30 January 2012

‘Impossible to censor social media’

Supporting the internet giants like Google and Facebook, Jammu and Kashmir Chief Minister Omar Abdullah has said that internet is so far away from us to expect to censor it. He does not agree with this whole thing about Google and Facebook being called to censor everything. 

He said that he too has faced ‘mindless abuse’ by unidentified people on his Twitter account. 


The CM favored self-regulation in the social media, saying it is impossible to censor everything in the web. Omar said, “Some amount of self-regulation is needed in the social media where you get the worst kind of abuses by anonymous people......


Click here to read more ......

Solutions : www.xcyss.in

25 January 2012

Audit firms involved in scams face heavy fines

Jail up to 10 years and fines up to three times the scam amount await chartered accountants and audit firms found guilty in corporate frauds. Audit firms, including the global Big 4 - Pricewaterhouse, KPMGDeloitte and Ernst & Young - for the first time face punitive action, closure of business and stiff penalties for financial frauds as the government proposes a stricter regime to check scams and irregularities......


Click here to read more ......

Solutions : www.xcyss.in

24 January 2012

Wikileaks.org Hacked By Sec Indi Security Team

Sec Indi Security Team strikes again. This time also they have maintained their class. If you dig the history you will find that this group has already made thier influence in the cyber space. Earlier they have found SQL-i vulnerability on the official website of US Senate, also they have hacked the Admin panel of famous Indian website click India. Now they have targeted Wikileaks official website. And as expected they have found a Cross-site request forgery (CSRF) vulnerability in wikileaks website. ......


Click here to read more ......

Solutions : www.xcyss.in

23 January 2012

Don't be a victim of cyber crime


Searching online for a good bargain to snatch an iPhone or a Samsung Galaxy S2? A good number of Internet users regularly visit online retailers to find out prices, features and discounts. Surveys have shown that e-commerce in India has picked up even in rural areas. Convenience, ease and great deals on offer have resulted in a spurt in online shopping. This is good news for retailers.
Unfortunately, it's good news for hackers too. As online shopping becomes the most preferred method for purchasing items, online shoppers will also become the most preferred cybercriminal targets. Hackers have already devised many tricks to lure online shoppers into the game.
It all starts the moment you enter key search phrases like “cheap deals for smartphones” or “best mobile phone deals”. The same goes for cheap holiday packages. Online security solutions firms say that if you have clicked on certain links and answered a few queries online, you probably might have given out details of your credit card or online banking PINs.

Click here to read more ......

Solutions : www.xcyss.in

British headmaster of Bangalore school held for sending vulgar messages to boy student

Paul Francis Meekan, the British headmaster of Trio World School in Kodigehalli, was arrested on Saturday for allegedly sending vulgar messages through a social networking website to one of his boy students. 


"The accused used to frequently call my son to his chamber and talk about sex. He used to force my son to share his views on the subject. He posted sexual remarks on my son's social networking website account," the victim's parents said in a statement to the police....... 


Click here to read more ......

Solutions : www.xcyss.in

20 January 2012

Mega-hack attack by Anonymous hits FBI site


In retaliation for the US Federal Bureau of Investigation (FBI) shutting down file-sharing portal Megaupload, hackers from all over the world joined cyber activists ‘Anonymous’ to launch a massive attack on several major government and entertainment industry websites, including FBI’s official online page.
Among the websites the hacking group claims to have taken down are Universalmusic.com, Justice.gov, Recording Industry Association of America (RIAA), the Motion Picture Association of America (MPAA), the US Copyright Office and the Utah Chiefs of Police Association.......


Solutions : www.xcyss.in

19 January 2012

Cyber-bullying warning after Australia named world's worst

Kiwi parents should be worried by a study naming Australia as the world's worst place for cyber-bullying on social networking sites, say experts.
A survey of 24 countries by Ipsos Social Research Institute found almost 9 in 10 Australian parents said their child or another they knew in their community had experienced harassment on sites like Facebook.
The figure was much higher than the global average of six in 10.
The rise in cyber-bullying was particularly prevalent on popular sites such as Facebook, which bullies used for intimidation, and harassment. There has also been an increase in the number of fake profiles designed to damage a person's reputation.


The Ipsos study involved 18,000 students from countries including the USA, UK, Russia, Germany, Australia, China, Turkey, Poland, Mexico, Brazil, India, Indonesia and Saudi Arabia......


