31 March 2012

Man held for cyberstalking couple

A minor flutter was created at the city police commissionerate campus after a 36-year-old Keralite, arrested by cyber crime cell police and accused of inflicting mental pressure and trauma on a Coimbatore-based journalistand his wife by posting obscene mails and creating fake profiles on social network sites, tried to flee from the cyber cell office on Friday......................

He was earlier arrested in September 2011 for similar offence against the couple but managed to leave the country........

The accused, S Pradeep Kumar alias Manu of Koonnananikkal House in Sulthan Bathery in Wayanad was working as senior sales executive in RAK Ceramics in Dubai. He was making obscene phone calls and uploading digitally modified photographs to harass the couple.............

Click here to read more ...... 
Solutions : www.xcyss.in

China’s Tencent employee attacks Indian websites


Websites of Indian government and Tibetan activists in the country are under attack in a cyber attack campaign engineered by a Chinese hacker, working with one of the world's largest e-tailers Tencent.......................

The Luckycat cyber campaign, has been linked to 90 attacks in recent past against targets in India and Japan, as well as against Tibetan activists. 'Luckycat' has been able to compromise about 233 computers many of which are in India...............

The victims, include Indian military research organisations and shipping companies, besides aerospace, energy and engineering companies in Japan...........

The owner of the attack alias, according to online records, is Gu Kaiyuan, a former graduate student at Sichuan University, in Chengdu, China. The university receives government financing for its research in computer network defence. The hacker is now an employee at Tencent, China's leading internet company..............


Solutions : www.xcyss.in

'Anonymous' says it won't shut down internet

NEW DELHI: Will hackers, allegedly associated with a group called Anonymous, shut down internet on March 31? According to the group'sTwitter account, from where it communicates with the world, the answer is no............... 
Anonymous is a loosely knit group of hackers and hacktivists. In the past, they have attacked government and corporate websites to protest what they perceived was injustice.....................


"To protest SOPA, Wallstreet, our irresponsible leaders and the beloved bankers who are starving the world for their own selfish needs out of sheer sadistic fun, On March 31, anonymous will shut the Internet down," stated the note. It highlighted that internet can be shut down by attack on 13 root DNS servers that play a crucial role in making sure that web users reach their desired websites. ................
Click here to read more ......

Solutions : www.xcyss.in

29 March 2012

Indian netizens spend over 8 hours a day online

A new survey has revealed thatinternet users in India spend an average of 58 hours a week online; that's more than half the time they are awake. What's even more interesting is that half the netizens interviewed admitted that they suffered from internet withdrawal within the first three hours of being cut off from the web.

Indians are spending 12.9 hours browsing, 9.7 hours socializing and 6.1 hours on email every week........................

Of all activities, the respondents said they would miss doing work-related tasks the most if left without an internet connection. Social networking was the second most important task, while "convenience of life" activities like paying bills and shopping online came third. In fact, 83% of users said they couldn't live without the internet for more than 24 hours...........................

The need to stay constantly connected is a new trend among Indian net surfers.............
Click here to read more ......

Solutions : www.xcyss.in

28 March 2012

Is your internet at risk?

A growing issue in the West is coming to India: the threat to net neutrality. The concept of net neutrality is based on the idea that companies which offer internet access should treat all internet content equally, in terms of speed, pricing, and access. It is important to protect this principle because if ISPs and telecom operators use their connectivity to influence how and what users consume, it can result in either censorship by a private company or anti-competitive practices. 

The internet was built as an open network, where information could flow freely. In this environment, innovation, entrepreneurship, and democracy have thrived all over the world. Governments, including that of India, have rightly limited its openness when it violates laws, such as defamation or piracy, but such restrictions are imposed only in public interest. 

The challenge to net neutrality is that the decisions of what content to censor or to give preference to, lies in the hands of ISPs, which are predominantly corporate entities.........


As India's internet subscriber base grows - there are already more than 100 million users - and more people use the net to complete their transactions, like buying railway tickets, books, music, access information or share files - there are concerns that if the principles of net neutrality are not followed, ISPs could control what you can and cannot surf...............
Click here to read more ...... 

