29 February 2012

Top 12 Countries for Cloud Computing


Cloud computing—a mix of software-enabled resources and services that can be delivered to a user on an as-needed basis—is the engine that drives today’s global, cross-border business.

But when it comes to a consistent legal, structural and regulatory framework to deliver these services, developing countries like India, China and Brazil—increasingly targeted for global growth by insurance carriers and other industries—are seriously lagging, according to a new study by the Business Software Alliance (BSA), an international IT industry group with policy, legal and/or educational programs in 80 countries.



Click here to read more ......

Solutions : www.xcyss.in

In cyber era, militaries scramble for new skills


With growing worries about the threat of "cyber warfare," militaries around the world are racing to recruit the computer specialists they believe may be central to the conflicts of the 21st century.
But whilst money is plentiful for new forces of "cyber warriors," attracting often individualistic technical specialists and hackers into military hierarchies is another matter.
Finding the people to command them is also tough. After a decade of messy and relatively low-tech ground wars in Iraq and Afghanistan, some senior western officers are if anything less confident with technology such as smartphones and tablet computers than their civilian contemporaries.
Cyberspace requires a world-class cyber warrior ... we must develop, recruit and retain in a different way to today..

Click here to read more ...... 

Solutions : www.xcyss.in

Social media new tool for illegal drug trade

Social media is the new tool for traffickers to smuggle drugs and narcotics globally, the Narcotics Control Bureau (NCB) on Tuesday said while seeking effective steps to check its misuse. Illegal Internet pharmacy is very new emerging trend and it is very infinite.



The trend was noticed by the enforcement agency in past years and is currently in vogue as number of such "illegal internet pharmacies" are being run by people.
"It is very difficult to catch people or consignment if they are sending through internet. We can only check with the information." Director General of NCB OPS Malik said.
He said that most of such online sellers are using social media for exchange of information.

Click here to read more ...... 

Solutions : www.xcyss.in

Facebook India asserts it is not responsible for user content


The quiet on the lawsuit accusing 21 social networking websites in the country for allegedly hosting objectionable content certainly doesn't mean it's over. The latest comes from Facebook India, one of the accused in the case. Now, the Economic Times reports that the social networking site, in one of  its appeals made at a trial court in Delhi stated that they are not responsible for the content that their users upload, and hence, their name be removed from the accusation list.

The report further stated that, "Facebook, which has about 46 million users in India, pleaded before the court to remove its name as one of the parties in the petition saying "it is not responsible for hosting the content that may appear on Facebook.com or any website". It said that it is being wrongly prosecuted under the incorrect description of 'Facebook' and stated that its correct addressal is 'Facebook India Online Services Pvt Ltd'."

Importantly, Facebook India added that it did not control or operate the servers, which host the Facebook.com website, located in the U.S.

Click here to read more ......

Solutions : www.xcyss.in

28 February 2012

Scammers "Phishing" For Credit Card Security Numbers


Scammers are trolling the waters for your credit card information, using a new "phishing" scam that's targeting the trust of credit card users.
The scammer poses as a representative asking if there have been any purchases or changes to your account.
If you say no then asks you to repeat the credit card number and the three number security number. Chances are they already have your information, but need the three digit code to make a purchase.

Click here to read more ...... 

Solutions : www.xcyss.in

Government to set up agency to scan tweets, emails and updates

The government is setting up an internet scanning agency which will seek to monitor all web traffic passing through internet service providers in the country. The scanning agency to be called National Cyber Coordination Centre (NCCC), will issue 'actionable alerts' to government departments in cases of perceived security threats. 

The move comes as the government has been unable to prevent many terror attacks, in the absence of a credible internet scanning system. All government departments will now talk to the Internet Service Providers such as Bharti Airtel, RCOM, BSNL,MTNL and Tata Communications through NCCC for real time information and data on threats. 


All tweets, messages, emails, status updates and even email drafts will now pass through the new scanning centre. The centre may probe further into any email or social media account if it finds a perceived threat. 
  
Click here to read more ...... 

