31 May 2012

डॉक्टर ने फेसबुक पर डाला दोस्त का अश्लील वीडियो

जयपुर.एसएमएस मेडिकल कॉलेज के एक डॉक्टर का पासवर्ड हैक कर फेसबुक पर अभद्र भाषा व अश्लील वीडियो अपलोड करने वाला भी मेडिकल कॉलेज का डॉक्टर निकला। 


आरोपी विपिन कुमार चौहान (27) मूल रुप से बिजनौर उत्तरप्रदेश का रहने वाला है। एसएमएस मेडिकल कॉलेज से एमबीबीएस की डिग्री लेने के बाद विपिन यहीं से माइक्रोबायोलोजी विभाग से पीएच.डी. कर रहा है। आरोपी विपिन ने करीब दो माह पहले एसएमएस मेडिकल कॉलेज के माइक्रोबायोलोजी विभाग में कार्यरत डॉक्टर योगेंद्र तिवाड़ी की फेसबुक अकाउंट का पासवर्ड हैक कर लिया। इसके बाद विपिन ने योगेंद्र के फेसबुक पर अभद्र भाषा व गलत मैसेज अपलोड कर दिए.............


Click here to read more ...... 
Solutions : www.xcyss.in

Medico’s pictures on porn site, case against friend


An MBBS student has filed an FIR accusing a friend of posting a morphed porn video on a website. In December last year, Gurgaon resident Neetu Singh (name changed on request), a final year MBBS at a Delhi college, was shocked after a friend told her that a video featuring her had been posted on a porn website. When she checked the video, she found that someone had morphed  her picture and posted it on the site to defame her. She decided to remain silent about the case for the time being but things became worse for her...............

Later, many people even started to believe that she was working for a porn site and the matter reached the college management, apart from regular taunts by her friends.............


Click here to read more ......
Solutions : www.xcyss.in

'Bhubaneswar emerging as cyber crime hub'


Emerging cities such as Bhubaneswar, Surat, Cochin, Jaipur, Vishakhapatnam and Indore are increasingly coming under cyber attacks, according to a recent report on internet security threat.....

The recent report from Symantec attributed the threat to lack of awareness and low adoption of security measures by government as well as private sector organizations..................

Bhubaneswar features among the list of locations in India from where phishing emails originate. Phishing is the cybercriminal's tactic of stealing confidential information such as bank account, credit card, online account login details, either by tricking the user into revealing this data through a fake email, or including malicious links in unsolicited emails.........


Click here to read more ...... 
Solutions : www.xcyss.in

30 May 2012

Deadly virus likely to enter Indian cyberspace: Experts


A program of the computer virus known as Flame  -AFP
A program of the computer virus known as Flame -AFP
A powerful malware called Flame has wormed its way into the Internet. The espionage programme has been designed to target West Asian nations but could invade the India cyberspace as well, experts warned on Tuesday.
India, a member of the 142-country International Telecommunication Union (ITU), has been alerted of the virus attack...........

Click here to read more ...... 
Solutions : www.xcyss.in

2012 Threat Predictions: A Report by McAfee Labs



In the past few months we have witnessed enormous changes in cyber threats like mobile related threats, hacktivism, client-side exploitation, social-media exploitation, and targeted attacks.

As per 2012 Threat Predictions report by McAfee Labs,  more changes are expected in coming year in even the most established threat vectors as follow:
  • Industrial threats will mature and segment
  • Embedded hardware attacks will widen and deepen
  • Hacktivism and Anonymous will reboot and evolve
  • Virtual currency systems will experience broader and more frequent attacks
  • This will be the “Year for (not “of”) Cyberwar”
  • DNSSEC will drive new network threat vectors
  • Traditional spam will go “legit,” while spearphishing will evolve into the targeted messaging attack
  • Mobile botnets and rootkits will mature and converge
  • Rogue certificates and rogue certificate authorities will undermine users’ confidence
  • Advances in operating systems and security will drive next-generation botnets and rootkits

This report has also mentioned that "It’s time for extensive Penetration Testing and Emergency Response Planning that includes cyber components and networking with law enforcement at all levels."

2012 Threat Predictions report by McAfee Labs can be downloaded from here: http://www.mcafee.com/us/resources/reports/rp-threat-predictions-2012.pdf?eid=NAMWPGSCSC011

Solutions : www.xcyss.in

Under threat: Does India have no mechanism to fight cyber attack?

Does the Indian government have any authority that deals with cyber attacks? Maybe there is no such body/ department or maybe the government just doesn’t want to tell us. The fate of a right to information (RTI) application seeking clarity on this subject worryingly indicates that the government has no clue whatsoever as far as combating cyber espionage is concerned..............


The case in point is an RTI filed by Prof Arun Mehta, president of Bidirectional Access Promotion Society, a Delhi based NGO, seeking information on what the government had done about a massive cyber attack on Indian computers by the Chinese.............