Solutions : www.xcyss.in

Microsoft co-founder's identity stolen by US soldier


US soldier's scheme to defraud one of the world's richest men has landed him in federal custody.

In a criminal complaint unsealed yesterday, federal investigators allege Brandon Lee Price changed the address on a bank account held byMicrosoft co-founder Paul Allen, then had adebit card sent to his home so he could use it for payments on a delinquent Armed Forces Bank account and personal expenses.

Price was absent without leave at the time. Price called Citibank in January and changed the address on an account held by Allen from Seattle to Pittsburgh, then called back three days later to say he'd lost his debit card and asked for a new one to be sent to him..........

The card was used to attempt a $15,000 Western Union transaction and to make a $658.81 payment on the Armed Forces Bank loan account the day it was activated.....
Click here to read more ...... 





Solutions : www.xcyss.in

Jilted lover creates fake Facebook account of woman, arrested


A youth has been arrested on charges of creating a fake Facebook account and posting defamatory and obscene comments about a woman, who had rejected his love proposal.........
The accused Mohammed Osman Ali, resident of Nalgonda district created a fake Facebook account of the victim and transmitted vulgar comments stating that the victim was going to deliver a baby shortly......
During Police interrogation, the accused confessed that he had developed affection and love for the woman, but she and her family members had rejected his proposal..........
After his proposal was rejected, he bore a grudge against the complainant and created a fake Facebook profile in her name by uploading her photo, mobile number and personal details with obscene text....

Click here to read more ...... 

Solutions : www.xcyss.in

26 March 2012

New variant shows Duqu attackers still in operation


Security researchers at Symantec has flagged a new variant of the Duqu cyber-espionage Trojan, a clear sign that the attacks are still ongoing.
The latest Duqu driver was compiled in February 2012, more than four months after Duqu was first flagged as a unique piece of malware “striking similarities” toStuxnet, the mysterious computer worm that targeted nuclear facilities in Iran.
Symantec identified the newly compiled Duqu driver as mcd9×86.sys and said it contains no new functionality beyond spying and collecting data from infected machines.
Duqu is a highly specialized Trojan capable of gathering intelligence data and assets from entities, such as industrial control system manufacturers, in order to more easily conduct a future attack against another third party.................
Kaspersky Lab’s Costin Raiu says the latest variant has been engineered to escape detection by the open-source Duqu detector toolkit released by CrySyS Lab..........

Click here to read more ...... 

Solutions : www.xcyss.in

Beware! E-mafia is at work on social media


Beware of being active on cyber space as stalkers are on the prowl. Social networking may be the best way to catch up with lost contacts or conveying your thoughts to the world in a jiffy, but unless you are careful about the privacy settings in these sites, there are very high chances of falling an easy prey to cyber stalkers...........
Cyber stalking and stalking through telecommunication technology is harassment, which is on the rise owing to its ease and the anonymity it offers to criminals such as pedophiles and pranksters.
A recent British study found four types of cyber stalking such as harassing, threatening, intimidating and impersonating profiles.
With Indians spending about 30 hours a week surfing the net, and a significant proportion of that time on social networking sites, they are becoming an easy prey for cyber criminals..............
Cybercriminals are like pickpocketers who hang around places where there is huge crowd.............
Even when you delete what you have posted, there are always remnants of your activity in the digital space which most people are not aware of..................
Cases such as a spurned lover defaming his lady love by posting abusive mails and indecent morphed pictures or a pedophile befriending a 10-year-old to do some indecent activity and later threatening the parents for a ransom are dime a dozen.........................
There is a big e-mafia looking out for easy victims on the internet space and Indians are now becoming the targets.......

Solutions : www.xcyss.in

Hackers lurk below radar


Indian cops are yet to get a real taste of cyber crime when compared to western countries and China, according to cyber security experts.
“The nexus between underworld dons and hackers has no happened yet. If the mafia managed to touch base with ‘black hats’ (hackers involved in crime) then all hell will break loose,” warns the expert............
Hacking talent, by and large, is rare commodity in India. Recognised ethical hackers are very few in number.............
Indian software professional can write Trojan (malicious programme) but not many want to deploy it. There is nothing is wrong in writing malicious programme to expose the existing software used by banks and other financial institutions. But deploying it for personal gain is a criminal act...................