Solutions : www.xcyss.in

27 February 2012

Many parents unaware of cyberbullying

Many U.S. parents are clueless about cyberbullying when it comes to their own child, a survey indicates. 

Parents might not know about bullying incidents because their children conduct social networking activities in a number of different locations, using a wide variety of devices, and across a broad range of media platforms. 

Although many parents said they think their children will tell them about cyberbullying, but they don’t,  because they are usually: 

– Embarrassed about the situation.

– They’re afraid of backlash from the bully or others.

– They fear losing access to their computer.

– They’re worried they did something wrong.
Click here to read more ......

Solutions : www.xcyss.in

Boy held for uploading obscene video to internet

Patna police on Saturday arrested a youth for allegedly uploading an obscene video of two teens, describing them as students of two prestigious schools of the city, to YouTube

The youth, Anshul Akhauri, is a BBA student of Admerit Institute, Patna and a resident of Syndicate Professor Colony at Buxar. The FIR was lodged under Section 66 (C)/67 (theft of identity and publishing obscene content on internet) of the Information Technology (amendment) Act, 2008. 

During investigation, police found the video was uploaded on July 10, 2011. Sources said the teens in the frame were not wearing uniforms and the video was apparently shot in a cybercafe. 
Click here to read more ......

Solutions : www.xcyss.in

WikiLeaks publishes security think tank emails


* Stratfor has been likened to a shadow CIA
* Company defiant, says it will not be cowed
* "Anonymous" hacker group helped obtain data
* Stratfor says some emails may be forged, altered
The anti-secrecy group WikiLeaks began publishing on Monday more than five million emails from a U.S.-based global security analysis company that has been likened to a shadow CIA.
The emails, snatched by hackers, could unmask sensitive sources and throw light on the murky world of intelligence-gathering by the company known as Stratfor, which counts Fortune 500 companies among its subscribers.

Click here to read more ...... 

Solutions : www.xcyss.in

After big tech firms, cyber attackers target small companies

After targeting big information technology companies, cyber attackers are now turning towards the more gullible of the lot: Small and medium non-IT enterprises, also known as SMEs.


SMEs are being targeted by cyber attackers on a regular basis. The reason is that non-IT SMEs do not have much investment in IT security infrastructure or solutions. Also, they are not fully aware of the current cyber security scenario. Nowadays, cyber attackers target those enterprises that are capital rich in nature, i.e. those maintaining good amount of money in their bank accounts for working capital requirements.


Such enterprises are usually from manufacturing sector, having less knowledge about cyber-attacks........


Click here to read more ......

Solutions : www.xcyss.in

17 February 2012

PHONE FERVOUR Nomophobia: Fear of life without mobiles

No doubt, cell phones have become a necessity in today’s world. But, a large number of Britons are now suffering from ‘nomophobia’ — the fear of being separated from their mobile, says a new study. 
    Researchers have found that two in three mobile users are terrified of being without their phone and the number has actually risen from 53% to 66% in the past four years, the Daily Mail reported. Young adults suffer the most.

    Among those aged 18 to 24, 77% were nomophobic. By comparison, 62% of those aged 55 and over fear losing their phones, while 59% of 35 to 44-year-olds were found to be nomophobic. 
   

Click here to read more ......

Solutions : www.xcyss.in

Woman kills self after MMS scandal

A mother of two hanged herself on Wednesday night after some local youthsmorphed some obscene photos of her and circulated them through MMS. Jesmina Bibi, 28, a resident of Bakdanga in Domkal, could not bear the humiliation and jeering by neighbours and killed herself.

Jesmina ran a grocery shop in the village. Kalu and his friends, attracted by Jesmina's beauty, had tried to capture her nude while she was taking bath in her courtyard a few months ago. But they did not succeed. 

A few days ago, villagers started jeering at my wife and went about displaying her photo on the mobile phone, said Bablu her husband. "On seeing the picture, we realized that they had taken Jesmina's photo while she was keeping the shop. Later, they superimposed her face on a nude body and circulated it," he added.
Click here to read more ...... 