....................................................................................................................................................................

The next time we come under cyber attack, we will have no choice but to just sit and watch. At least the story of Mehta’s RTI applications does not indicate any other possibility.......

Click here to read more ...... 
Solutions : www.xcyss.in

No Protocol in Tripura to Deal with Cyber Crime


Tripura is one of the few states that do not have a protocol to register cyber attacks. Besides Tripura, states like Haryana, Bihar, Jammu & Kashmir, Jharkhand, Mizoram, Nagaland and Sikkim also do not have a protocol to register cyber attacks, leave alone countering them. Though the central government has formulated a Crisis Management Plan for countering cyber attacks and cyber terrorism, it is in a mess.
Under the CMP, each state is responsible for its own cyber security. In Tripura, it is the CID that has been entrusted the task of dealing with cyber crime. But often it is seen that the absence of protocol leaves the CID sleuths rudderless. Countering cyber crime needs lots of training and very often the CID top brass is not willing to leave their officers to undergo training. This hampers investigations. Cyber crime is on the rise in Tripura in recent times...........

Click here to read more ...... 
Solutions : www.xcyss.in

29 May 2012

From virtual world, hacktivism spills into real world

After showing their displeasure over blocking of websites by the government by breaking into official websites of various government and private organisations, hacking group ‘Anonymous’ is now taking to the streets to protest against the move.The hacker group is now planning to hold peaceful protests across the country on June 9...... 

Cities like Mumbai, Indore, Kolkata, Chandigarh, Calicut, Cochin, Bangalore and Hyderabad among others have featured on the group’s tweets as locations for the peaceful protests. The group has also posted directives for a peaceful demonstration on their Twitter page........

With Indian ISPs blocking video-sharing and music-sharing sites, hacker groups are upping their ante against Indian websites. From private to government websites, the hackers are not leaving any stone unturned to mark their protests against the recent government’s decision to block certain websites.

The threat is so prominent that the Computer Emergency Response Team India (CERT-In) has now come out with a warning to the government and private organisations about the threat from the hackers...............

Earlier this month, access to file-sharing websites, like ThePirateBay and Vimeo was blocked by Indian ISPs. In protest, ‘Anonymous’ have hacked into a number of websites, including the official websites of the SC, BJP and Reliance........

Click here to read more ...... 
Solutions : www.xcyss.in

28 May 2012

Google warns users of internet shutdown on July 9

Search giant Google has issued a warring to its millions of users that they could lose the ability to connect to the internet in July due to a computer virus

The problem began when international hackers ran an online advertising scam to take control of infected computers around the world. ...............


Click here to read more ...... 
Solutions : www.xcyss.in

Low security make netizens vulnerable to cyber crimes


Lack of awareness about internet and low level of internet security is fast making Indore a heaven for cyber crimes and criminals. There has been a steady increase in the number of cyber crimes registered in the city. These include ATM fraud, phishing and impersonation.
The city along with other emerging cities face increasing risk of online attacks as cyber criminals look to exploit the low adoption levels of security measures in these cities.............
Industrial emerging cities are really vulnerable to cyber crimes and Indore is among them. Crimes like banking frauds, credit card frauds, ATM frauds, recruitment fraud, harassment, fishing, disturbing communal harmony, impersonation, morphing, defamation and character assassination are on the rise..........


Click here to read more ......
Solutions : www.xcyss.in

Reputed websites under hacker threat: CERT-In

Websites of reputed government and private organisations are under threat from hackers, the Computer Emergency Response Team India (CERT-In) has said, warning users to be extra cautious while using the internet

"It is observed that some hacker groups are launching distributed denial of service (DDoS) attacks on websites of government and private organisations in India. The attacks may be targeted to different websites of reputed organisations," CERT-In, the national nodal agency for responding to computer security incidents, said in an advisory on its website.............. 



Click here to read more ......
Solutions : www.xcyss.in

Anonymous hacks BJP sites, calls for protests on 9 June


Hacker group Anonymous is continuing with its campaign against Internet censorship in India. The latest victim of the attacks are the BJP and its websites. The group announced on its new Twitter account @opindia_back saying that www.mumbaibjp.org and www.bjpmp.org.in had been hacked.
The group also posted a message to web users, asking them to organise protests against “web censorship” in India on 9 June.
On Saturday, it was Reliance net users who had to face the wrath of the hacker group. Users of the service provider were unable to access Facebook and Twitter and instead were redirected to a page containing a strongly worded statement against attempts by the Indian government to censor the Internet...............

Click here to read more ...... 
Solutions : www.xcyss.in

25 May 2012

Cyber cell says Univ hasn’t filed complaint it said it has

While Mumbai University claims that it lodged a complaint with the city’s cyber crime department, after Mumbai Mirror reported a physics paper leak on Facebook on Thursday, the cyber crime cell has said that it has not received any such complaint - either at its Crawford Market station or the one in BKC.