Solutions : www.xcyss.in

22 March 2012

Fresh advisory for defence personnel against revealing classified info on social networking sites


The government has issued fresh directives to military personnel to refrain from divulging classified information and data on social networking websites like Facebook, Orkut and Twitter.

Defence minister A K Antony admitted in the Rajya Sabha on Wednesday that cases of "unauthorized sharing of information by naval personnel on social networking sites" had been detected in a recent case..............

The naval Board of Inquiry (BoI) into the case has recommended stringent action, including dismissal of service, against at least two officers for posting location of warships, their patrolling patterns and other information on Facebook.

The Navy HQ here is currently examining the BoI report, conducted at the Western Naval Command at Mumbai, against four commander-rank officers (equivalent to Lt-Colonels in the Army) from the naval technical branch.

After this case, the armed forces have once again issued directives to their personnel to strictly refrain from putting sensitive information and service-related matters, like location of units or deployment patterns, on social networking sites.

The Army has directed all its officers and personnel to even remove all their pictures and information showing their affiliation to the service from their personal profiles on such websites.

Instructions are also in place to be extremely careful in the use of computer and digital storage devices after intelligence alerts pointed to an increase in leakage of classified data from defence establishments through the use of pen drives, removable hard disks, CDs, VCDs etc.
Click here to read more ...... 


Solutions : www.xcyss.in

‘Information, cyber security are top risks for corporates'


Information and cyber insecurity have emerged as the top prevailing risks faced by Indian companies and the Government. This was highlighted in a FICCI-Pinkerton report titled “India Risk Survey 2012”.
The respondents, across sectors and regions, rate information and cyber insecurity as the highest risk to business establishments. While IT and financial sectors count cyber insecurity as their apex risk, even the government, manufacturing and telecom sectors have rated it under their top three risks..............
The FICCI-Pinkerton survey elicited responses from top management in industry sectors such as IT/ITES, security service providers, manufacturing, financial services, telecom, the Government, PSUs, hospitality, infrastructure, retail, medical services, education and NGOs..........

Click here to read more ...... 

Solutions : www.xcyss.in

Hacking...a Growing Threat to National Security

We all know about the war on terror and many of the fights are being waged on foreign soil. But what about the battle right in front of you? Computers can be the frontlines for terroristic hackers and the threat is growing as technology takes over pretty much everything we do....................

Most of us log onto a computer every day. Each time people click, they become vulnerable to those looking to get our information. But we as individuals have to worry about it far less than those working to keep our nation safe.
Hackers are continuously trying to infiltrate or nation's computers, ones that control critical infrastructure, factories and databases...............


Click here to read more ...... 

Solutions : www.xcyss.in

Why Hackers Set Their Sights on Small Businesses

If you run a small business, and think that none of your data was of interest to a hacker, consider this: what if a hacker could take stolen bank account or credit card information from your computer and package it with the same information from a hundred or a thousand other small businesses? Would it be worth something then? 

SMBs don't know how defenseless they've become, especially to automated and industrialized attack methodologies by organized crime............
"[Hackers] scan the Internet, looking for remote access services, and then try the default credentials. Once they gain access, they automatically install keyloggers to collect password information [as it's typed in]. Then they send the information it out via e-mail or by uploading it to an FTP server or a web site. They aggregate the data and sell it on the black market.............
Hackers could use the keylogger to figure out how access and drain a small business' bank account, but more commonly, they'll target point-of-sale systems, as four Romanians did recently. That kind of attack is increasing, because they're low-risk and low-cost attacks for organized crime. Because they're geographically widespread, it's hard for any one police department to follow up...............


Solutions : www.xcyss.in

20 March 2012

Mystery of Duqu Programming Language Solved

An appeal for help from the programming community has allowed antivirus analysts to classify the unknown language used to develop key components of the Duqu Trojan. The sections responsible for downloading and executing additional modules in the Duqu Trojan, referred to by some as Stuxnet 2.0, were written in standard C++.