Solutions : www.xcyss.in

India still on the back foot in countering cyber attacks

Cyber attacks have become a major worry for India [ Images ], as it has been repeatedly targeted by countries like Pakistan and China.

There were around 9,000 websites in India that were hacked in the past five years. The threat India has faced in the past has been brash -- like the attack on the Central Bureau of Investigation website a couple of months ago -- and has often been veiled.
The most shocking bit of information came when cyber security investigative officer Jeffrey Karr pointed out that it was the Stuxnet worm that brought down the Indian Space Research Organisation satellite INSAT 4B. He had also pointed out that this was done with an intention of serving China's business interests.......... 
In addition to this, India's oil rigs have been targeted through a method known as Supervisory Control and Data Acquisition (SCADA)........... 
Cyber security experts say that there is an ongoing war in the online space between India and Pakistan. There are a bunch of guys who call themselves as the Pakistan Hackers Army, who are under the control of their security establishment. So far they have been carrying out more attacks with the intention of embarrassing the security establishment in India. However, the real threat is not from these attackers, but from the ones targeting the SCADA software.
This would mean water boards, satellites, factories and power plants that cater to essential services would be hit once such an attack is carried out...... 
Indian Intelligence officials point out that there is a lot of snooping that is taking place on cyber space and there have been many instances to show that countries such as China are looking for information. Affected areas have been the border security control systems, the defence ministry and also the ministry of external affairs. It is no longer a minor problem and if India does not get its act together soon, the situation will become very serious.


Click here to read more ...... 

Solutions : www.xcyss.in

DDoS Attackers Start Targeting IPv6 Networks


Cybercriminals have started launching distributed denial-of-service (DDoS) attacks against networks that transmit data over IPv6 (Internet Protocol version 6), according to a reportpublished recently by DDoS mitigation vendor Arbor Networks.
Even though 2011 was the first year when IPv6 DDoS attacks were recorded, such incidents remain rare because they are not economically relevant for Internet criminals.
Some companies have projected increases of more than 100 percent for their IPv6 traffic volumes over the next 12 months, but the changes will be insignificant compared to the overall traffic volume.
The majority of organizations remain reluctant to switch to the new IP protocol version because their existent network security and traffic analysis equipment is not fully compatible with it.
Many infrastructure solutions currently do not offer the same features and functionality for IPv6 as they do for IPv4. This lack of feature parity means that security teams do not have the same visibility and mitigation capabilities when trying to identify and block IPv6-based attacks against targets.

Click here to read more ......

Solutions : www.xcyss.in

Andhra government websites hacked

In a major embarrassment to the state government on the eve of budget, hackers on Thursday broke into a server, maintained by information technology (IT) department, and added pages to websites of 27 government departments, including the crucial budget.ap.gov.in. 

The hacker created additional pages dz.htm and x.htm and named himself as BBOY1.

The important government orders site goir.ap.gov.in was also hacked and additional pages dz.htm and x.htm were added.


The hacking has happened in three stages: the State Data Centre, the government servers and the websites of different departments like general administration, commercial taxes, horticulture, remote and interior areas development, and government gazettes. The hacking has been done from a foreign location going by the algorithms used.
Click here to read more ...... 

Solutions : www.xcyss.in

16 February 2012

Bangladesh Cyber Army (BCA) Hit Indian Stock Market

The Cyber-War between India and Bangladesh is going on and on. But now its became rather one sided and most of the attack is coming from the Bangladeshi side. Recently they have released their second video where they vow to hit Indian Stock Market websites. During peak hour three main sites of Indian stock market was apparently down due to massive denial of service attack from BD hackers. As expected this DDoS attack surely effect the financial & banking sector of India.............
Click here to read more ...... 

