about his work, he was very much happy with his decision and also he enjoyed his organization work.

Axacore is a core technology provider of Faxing and Document imagin solution. He develops solution that help organizations streamline paper-intensive business processes and automate tha flow of documents of team members, customers,partners and vendors.

My friend enjoy the service provided to his organization like fax service,document management, fax software, fax to email etc.

I hope you will like my idea of sharing my views over Technology and solution. May it help some of you make your work better.

Saturday, March 1, 2008

New Company

Bloggerwave is a Europes biggest advertsing media on blogs and you can make money on your blogs with Bloggerwave.

Bloggerwave campaign “Life as it should be” is real fun on the Internet. You can make your own money free of cost with Bloggerwave. If you have got a blog, you are already closing in on the money. how? it's easy. we have got advertisers that would like you to write about their products or service. so you do, in your blog and get Paid!!!

This is living “life as it should be”. Beat your friends to it

link- http://www.bloggerwave.com

New Company

Bloggerwave is a Europes biggest advertsing media on blogs and you can make money on your blogs with Bloggerwave.

Bloggerwave campaign “Life as it should be” is real fun on the Internet. You can make your own money free of cost with Bloggerwave. If you have got a blog, you are already closing in on the money. how? it's easy. we have got advertisers that would like you to write about their products or service. so you do, in your blog and get Paid!!!

This is living “life as it should be”. Beat your friends to it

link- http://www.bloggerwave.com

New Company

Bloggerwave is a Europes biggest advertsing media on blogs and you can make money on your blogs with Bloggerwave.

Bloggerwave campaign “Life as it should be” is real fun on the Internet. You can make your own money free of cost with Bloggerwave. If you have got a blog, you are already closing in on the money. how? it's easy. we have got advertisers that would like you to write about their products or service. so you do, in your blog and get Paid!!!

This is living “life as it should be”. Beat your friends to it

Techie sues cell co, police

A Bangalore-based software engineer, Lakshmana Kailash K, who was wrongly jailed for 50 days last year by the Pune police cyber cell, has demanded Rs 20 crore in damages and slapped a legal notice on telecom giant Bharti Airtel, principal secretary (Home) Maharashtra government and assistant commissioner of police (financial & cyber crime unit), Pune police.

Lakshmana had been falsely accused of an internet crime - posting unseemly pictures of Chattrapati Shivaji on the web - and was arrested based on the internet protocol address provided by his internet service provider, Bharti. As it turned out, the IP address was not his.

But by the time the police confirmed this and acted on it, he had already spent 50 harrowing days at the Yerwada Jail with hardened criminals, had tasted lathi beatings and was made to use one bowl to both eat and for the toilet.

Lakshmana’s nightmare, first reported in TOI on Nov 3, 2007, sparked condemnation on the web with internet communities posting their outrage. The techie’s 10-page legal notice, a copy of which has been sent to the NHRC, vents anger at the way in which the police and judicial system made nonsense of his rights and highlights the degrading conditions within the jail.

Friday, January 4, 2008

Police, eBay unite to fight cyber crimes

The Cyber Cell of the city police will soon score another point over their colleagues by working out an arrangement with eBay, the online...

Net criminals to target social networking sites in 2008

Cyber criminals are set to target social networking sites over the coming year, security firms have warned. Professionals in the field suggest that...

Cyber crime: 2008 might be gloomy

Financial frauds in the cyber space may rise in 2008, warn online security vendors.

Sexual Spam Emails

Sexual Spam Emails A businessman alleged to be the source of millions of emails offering sexual enhancement pills has become the first person in New Zealand to be raided under tough new anti-spam laws. The Christchurch man had been identified by a Danish spambuster. Department of Internal Affairs (DIA) said the department had been investigating the international spam [...]