Kaspersky Lab experts now say with a high degree of certainty that the Duqu framework was written using a custom object-oriented extension to C, generally called “OO C” and compiled with Microsoft Visual Studio Compiler 2008 (MSVC 2008) with special options for optimizing code size and inline expansion..............
Kaspersky’s analysis now concludes:
  • The Duqu Framework consists of “C” code compiled with MSVC 2008 using the special options “/O1″ and “/Ob1″
  • The code was most likely written with a custom extension to C, generally called “OO C”
  • The event-driven architecture was developed as a part of the Duqu Framework or its OO C extension
  • The C&C code could have been reused from an already existing software project and integrated into the Duqu Trojan


Solutions : www.xcyss.in

Linkedin Email Scam Deposits Banking Trojan


Don't be too quick to make that connection! GFI Labs recently discovered a LinkedIn email phishing scam that installs the Cridex banking Trojan. 
The fake LinkedIn email looks like an authentic email reminder about pending invitations (click to enlarge): 
linkedin explpoit
The phishing scam shares the same IP address (41.64.21.71) as several recent BBB and Intuit spam runs.
The Cridex bot (Symantec), aka Cardep (Microsoft, Avast) or Dapato (Ikarus, Emsisoft, Kaspersky), was discovered in the wild in August 2011. It spreads through emailed or shared attachments. Once installed, the Trojan connects to a remote command and control (C&C) server. Then it injects itself into your Internet Explorer process, where it steals online banking credentials, email accounts, cookies, FTP credentials, and send them back to the C&C server...........

Click here to read more ...... 

Solutions : www.xcyss.in

19 March 2012

'Extremists' hack Amravati varsity website

The official websites of Sant Gadgebaba Amravati University, Prof Ram Meghe Institute of Technology and Research and PR Pote College of Engineering were hacked on Sunday by those who called themselves 'extremists'. Surfers and students were shocked to read strange messages on these three websites.

Highly objectionable statements were found on the hacked websites. The website stated that "Indian Penal code (Act No 45 of 1860) chapter-II18: Indian means the territory of India excluding Kashmir". It also mentioned that "this institutional impunity with which killing of civilian by military and police forces in Jammu and Kashmir continuous should be a source of shame for India which propogates to be democracy". Hackers have termed themselves as "extremist, killer mind Haxor, Jerry Hassan, Syed Zaada, Hyp3r-boy, Zarb-E- Momin, fAcho, Radical Assassin". '

They have also mentioned their official website www.MUSLIM_LIBERATION_ ARMY@YAHOO.COM.............
Click here to read more ...... 

Solutions : www.xcyss.in

'Extremists' hack Amravati varsity website

Click here to read more ...... Solutions : www.xcyss.in

Police official arrested in hacking case

A suspended sub-inspector of police S Biju Salim has been arrested in connection with the leak of information regarding an alleged attempt to hack the personal e-mail of some muslim leaders in Kerala, official sources said today. 

According to sources, he was arrested on charges of leaking official documents and for preparing a fake letter in the name of state intelligence......................... 


A report in a prominent Malayalam daily in January claiming that the state intelligence had instructed police to hack the personal e-mail of selected Muslim leaders had triggered a controversy in the state. Both Chief Minister Oommen Chandy and State DGP Jacob Punnose had denied the reports and ordered a probe into the circumstances of 'leakage of such matter'......... 


Salim was suspended when the probe was ordered in January. 

Click here to read more ...... 

Solutions : www.xcyss.in

Microsoft: Hacking code could have leaked

Microsoft's process for sharing information about security vulnerabilities in its products came under fire Friday after a roadmap for exploiting a severe, recently discovered flaw appeared on a hackingwebsite in China. 

The guideline, known as "proof-of-concept" code, most likely leaked from one the more than 70 security companies that get advance warnings from the company about major new holes, according to the researcher who found the flaw..................... 

"The details of the proof-of-concept code appear to match the vulnerability information shared with Microsoft Active Protections Program partners," said Yunsun Wee, Microsoft's director of its Trustworthy Computing effort..................... 
Click here to read more ......

Solutions : www.xcyss.in

17 March 2012

Actor's fake Facebook page stirs religious trouble

An advocate has registered a complaint with crime branch's cyber cell against a Facebook account holder who posted derogatory remarks about the Quran. The account is in the name of Bollywood actress and TV producer Deepti Bhatnagar, but police believe this is a fake account created fraudulently in her name..........................