Parents should monitor their children's internet use, get involved in their online lives and speak to them about appropriate behaviour on the internet....


Click here to read more ......

Solutions : www.xcyss.in

Suspicion grows China was behind hack of U.S. commission

Suspicion is growing that operatives in China, rather than India, were behind the hacking of emails of an official U.S. commission that monitors relations between the United States and China, U.S. officials said.

News of the hacking of the U.S.-China Economic and Security Review Commission surfaced earlier this month when an amateur "hacktivist" group purporting to operate in India published what it said was a memo from an Indian Military Intelligence unit to which extracts from commission emails were attached.

But U.S. officials who spoke to Reuters on condition of anonymity said the roundabout way the commission's emails were obtained strongly suggests the intrusion originated in China, possibly by amateurs, and not from India's spy service.

A large cache of raw email data from the security breach, reviewed by Reuters, indicates that the principal target of the intruders was not the commission, but instead a Washington-based non-governmental pro-trade group called the National Foreign Trade Council (NFTC). The trade council is headed by William Reinsch, a former top U.S. Commerce Department official who until recently served as the U.S.-China Commission's chairman.......


Click here to read more ...... 

Solutions : www.xcyss.in

18 January 2012

Wi-Fi networks under virus risk


Indian computer security analysts have detected and alerted Wi-Fi users in the country against a possible virus attack that could lead to crashing and hacking of secure networks.
The Indian Computer Emergency Response Team (CERT-In), country’s national agency to respond to computer security incidents, has found that the “Wi-Fi Protected Setup (WPS) contains a design error that could allow a weaker-than-expected defence against brute-force attacks, which could allow an attacker to gain unauthorised access to the affected system.”
The virus is streaming in the Indian Internet networks with a high severity. The combat mechanisms are being deployed. An un-authenticated, remote attacker within range of the wireless access point could use the PIN (password) to gain unauthorised access to the device to retrieve the password for the wireless network or change the configuration of the device.....

Click here to read more ......

Solutions : www.xcyss.in

17 January 2012

Impossible to pre-screen content: Google, Facebook

Expressing their inability in filtering the content posted on their websites, Google and Facebook told the Delhi high court that there was no way in which they can stop an individual from posting anything on their profile online. They asserted that the social networking sites do respect a person’s freedom of speech and expression......
Both companies are among 21 whose executives have been summoned to appear in person in a trial court on March 13 for allegedly hosting obscene and objectionable content......


Google said it is working as a search engine, its filtration will lead to surfers to sites they’re looking for.......

Click here to read more ......

Solutions : www.xcyss.in

16 January 2012

Teamgreyhat Official Forum Hacked

Official Forum of one of the most popular hackers group named Teamgreyhat get hacked. A hacker named Hunt has hacked into the TGH's web-server and deface the index page. Also the hacker has claimed that he has breached all the data from that particular server. Since 2011 Teamgreyhat has became very popular form for hackers and also TGH is regarded as one of the most dangerous blackhat team as because if you dig the history you will find that TGH has rooted many web-servers and hacked millions of sites. Their last breach on Ankit Fadia's server gave them more popularity. But this hack will surely make a negative impact of TGH's reputation. The hacker also created deface mirror on the Arab-zone.
Click here to read more ......

Solutions : www.xcyss.in

New phishing attack on Facebook

Kaspersky Lab researchers have warned of a new phishing attack on Facebook that uses hijacked accounts to pose as the social network's security team and trick users into divulging credit card numbers.

The latest scam is unique because it doesn't just try to get Facebook users to click on a link to a malicious Web site.The attackers also use the stolen information to log into the person's account and swap the profile picture with a Facebook logo and change the name to "Facebook Security."


Once the account is compromised, it is used to send out a message to all contacts, warning them that someone has reported a problem with their accounts and they will be turned off unless re-confirmed by the accountholder. Within the message is a link that takes victims to a Web sited dressed to look very similar to a Facebook page. Once on the Web site, the cyber criminals ask for name, e-mail, password, Webmail system and password to e-mail.

Click here to read more ......
Solutions : www.xcyss.in

Net addicts' brains like cocaine users

Most are gamers who get so involved they go without food and water for extended periods. Internet addiction has for the first time been linked with changes in the brain similar to those seen in people addicted to alcohol, cocaine and cannabis. In a groundbreaking study, researchers used MRI scanners to reveal abnormalities in the brains of adolescents who spent many hours on the internet, to the detriment of their social and personal lives. The finding could throw light on other behavioural problems and lead to the development of new approaches to treatment, researchers said. 