Solutions : www.xcyss.in

15 February 2012

Man Jailed For Grooming Teen


An illegal immigrant has been jailed for three years for grooming a Harpenden 13 year old.
Ismail Kiggundu, 29, of Commonside East, Mitcham, encouraged the teenager to send him naked photographs of herself and persuaded her to travel from her home to his room in Surrey to have sex. 
He met her through an over 18s dating site called Tagged, where he told her he was 19. 
Even though he knew she was under-age he continued the relationship and encouraged her to bunk off school to see him. 

Click here to read more ...... 

Solutions : www.xcyss.in

B’desh group hacks BSF site to ‘avenge border killings’

 A group of Bangladeshi hackers have breached thousands of Indian websites, including that of the Border Security Force (BSF) and the Trinamool Congress. The attack came within hours of a Bangladeshi newspaper reporting that some Indian hackers had destroyed at least five of their government sites. 
    Simultaneously, Pakistan hackers gained access to about 2,000 Indian sites, claiming their object was “to hit Indian cyber fence and to defend Bangladeshi hackers in this ongoing cyber war”. Another hacker consortium hacked into more than 700 Indian websites. 

Click here to read more ......

Solutions : www.xcyss.in

13 February 2012

Several Indian Embassy Site Hit By Hackers


Hackers from different part of the world targeting several website of Indian Embassy. First THA Diasastar from The Hackers Army (THA) hit the official site of Indian Embassy Turkey. In that attack he has defaced one of the page of that site and also leaked sensitive data. The hacked credentials can be found on apastebin release by the hacker. Later an Indian hacker named Yasir changed the deface page of THA Diasastar and claimed that he has restored the site. 
Not only Indian Embassy Turkey but also Indian Embassy Indonesia faced cyber attack from a hacker named thec7crew. He has hacked the database & exposed many credentials including server details, db user name, password, tables, columns and so on. The hacked database can be found on anotherpastebin release. Also we would like to give you reminder that a hacker group named Ghost has hacked the Indian Embassy of Kathmandu and leaked lots of sensitive data.


Click here to read more ...... 

Solutions : www.xcyss.in

Hacker group attacks five Bangladesh official government websites


Hacking has always been the top most problem over internet and this time hackers, claiming to be Indians have attacked five official ministries websites of Bangladesh as well as that of a trade organisation. Websites were of the ministries of communications, youth and sports, primary and mass education, education and posts and telecommunications.


The sites went black and displayed the message: "Hacked by Love the Risk, Amal Landhe, Lnx Root, Silent Killer."

In between two eyes resembling Indian flags, the hackers wrote: "We have an EYE on you."

While, the name of the hacker group named "Indian Cyber Army" was also displayed over the website. 


Click here to read more ...... 

Solutions : www.xcyss.in

Microsoft's India store hacked, usernames & passwords stolen

Hackers, allegedly belonging to a Chinese group called Evil Shadow Team, struck at www.microsoftstore.co.in on Sunday night, stealing login ids and passwords of people who had used the website for shopping Microsoftproducts.

While it is troublesome that hackers were able to breach security at a website owned by one of the biggest IT companies in the world, it is more alarming that user details - login ids and passwords - were reportedly stored in plain text file, without any encryption......

Click here to read more ...... 

Solutions : www.xcyss.in

11 February 2012

Morphed nudes new extortion weapon

A Mumbai businessman received a letter warning that if he did not pay up Rs 5 lakh, his wife's nude pictures would be pasted on buildings near his office and home.... 

The police nabbed two men, Deepak Narayan Dandekar (49) and Krishna Shankar Mahatre (42). It transpired during the interrogation that Dandekar was the brain behind the extortion plot.
He lives in Panvel, but hails from Amravati from where Lokesh's wife comes as well. Dandekar took her picture during Ganesh Chaturthi, morphed it, and made several copies. She was not his only victim. Just that her husband was the first to complain to the police.........

Click here to read more ...... 