Shaikh says that in the personal-information section of the account, it is mentioned that Bhatnagar had studied at Best school in Ahmedabad and was a graduate of the Gujarat University. "Both these facts are erroneous which also proves this is a fake account," said a crime branch official........
Click here to read more ...... 

Solutions : www.xcyss.in

16 March 2012

Over 100 Govt websites hacked in 3 months


A total of 112 government websites belonging to various state government agencies, Planning Commission and Finance Ministry were hacked in the three-month period ending February 2012, Parliament was informed on Wednesday...............
These hacked websites belonged to the agencies in the government of Andhra Pradesh, Madhya Pradesh, Rajasthan, Tamil Nadu, Maharashtra, Gujarat, Kerala, Orissa, Uttar Pradesh, Sikkim and Manipur. It also included agencies of Ministry of Finance, Health, Planning Commission and Humar Resource Development.
The website of Bharat Sanchar Nigam Ltd was hacked on December 4, 2011 by the 'H4tr!ck' hacker group.............

Solutions : www.xcyss.in

Pakistan hackers stole data from 22 Rajasthan govt websites


At least 22 websites of Rajasthan government were destroyed by hackers, mostly from Pakistan, in February. They had deleted data or even stolen them from the sites of important departments including technical education, college education and finance.
However, instead of improving the technical security, the only step taken by the government was to upload the data again............
In fact, Rajasthan is one of the most vulnerable states in terms of security of websites if one goes by what Union minister of state for communications and IT Sachin Pilot said in Parliament on Wednesday. He said that 112 government websites, including those of the agencies in the government of Rajasthan, Andhra PradeshMadhya Pradesh, and Tamil Nadu were compromised by hackers in the past three months................
The attacks on government websites indicate their vulnerability, especially domains ending with gov.in....................
The state government websites are so vulnerable that even a person having basic hacking knowledge can destroy them. Most government websites in Rajasthan run on single server. If a hacker got a single vulnerability or loophole in any of these sites, other sites can also be compromised by uploading a backdoor 'shell'. After that, the hackers get total over the website server................



Solutions : www.xcyss.in

15 March 2012

एथिकल हैकर

कई बार आपके पास फर्जी ईमेल आते होंगे, आपका ईमेल अकाउंट कभी हैक भी हुआ होगा, या आपने अपने किसी दोस्त से सुना होगा कि उसका अकाउंट किसी ने हैक कर लिया है और उससे ठगी वाले कुछ मेल भेजे जा रहे हैं...........

साइबर स्पेस में हैकिंग एक ऐसा शब्द है जिसे सुनकर आम तौर पर लोग सहम जाते हैं। वास्तव में हैकिंग भी वायरस की तरह कंप्यूटर की एक बड़ी समस्या है। हैकिंग के द्वारा हैकर आपके कंप्यूटर या आपके संबंधित अकाउंट पर हैकर पूरी तरह से हावी हो जाता है। इसके बाद उसे आपके डेटा को चुराने या खत्म करने की आजादी मिल जाती है। वाई-फाई इंटरनेट कनेक्शन से चलने वाले सिस्टम को हैक करना ज्यादा आसान होता है.................
हैकिंग का यह रूप पेशेवर नहीं है, लेकिन इसका एक रूप ऐसा भी है जिसकी मदद से सरकार या खुफिया एजेंसियां किसी एकाउंट को हैक कर वहां से गोपनीय जानकारी इकट्ठा करती हैं। इससे उन्हें अपनी जांच को आगे बढ़ाने या सबूत जुटाने में मदद मिलती है। इसे देखते हुए एथिकल हैंकिंग जैसा कोर्स करियर के लिहाज से काफी अहम है.......... 

Click here to read more ...... 

Solutions : www.xcyss.in

AMU blocks Facebook, says it ‘hurts religious sentiments’


The Aligarh Muslim University (AMU) administration has blocked Facebook on the campus, claiming that the content posted on the social networking website could hurt religious sentiments.
University spokesperson Rahat Abrar said: “It has been done keeping in mind the objectionable posts related to Islam on Facebook. It hurts the religious sentiments of Muslims and it may flare up passions.”
Interestingly, Abrar himself has a Facebook account..................