An estimated 5 to 10 per cent of internet users are thought to be addicted - meaning they are unable to control their use. The majority are games players who become so absorbed in the activity they go without food or drink for long periods and their education, work and relationships suffer. 


A mother was jailed for 25 years after her daughter starved to death while she played an online game for hours at a time. Rebecca Colleen Christie, 28, from New Mexico in the US, played the fantasy game World of Warcraft while her three-year-old daughter, Brandi, starved. The toddler weighed 23lbs when she was finally rushed to hospital......... 


Click here to read more ......

Solutions : www.xcyss.in

13 January 2012

We'll do a China, Delhi HC warns Facebook and Google

Refusing to stay criminal proceedings against social networking site Facebook India and search engine Google India, the Delhi high court on Thursday warned that they can be "blocked" like in China if they failed to remove objectionable material from their web pages.

"Like China, we will block all such websites," Justice Suresh Kait told the counsel for Facebook and Google India. The court asked them to devise a mechanism to keep a check on "offensive and objectionable" material and remove such content from their web pages.


Solutions : www.xcyss.in

12 January 2012

Pro-Israel hackers threaten tit for tat after credit card leak

A hacker called OxOmar, who claimed to be a member of Saudi hacking group Group-XP, leaked a series of lists supposedly containing the details of 400,000 shoppers who had purchased goods from Israeli sports website, One.co.il, and elsewhere. Local banks claimed much of the information was either out of date or duplicate, and that only 14,000 credit card records were actually exposed.
....


Israeli deputy foreign minister Danny Ayalon stated the attack was "a breach of sovereignty comparable to a terrorist operation, and must be treated as such", adding that "Israel has active capabilities for striking at those who are trying to harm it, and no agency or hacker will be immune from retaliatory action".
...

Click here to read more ......

 Solutions : www.xcyss.in

Fake memo but real code? India-U.S. hacking mystery deepens


NEW DELHI | Thu Jan 12, 2012 12:00am IST
(Reuters) - A memo that triggered a U.S. investigation into a possible cyber-attack by Indian military intelligence is probably a fake, but it is clear from leaked documents that serious security breaches did take place.
A little-known hacker group, 'Lords of Dharmaraja', began posting the documents last year, but only drew widespread attention after the anti-virus software firm Symantec confirmed on Saturday that a segment of its source code had been accessed by the group.
Reuters has obtained a large digital cache appearing to contain emails that were posted by the group but were quickly blocked by file-sharing sites.
.....
"It's also possible that Pakistan's hackers have done it, or China's hackers," said Mukesh Saini, an expert on cyber-security who served on the secretariat of India's national security council, an intelligence agency, until 2006
......
"An individual could have hacked someone's personal computer and handed it over to the embassy. There are so many means and measures," said Saini, who himself was charged with leaking secrets to Washington in 2006. He proclaims his innocence.
"There may be cooperation between India and the United States, the United States may have shared them, or India could have done the hack ... or a third country may have handed it to India," said Saini.
It is also unclear how Symantec's source code ended up with the Lords of Dharmaraja, whose public face goes by the name Yamatough on a Twitter feed.
Yamatough, whose profile picture shows a Tibetan painting of Dharmaraja, the Hindu god of death and justice, follows many members of the "Anonymous" hacking collective, and Symantec attributes the hack to that group.
"We are still investigating exactly where or how Anonymous accessed the code, but to date we have found no evidence that we shared any information with the Indian government," Symantec said in a statement.
"If the Indian government was indeed in possession of the code - as Anonymous claims and which has not yet been verified - we have no indication that it came from Symantec or as a result of our software assurance processes."



Click here to read more ......

 Solutions : www.xcyss.in

Hacking group's target is Sunil Mittal, wants 'pro-US' govt

The hacking group behind the release of documents alleging India was using mobile phone companies to spy on a United States Congress-appointed body now says its aim is to 'lessen the influence of Sunil Mittal [ Images ], Chairman and CEO, Bharti Enterprises', and to undermine the current 'regime' in favour of a more 'pro-American' alternative.

'YamaTough,' the activist behind the 'Lords of Dharmaraja' hackers group, told Infosec Island, an information security Web site, 'Our goal is Bharti Mittal go off political arena and stop manipulating our government.'