Solutions : www.xcyss.in

Morphed nudes new extortion weapon

10 February 2012

‘Social networking sites duty-bound to obey law of the land'


Social networking sites are “duty-bound” to obey the laws of the land they operate in, says cyber law expert and Supreme Court advocate Mr Pavan Duggal. Referring to the recent Delhi High Court order to 22 social media sites to pull out inflammatory content, He said these Web sites were trying to get away by saying they were bound by US laws and were not amenable to Indian norms.
“These companies want to operate in India but do not want to comply with Indian laws. If your target is the Indian ecosystem, you have to comply with the laws here and disable content from the Indian networks at least.”
The IT Rules 2011 mandates service providers to do “due-diligence” of content that could be a threat to national security and integration. Any aggrieved party can lodge a complaint against content online. 

Solutions : www.xcyss.in

Spammers dangle the V-Day bait

Anita Aggarwal, 21, found an alluring offer on her FB account: a perfect gift for her fiancé. Excited about the gift, she filled in the application sharing all her information including her personal id. Soon Anita realised that her email id had been hacked.


With Valentine’s Day just a few days away, it is not surprising if you have already started receiving mails and enticing messages on your Facebook pages which include big discounts on jewellery, food and even slimming products. However, these are tricks with a target — to infect computers, and steal personal details.


Spam companies have also come across Facebook page-based attacks centring around Valentine’s Day. Users are asked to post a Valentine’s theme in their Facebook profile from where they are redirected to another website which asks users to download the theme which is a fake website. On installing the theme, cyber criminals can access your personal information and data on your personal PC’s and Computers.
Click here to read more ......

Solutions : www.xcyss.in

Spammers dangle the V-Day bait

Anita Aggarwal, 21, found an alluring offer on her FB account: a perfect gift for her fiancé. Excited about the gift, she filled in the application sharing all her information including her personal id. Soon Anita realised that her email id had been hacked.


With Valentine’s Day just a few days away, it is not surprising if you have already started receiving mails and enticing messages on your Facebook pages which include big discounts on jewellery, food and even slimming products. However, these are tricks with a target — to infect computers, and steal personal details.


Spam companies have also come across Facebook page-based attacks centring around Valentine’s Day. Users are asked to post a Valentine’s theme in their Facebook profile from where they are redirected to another website which asks users to download the theme which is a fake website. On installing the theme, cyber criminals can access your personal information and data on your personal PC’s and Computers.
Click here to read more ......

Solutions : www.xcyss.in

Changes in IT Act crucial for fighting cyber crime: IT experts


Mobile devices have more computing power than most sophisticated PCs. We have become dependent on them to the extent that once they conk out, we are utterly helpless. These vital devices store a lot of critical information. However, they are not governed by clearly laid out laws. The need of the hour is to enact a new legislation or amend the existing act, say cyber security experts.

“If you list out the top five important laws passed in this country post independence, the IT Act of 2000 would definitely be one of them. Information technology now governs every aspect of our lives,” says Pavan Duggal, advocate of the Supreme Court of India, who was part of the team that drafted the act. “However, what we now have is a grossly lopsided act. The law was amended in 2008 when there was no social media. Mobile usage was also not that prevalent. Today mobile phone plays a part in a large number of common crimes. The need of the hour is to have a law for communication devices and social media.”

Click here to read more ...... 

Solutions : www.xcyss.in

IIT Delhi student arrested for blackmailing IIT Kanpur girl

09 February 2012

xcyss-cpj-cyberspace-threats video

Click here to read more ...... Solutions : www.xcyss.in

Weak cyber act may not find Karnataka ministers guilty

Viewing porn is not a punishable offence, under the Indian IT Act, but transmitting it, publishing it or spreading it around is a culpable act. 

The cyber police, therefore, will not be able to book two ministers, Laxman Savadi and CC Patil, as the IT Act will not find them guilty. However, the act of forwarding/transmitting smutty stuff by ministerKrishna Palemar is a punishable act under cyber law.

Palemar, who forwarded the questionable content'' is culpable for publishing or causing to be published obscene electronic information, under the Section 67 and 67(a) of the Indian IT Act which can now attract three years imprisonment and a fine of Rs 5 lakh. 

"Actually, the Act should have well-articulated provisions for people who access porn content at work places, be it in the private or public domains,'' said  Pavan DuggalSupreme Court lawyer and cyber expert. 