Click here to read more ...... 

Solutions : www.xcyss.in

AMU blocks Facebook, says it ‘hurts religious sentiments’

Govt's Internet spy systems fail to capture 100% data traffic

Looks like it might take a bit longer for the government to intercept messages with keywords such as 'ammonium nitrate' or 'bomb' passing through emails, web forums, blogs, social networks and even images.

In a first of its kind live competition held between two spy systems developed by reputed tech arms of India's national security apparatus, both failed to capture 100% internet data traffic, one system even crashing a number of times during the test held in January.........

The competition was a precursor to an Internet scanning and coordination centre, which India wants to put in place, just like the ones used by US, UK, China, Iran and other countries...........
Click here to read more ...... 

Solutions : www.xcyss.in

Visa consultant held for duping 10 doctors


HYDERABAD: A ‘consultant’ who duped a city doctor of Rs 2 lakh promising him a job in Australia was arrested by the Cyber Crime police, of Crime Investigation Department (CID) on Wednesday. Police said the conman duped nearly 10 other city doctors using the same modus operandi.
The arrested, 56-year-old P V Koteswara Rao, sent mails to several doctors offering to help them getting jobs in Australia..............
Rao took Rs 1 lakh from the victim and sent a fake job offer letter to him. Later, he collected another Rs 1 lakh for Australian visa processing and started to avoid the doctor since then..............


Click here to read more ...... 

Solutions : www.xcyss.in

Social Media Companies Contribute to Cybercrime


Cybercrime is an everyday problem that threatens business operations and causes large out-of-pocket expenses for individual and corporate victims alike.  Although statistics regarding the actual cost of cybercrime vary, the incidence of cybercrime has climbed steadily over the past decade. The 2011 Norton Cybercrime Report claims that more than one million people become victims of cybercrime every day, and it estimates the financial cost of cybercrime is larger than the combined global black market for cocaine, heroin, and marijuana.
It is easy to become a cybercriminal because it requires few computer skills, and hacking tools, spyware, and other forms of malware are openly available online.  One even can hire a botnet over the Internet to engage in cyber espionage, knock a competitor offline, or send spam...................
There are several reasons why tracking and tracing cybercriminal activity is difficult, and most of them have to do with the lack of harmonized legal frameworks globally for cybercrime and antiquated legal processes for requesting and obtaining international legal cooperation on investigations.  Another reason that cyber criminals seldom are caught is because the social media companies, whose sites are so often used in cybercrime, are blatantly reluctant to cooperate in cyber investigations.
Most businesses today actively use Facebook, You Tube, and Twitter to manage their marketing and customer interaction.  When they suspect or know of wrongdoing, however, they enter a frustrating process trying to report it to these companies, obtain logs of activity associated with their accounts, and seek assistance in restoring service.....................

Solutions : www.xcyss.in

14 March 2012

Bigg Boss Pooja Missra cries hacking

Bigg Boss-5 contestant Pooja Missra, known for her arrogance and venom on the show, has registered a complaint with the cybercrime cell of the city police, alleging that her Twitter account has been hacked by an unidentified person. She added that the accused was spreading malicious comments about other celebrities using her account...........
“This is a clear way to defame me and spoil my image in the eyes of my fans and contemporaries,” said Missra.........
“The hacker removed all my fans from the list, thus disconnecting me totally from them, and also changed my password, as a result of which I could not gain access to my own account,” she added.
The worst part, Missra continued, was when she realised that the hacker had been posting malicious remarks about big names such as Salman Khan, Sanjay Dutt and Vijay Mallaya, thereby creating a rift between them and Missra.........
Click here to read more ...... 

Solutions : www.xcyss.in

Bigg Boss Pooja Missra cries hacking

Bigg Boss-5 contestant Pooja Missra, known for her arrogance and venom on the show, has registered a complaint with the cybercrime cell of the city police, alleging that her Twitter account has been hacked by an unidentified person. She added that the accused was spreading malicious comments about other celebrities using her account...........
“This is a clear way to defame me and spoil my image in the eyes of my fans and contemporaries,” said Missra.........
“The hacker removed all my fans from the list, thus disconnecting me totally from them, and also changed my password, as a result of which I could not gain access to my own account,” she added.
The worst part, Missra continued, was when she realised that the hacker had been posting malicious remarks about big names such as Salman Khan, Sanjay Dutt and Vijay Mallaya, thereby creating a rift between them and Missra.........
Click here to read more ...... 