'...my team is pro US, we fight for rights in our country we are not intentionally harm US companies (sometimes we do hack into since our botnet is worldwide) but we do not steal credit cards and make money of it and we do not do banks etc. Our mission -- exposure of the corruption,' 'Yamatough' reportedly Infosec Island in this report.

Click here to read more ......

Solutions : www.xcyss.in

11 January 2012

Ankit Fadia Hacked by Teamgreyhat

Self called ethical hacker Ankit Fadia is under cyber attack. Hacktivist group Teamgreyhat has officially declared operation against Ankit Fadia. According to official press release TGH said #target Ankitfadia Engaged. In this attack they have successfully hacked into the Ankit Fadia's offcial site and exposed lots of credentials including sensitive data, student details, DB credentials (DB Name, User Name & Password) and many more. 

Click here to read more ......

 Solutions : www.xcyss.in

Muslim Cleric Says Facebook Un-Islamic, Membership Sin

A Muslim cleric from Iran has claimed that the social networking site Facebook is un-Islamic and being a member of it is a sin, the ISNA news agency reported.

"Basically, going to any website which propagates immoralities and could weaken the religious belief is un-Islamic and not allowed, and membership in it is therefore a sin," the unnamed cleric said, replying to the news agency's question regarding Facebook and Iranian citizens who are members of Facebook.

"Only the use of websites propagating religious criteria and not leading to any kind of ethical immoralities is of no problem," he added.

Being an Islamic nation, Iran's senior clerics have the right to pronounce opinions on matters pertaining to the society and citizens in the light of religion, which are regarded as decrees to be followed.

Facebook's official figures released last October stated that 17 million Iranians have a Facebook account, despite government restrictions on the Internet.

Iran uses a filtering system developed by Secure Computing Corporation, SmartFilter, to block high traffic Web sites including Facebook and New York Times.

The filter also blocks access to most pornographic sites, gay and lesbian sites, activist sites, news media, sites that provide tools to help users cloak their Internet identity and other sites defined as immoral on various grounds by the government.

Click here to read more ......

Solutions : www.xcyss.in

Terorrist groups using Facebook for recruitment

Terrorist groups, blacklisted by the US, are relying on Facebook to urge users to join and support Hezbollah, Hamas and other militant groups.

"Today, about 90 percent of organized terrorism on the Internet is being carried out through the social media. By using these tools, the organizations are able to be active in recruiting new friends without geographical limitations," says Gabriel Weimann, professor at the University of Haifa.

The most advanced of Western communication technology is, paradoxically, what the terror organizations are now using to fight the West.

The shift to social media, and especially Facebook and Twitter, has not bypassed terrorist groups, who are keenly interested in recruiting new support in the new media's various arenas, chat rooms, YouTube, Myspace, and more.

The social media is enabling the terror organizations to take initiatives by making 'Friend' requests, uploading video clips, and the like, and they no longer have to make do with the passive tools available on regular websites.

Facebook platform is being used as a resource for gathering intelligence.

Click here to read more ......

Solutions : www.xcyss.in

Hackers Targeting Non-government Organizations Using Backdoor Assaults

Researchers at Computer Security Company Trend Micro are reporting non-government organizations (NGOs) that are getting attacked with backdoor-assaults resulting from a website hijack that unleashed one destructive Java applet identified to be JAVA_DLOAD.ZZC and abusing a security flaw within Java.

The flaw, JAVA_DLOAD.ZZC exploits, is called CVE-2011-3544 and its exploitation results in the installation of TROJ_PPOINTER.SM that in turn plants BKDR_PPOINTER.SM. Linking up with one particular URL, BKDR_PPOINTER.SM exchanges instructions with its controller. Moreover, while on the infected PC, it collects information regarding that machine too.

Furthermore, investigation reveals that the first NGO struck is probably one target from the several within this assault, while the assault as such is particularly devised to hit the targets. Investigators during the probe discovered that cyber-criminals used the attack strain associated with the NGO on human rights for labeling both the newly created file and associated folder within the hijacked Brazilian site: "hxxp://{BLOCKED}.com.br/cgi-bin/ai/ai.jar" and "hxxp://{BLOCKED}.com.br/cgi-bin/ai/ai.html."