Click here to read more ...... 

Solutions : www.xcyss.in

Porngate: High demand for Karnataka ministers' MMS

It's the most sought after porn clip in the market. But the video that reduced three BJP ministers into legislators is not available with any porn DVD /film dealer in the city.
Sex scandals that make the headlines generally end up earning huge profits.......


By late Tuesday evening, someone working in "public interest" had uploaded the clip to the internet. Those who want to see it don't have to go too far to see it. There was curiosity among those online to learn about the origin of the clip, and the people involved in the video. 

With the controversy getting hotter, many users are posting more links on the Internet, creating fear among traders that they are losing out on sales with this "fresh development", as the videos are available online free of cost....

Click here to read more ...... 

Solutions : www.xcyss.in

How IT is making govt responsive

The government is seen as slow, bureaucratic and corrupt. But in recent times, in several services, it has dramatically transformed itself with the use of technology, sometimes in partnership with the private sector. 

It started with the spectacularly successful railway online reservation system, but has since moved to newer areas, thereby substantially reducing hassles, paper work and corruption, and accelerating the speed of delivery of services. In some cases, the scale of the service is so massive that it is lowering the prices of IT services and products, and generating new lessons for the global IT industry. .
Click here to read more ...... 

Solutions : www.xcyss.in

Sexting could become a crime


Sexting may not be too smart but should it be against the law?  Senate Bill 2222 prohibits adults from asking minors for nude pictures and it would also outlaw minors from sending nude pictures of themselves to adults or other kids. 
The idea is to protect the child because once the image is sent out there is little control over it going public.  The photos can be used as blackmail and have led to suicide in other states.....

Click here to read more ...... 

Solutions : www.xcyss.in

Cyberbullying leaves itsvictims close to suicide


HUNDREDS of thousands of young people are being subjected to cyberbullying with many being victimised for more than a year, new research has shown.
A study by the charity Beatbullying reveals the long-term impact of cyber abuse, with youngsters reluctant to go to school, living in fear of their safety and even resorting to self-harming or attempting suicide.
Cyberbullying is the bullying of another person through technology, such as mobile phones or the internet.

Solutions : www.xcyss.in

Cyber fraud: NCL scientist robbed of Rs 2.48 lakh


Cyber criminals are on the prowl, targeting Pune citizens. A scientist of the National Chemical Laboratory (NCL) was among four in the city who registered police complaints after being cheated by cyber fraudsters.
In the case of the scientist, Digambar Vitthal Gokhale, a resident of NCL colony, Rs 2.48 lakh was transferred from his State Bank of India account, to some other bank account in Varanasi, through internet banking, without his knowledge.....

Click here to read more ...... 

Solutions : www.xcyss.in

08 February 2012

New virus takes over PC without opening infected mails

Now, a new class of cyber attack has emerged that can infect you computer even if you do not open virus-infected email attachments.

In the new form of cyber attack, users will not even be warned this is happening, the only message that appears is ‘loading’. The email then automatically downloads malware into your computer from elsewhere the moment a user clicks to open it.

The emails themselves are not infected, therefore will not ‘set off’ many web-security defence packages.

Previous generations of email-borne viruses and trojans required users to click on an attachment, often an office document such as a PDF but the new generation of e-mail-borne malware consists of HTML e-mails, which automatically downloads malware when the e-mail is opened.
Click here to read more ...... 

Solutions : www.xcyss.in

BEWARE! World War III report is a Facebook scam

A new virus scam is circulating on Facebook that tricks people into downloading malware by asking them to open a fake CNN report about World War III. The story, using CNN logos, offer video footage of a breaking news story, but says users need to upgrade their Flash video software to watch.

The fake news page says that US attacks Iran and Saudi Arabia, and begins of World War III. When users ‘upgrade’, their PC gets infected with a trojan. Videos are often used as ‘bait’, because computer users are used to upgrading video software such as Flash, so installing software does not set off alarm bells.