Solutions : www.xcyss.in

Porn site hacked, credit card details stolen

A previously unknown hacking group has reportedly broken into a major pornography website and stolen the personal details of over 72,000 users, and over 40,000 credit card numbers. The Consortium said it had breached the security of the Digital Playground website, which is run by a company called Manwin........


Click here to read more ...... 

Solutions : www.xcyss.in

12 March 2012

Cyber snoopers target NATO commander in Facebook attack


NATO’s most senior military official has come under a concerted cyber attack from hackers believed to be operating from the People’s Republic of China.
The Observer reported on Sunday that cyber fiends had targeted Supreme Allied Commander Europe (SACEUR) Admiral James Stavridis by opening fake Facebook accounts in his name in an attempt to trick colleagues, friends and family into giving away his personal secrets on the social network.
Social engineering via platforms such as Facebook can be one of the early stages of an advanced persistent threat (APT), the latest buzz word on the information security scene and a technique commonly linked to cyber spies operating from China................

Solutions : www.xcyss.in

Combat cybercrime before it's too late


AUSTRALIAN businesses are suffering a crime spree - and don't even know it.
A global survey by consultancy firm PwC shows 47 per cent of companies suffered "economic crime" in the past year, up from 40 per cent................

PwC also highlighted the rising threat of cybercrime, which was the second-highest form of crime in the survey.
Businesses and governments are increasing their reliance on cyber technologies such as cloud computing, online banking and social networks...............

In tandem, the rate of change for new technology is increasing and organisations are struggling to keep up with the risks of introducing and using new technology.About 30 per cent of organisations suffered from a form of cybercrime in the past year and most of them simply don't understand the need to protect themselves.................

The increasing prevalence and far reaching impact of cybercrime means it is no longer just an issue for the IT department alone................

The rising use of USBs to transport information is also a risk in that they may be exposed to networks that haven't been properly secured or has been specifically targeted..............


Click here to read more ......
Solutions : www.xcyss.in

Govt sites hit by cyber attacks 200 times during CWG 2010

The Defence Research and Development Organisation (DRDO), a government organisation that researches for new technologies for defence and combat, has revealed that computer servers of the government departments were attacked nearly 200 times during the 2010 Commonwealth Games in Delhi.
DRDO chief and scientific adviser to defence minister Dr V.K. Saraswat told the media that there had been a number of cases of hacking, originating from foreign nations, and ethical hacking defacing the government systems..................

The government websites have long been on hit list of hackers. The National Informatics Centre (NIC) recently revealed that as many as nine government websites were defaced by cyber attacks..................
Click here to read more ......
Solutions : www.xcyss.in

09 March 2012

Net savvy terrorists stay one step ahead of investigators

Terrorists have been able to use the internet to acquire real time information on police investigations, which has helped them plan their next move and also change their location.........
Security risk posed by terrorists using the internet is a well-known problem.........

If we were to consider the 26/11 attack in Mumbai [ Images ], it is quite clear that India failed in preventing the attack which was largely carried out through the internet.
Right from the stage of planning to financial transactions, everything was carried out on the internet and our agencies were clearly in the dark all through the operation, said IPS officer Aditya Mishra...........
India has now become fully aware of the problem and realises that it needs a full-fledged agency to counter this menace.............
India today finds itself as a victim of both cyber attacks and also cyber terrorism. Police officials say that despite very stringent measures, the web is the worst place to deal with, as terrorists would continue using it and finding ways to beat the security system...................


Cyber experts say that the internet has become the most preferred medium for terrorists. Not only have they been planning operations on the net but also use the information available on it to their advantage. In cases of terrorism, the internet has provided real time information which has helped terrorists plan their next move and also change their location.............


The Delhi police, which has been investigating several crimes committed by the Indian Mujahideen, has found that it was the internet that helped these persons a great deal..............
Click here to read more ...... 

Solutions : www.xcyss.in