Nart Villenueve, Researcher at Trend Micro tested this and discovered more files and their folder that were supported on the same hijacked site although with separate strains, thus strongly indicating that other targets too existed.

What's more, the files recovered via the web addresses such as "hxxp://{BLOCKED}.com.br/cgi-bin/so/so.html," "hxxp://{BLOCKED}.com.br/cgi-bin/hk/hk.jar" and "hxxp://{BLOCKED}.com.br/cgi-bin/hk/hk.html" too contained the identical strain, with the files currently identified as BKDR_PPOINTER.SM and JAVA_DLOAD.ZZC.

Researchers from the Trend Micro Company said that the attack seemed as being related to one wicked plan for striking human rights activists.

Click here to read more ......

Solutions : www.xcyss.in

BEWARE: More Facebook Phishing Emails Circulate

Does Mark Zuckerberg have a special place in your heart? Do you like Apple? Scammers are using the popularity of the Facebook chief executive officer and Apple in yet another phishing scheme via email claiming you are the lucky winner of an iPhone and iPad.

Do yourself a favor and delete any message you receive that says:

My name is Mark Zuckerberg, Chief Executive Officer of Facebook. We have recently partnered up with Apple company for a one-time promotional event today, we are giving away free Apple iPhones and iPads to randomly selected individuals who have been fortunate to be picked as one of our newest winners for today. We randomly selected users from our systems database and you have matched with our latest drawing.

We have partnered up with Apple to advertise their most popular product yet, the Apple iPhone and iPad. Once again, we are running this campaign for one-day only. All you need to do is CLICK HERE to check out our web site made for this promotion and fill out this short survey to get yours for free. Simply make sure you enter your email so we may locate our records to guarantee that we have reserved one for you. That is it!

Clicking on the link within the email takes you to a survey which claims that you could win an iPhone 4S.

The incongruence between the promised iPhone and iPad, and the chance to win an iPhone 4S are beside the point. The probability of you actually receiving something from emails like this is zero. In this particular case, the survey takes you to a mobile phone service, which you can sign up for, from which the scammer earns a commission.

Click here to read more ......

Solutions : www.xcyss.in

10 January 2012

Infographic: Worldwide Information Security Products Spend


...
Once inside your house, a burglar needs to poke around to find your most valuable items – the silver in the dining room and the jewelry in the bedroom – before he can stuff them into a bag and make a run for it. Similarly, once an intruder’s inside your network, the attacker still needs to find and package your organization’s critical and sensitive information before the real damage is done. Most often, there is plenty of time, from the initial breach of the “front door” to the exfiltration of the data, to take proactive steps to stop or minimize the impact of the attack. Despite that, only 1.1 percent of all security budgets are spent “inside the house,” actively watching the attack as it is happening and responding to the intrusion to minimize the impact.




Click here to read more ......
 Solutions : www.xcyss.in

U.S. probes alleged hacking by India govt spy unit

U.S. authorities are investigating allegations that an Indian government spy unit hacked into emails of an official U.S. commission that monitors economic and security relations between the United States and China, including cyber-security issues.

The request for an investigation came after hackers posted on the Internet what purports to be an Indian military intelligence document on cyber-spying, which discusses plans to target the commission - apparently using technical know-how provided by Western mobile phone manufacturers.

Appended to the document are transcripts of what are said to be email exchanges among commission members.

The document's authenticity could not be independently verified. But the U.S.-China commission is not denying the authenticity of the emails.

Officials in India could not be reached for comment on the document's content or authenticity. One India-based website quoted an unnamed army representative as denying that India used mobile companies to spy on the commission and calling the documents forged.

The purported memo says that India cut a technological agreement - the details are not clear - with mobile phone manufacturers "in exchange for the Indian market presence." It cites three: Research in Motion (RIM.TO), maker of the BlackBerry; Nokia (NOK1V.HE); and Apple (AAPL.O).

Apple spokeswoman Trudy Muller said her company had not provided the Indian government with backdoor access to its products. A spokesman for Nokia declined comment; RIM officials could not be reached for comment.

The U.S. Congress created the commission in 2000 to investigate and report on the national security implications of the economic relationship between the United States and China. The bipartisan, 12-member panel holds periodic hearings each year on China-related topics such as cyber security, weapons proliferation, energy, international trade compliance, and information policy.

The email breach, if confirmed, would be the latest in a series of cyber intrusions that have struck U.S. institutions ranging from the Pentagon and defense contractors to Google Inc (GOOG.O).