Click here to read more ......

Solutions : www.xcyss.in

'Mumbai-based' hacker releases Symantec source code

hacker released the source code for antivirus firm Symantec's pcAnywhere utility on Tuesday, raising fears that others could find security holes in the product and attempt takeovers of customer computers. 

The release followed failed email negotiationsover a $50,000 payout to the hacker calling himself YamaTough to destroy the code.......
Click here to read more ...... 

Solutions : www.xcyss.in

Stuxnet - Excellent video

While the world braces for e-threats, India moves slow


.......
Stuxnet is a case in point. Though a few fingers were pointed at Israel, as also the US, the exact origin of the 'worm' still remains unknown. But it's clear it was the handiwork of a resource-rich state agency, not some non-state hackers or fringe elements. 
.....
India has reason to worry. China-watchers in the Indian security establishment say Beijingalready has two to three "hacker brigades'' and 30,000 computer professionals in its militia. China, in fact, has made cyber-warfare one of its topmost military priorities, with its hackers regularly breaking into sensitive computer networks of countries like the US, the UK, Germany and India.

China-based online espionage gangs have been regularly accessing classified documents from several Indian security and diplomatic establishments, as was also brought out in the "Shadows in the Cloud'' report by a group of Canadian and American cyber-security researchers a couple of years ago. India, therefore, has to be on the guard in the virtual world as well.




Click here to read more ......

 Solutions : www.xcyss.in

While the world braces for e-threats, India moves slow

.....
Stuxnet is a case in point. Though a few fingers were pointed at Israel, as also the US, the exact origin of the 'worm' still remains unknown. But it's clear it was the handiwork of a resource-rich state agency, not some non-state hackers or fringe elements. 
.....



India has reason to worry. China-watchers in the Indian security establishment say Beijingalready has two to three "hacker brigades'' and 30,000 computer professionals in its militia. China, in fact, has made cyber-warfare one of its topmost military priorities, with its hackers regularly breaking into sensitive computer networks of countries like the US, the UK, Germany and India. 


China-based online espionage gangs have been regularly accessing classified documents from several Indian security and diplomatic establishments, as was also brought out in the "Shadows in the Cloud'' report by a group of Canadian and American cyber-security researchers a couple of years ago. India, therefore, has to be on the guard in the virtual world as well.




Click here to read more ...... 

 Solutions : www.xcyss.in

Government draws up multi-layered plan to strengthen cyber security

......
Among the proposals are dedicated command-and-control centres to monitor critical infrastructure real time, and Computer Emergency Response Teams for key sectors such as power, and elaborate protocols for all involved. 
.....
On top of this plan is a clear delineation of responsibilities between CERT-IN (Computer Emergency Response Team-India), NTRO (National Technical Research Organisation), Intelligence Bureau, Military Intelligence and other agencies that have a role in fighting cyber intrusions. Even where there are overlaps, protocol will be laid out. The proposed protocol will also cover department of telecom, department of information technology,National Informatics Centre etc. 
.....
The entire move comes in the wake of a series of sensational cyber attacks on India's critical infrastructure, especially targeted at key ministries and departments. In recent months, cyber attackers have targeted the ministry of external affairs, military headquarters and the National Security Council Secretariat, among others. 
.....


Click here to read more ...... 

 Solutions : www.xcyss.in

07 February 2012

Your deleted facebook pics remain accessible

It may come as a rude shock, butFacebook users should not feel surprised if tomorrow they come across their photos existing in the webworld despite having deleted them personally long ago. 

The photos do not disappear even after they are deleted but can still be accessed by anyone with a link to the images themselves. The company admits that its systems "do not always delete images in a reasonable period of time".

Deleted images vanish from 'normal' views of the site, meaning if you log in to Facebook and look on somebody's photo page, they won't be visible. But they would still remain visible to anyone with a direct URL link to the picture. 
That means that if, for instance, a picture has been circulated by email, the image will still be there for anyone who clicks the link.
Click here to read more ...... 

Solutions : www.xcyss.in