Many of the previous hacks have been blamed on China. In this case, it is unclear whether India might have been eavesdropping on the U.S.-China commission for itself or sought to pass any information collected to authorities in China.

Click here to read more ......

Solutions : www.xcyss.in

Doctor arrested for obscene uploads

The CID arrested a doctor on Monday for allegedly publishing obscene morphed images and abusive material about a software engineer on Orkut. According to the CID, the accused doctor used online social networking websites to defame the victim. A complaint was lodged by the victim’s parents with the cyber crime cell on November 2.

During the investigation, the IP addresses of the postings were collected from Orkut. Using the IP addresses, Dr Manohar was identified. He was arrested on Monday and the cops seized his laptop and data card. Manohar said he used to give missed calls to mobile phones randomly, and that he had accidentally come in contact with the daughter of the complainant who happened to be a software engineer.

He said he became friendly with the woman and asked her to marry him, but she refused. Manohar said that to avenge this, he had started harassing her over the phone and by sending abusive emails. The police said that the accused allegedly created a fake profile in the name of the victim on Orkut, and uploaded obscene morphed images and abusive content about her. He also sent “friend requests” to many friends and colleagues of the victim from the fake profile.

The girl didn’t know of her fake profile till a friend got a “friend request”. The cops booked a case against the doctor. Posting images of anybody without consent is an offense. Creating a profile using another person’s name without their consent is also an offense. Those who post material on the Net can be tracked using their IP numbers.

Click here to read more ......

Solutions : www.xcyss.in

09 January 2012

Malware can empty out your bank a/c

Doing online banking frequently? Beware, as cyber-criminals have launched a new malware that not just steals your money from your bank, but also offers false reassurance that it's still there, experts have warned.

The attack, a new version of trojan horse SpyEye software that targets computers using Windows, has been detected in the United States and the United Kingdom.

According to Trusteer, a security company which detected the attack, the software, which steals your bank passwords to give access to your account, waits for you to enter the same banking details before "adjusting" what you see.

The idea is to gives criminals more time to usedebit card details on fraudulent transactions without the person realizing it's happening.

The malware is designed in a way that when one visits his or her online bank, there will be no trace of the transactions that cyber-criminals are using to empty the bank account. Worse, the balance will also be adjusted on screen so it looks as if nothing is happening. The next time the victim visits their online banking site, the malware hides the fraudulent transactions, as well as artificially changing the total balance.

As a result, the deceived customer has no idea that their account has been 'taken over', nor that any fraudulent transactions have taken place. SpyEye is a tweak of the Zeus crimeware kit that grabs web form data within browsers," says the Naked Security blog at web security experts Sophos.

The new Trojan, instead of intercepting or diverting email messages, hides bogus transactions even after users have logged out and then logged back into their accounts. With hi-tech cyber attacks such as SpyEye, there are few visible signs that anything is wrong. There are defences, though - ensure your browser is up to date, manually updating it if necessary," experts said.

Thus, it is important that users should ensure that the "anti-phishing option is switched on" in their web browser that which will check for "blacklisted" websites and prevent the browser from being directed to the "fake" version that delivers your bank statement.

Click here to read more ......

Solutions : www.xcyss.in

Hackers break into heart of anti-virus giant Symantec

Symantec, the top maker of security software, said hackers had exposed a chunk of its source code, which is essentially the blueprint for its products, potentially giving rivals some insight into the company's technology.


The developer of the popular Norton antivirus software said the hackers stole the code from a third party and that the company's own network had not been breached, nor had any customer information been affected.


The software maker would not confirm the claim of a group called the Lords of Dharmaraja, who said that they had obtained Symantec's source code by hacking the Indian military.


Click here to read more ......

Solutions : www.xcyss.in

Gujarat IPS officer's email account hacked

The email account of IPS officerRajnish Rai has been hacked, police said.

The officer registered a complaint on Friday after he found that password of his Gmailaccount had been changed without his knowledge, police said.

According to the complaint, the account washacked before January 6 by some unknown person.

A case has been registered under Section 66 of the Information Technology Act.

Police said that they have written to the email service provider Google about the alleged hacking and awaiting a response from them.

Rai had come into prominence when he arrested three IPS officers D G Vanzara, Rajkumar Pandiyan and Dinesh M N, and other.

Click here to read more ......

Solutions : www.xcyss.in