Himanshu Roy, Joint Commissioner of Police said, “If the university lodges a complaint, we will take up the matter seriously.”

Naresh Chandra, pro-vice chancellor said on Thursday that the university was conducting a high-level inquiry into the leak, and had filed a complained, but no such complaint had been filed even at the time of going to press.
.....


Click here to read more ...... 
 Solutions : www.xcyss.in

Hackers raid Oz telecom site affecting 35,000

Sydney, May 24 (ANI): Australian telecommunications company Telstra has been hit by a "hacking attack" which has affected over 35,000 customers.
....
It said information that may have been obtained "was limited to BigPond Games user names, the email address used to join the site and the encrypted GameArena and Games Shop passwords of up to 35,000 customers".
....


Click here to read more ...... 

 Solutions : www.xcyss.in

Transcript: Anonymous Operation India press conference

Anonymous Operation India, the hacker group apparantly behind recent attacks on a number of Indian websites in protest against the government and court orders to restrict access to certain websites had invited the media to join them on a Internet Relay Chat press conference on Friday.
The hacking group alleged that the media chose to ignore their operations.........

Click here to read more ...... 
 Solutions : www.xcyss.in

Anonymous Operation India hackers plan peaceful protest on June 9


New Delhi: After launching attacks on a number of websites in protest against Internet censorship, hacker group Anonymous Operation India is planning a more traditional way of protest.
Anonymous India announced its plans in an Internet Relay Chat (IRC) press conference and also posted a YouTube video to promote the protest. In the press conference, Anonymous India claimed hacking into Reliance Communication's servers and accessed a list of URLs blocked by the ISP that also allegedly includes Facebook profiles of protesting Air India pilots.
.....


Click here to read more ......

 Solutions : www.xcyss.in

Hacking attempt on RBI website renders it inaccessible

The Reserve Bank today said there was an attempt to hack its website yesterday rendering it inaccessible for almost the entire day.
"It was a DNS (Domain Name System) attack where the hacker tried entering the website from a single Internet protocol address multiple times, jamming its bandwidth," an RBI spokesperson said.
 .....
Click here to read more ...... 
 Solutions : www.xcyss.in

Are India, US soft target for cyber attacks?

No matter what, but there’s always a concern regarding the protection of valuable data or information stored. Keeping this in mind, different companies are continuously coming forward to introduce different security solutions. But, still cyber attacks take place.

Sources informed that security experts have discovered the biggest ever series of cyber attacks, which found that hackers have penetrated into many networks with time. Report also revealed that most of attacks took place in networks of the Indian government and United Nations.

According to a latest report, about 112 government websites, including that of the Planning Commission, the Finance Ministry and various State government agencies were hacked or defaced from January to March period.

Recently, security company McAfee has discovered that there is one ‘country’ after all the attacks but it refused to reveal the name. However, insiders disclosed that all the evidences are pointing towards China.

As an adverse effect, companies are losing their economic advantage and national secrets to unscrupulous competitors, which affect economic growth drastically..........

Click here to read more ......
Solutions : www.xcyss.in

Accessing Net to soon become faster, cheaper


Accessing Internet could soon get faster and cheaper. The Department of Telecom is planning to make it mandatory for all Internet Service Providers to connect to the National Internet Exchange of India (NIXI).
If this happens then domestic Internet traffic will remain within the country, which will save ISPs the cost of buying international bandwidth. For example, an e-mail sent from Delhi to Mumbai may now be routed through servers in the US for which the ISPs need to buy international bandwidth. If all the ISPs connect to the NIXI then this data can be kept within the country. This will reduce costs which will lead to lower data tariffs.........
This system was first suggested by Telecom Regulatory Authority of India in 2007 but so far the DoT has not made any serious attempts in putting the policy in place. But now an internal committee has mooted the idea in a bid to make Internet more affordable.............

Click here to read more ...... 
Solutions : www.xcyss.in

Terrorists Will Turn To Cyber Warfare


Cyber weapons will be the artillery of choice for tomorrow’s terrorists, wreaking as much damage as conventional weapons warns security expert Eugene Kaspersky.

Cyber weapons can damage a physical object as badly as a traditional weapon. It is a realistic scenario against any country because we all have the same systems. All it takes is the wrong people with the right motives.

Kaspersky referenced the Stuxnet virus attack which destroyed an Iranian nuclear plant by overriding and controlling circuits, ultimately damaging them physically. It was the first example of a cyber "super weapon"......

A cyber weapon attack could shut down the electricity grid and telecommunication infrastructure of a country, causing social disorder, financial turmoil and anarchy.

These digital weapons will be spawned by hacktivists groups, such as Anonymous, whose "internet vandalism" could be brought about willingly or by militants............


Click here to read more ......
Solutions : www.xcyss.in

24 May 2012

Gen Y communicates via social media

An increasing number of teenagers in India are using social networking sites to remain in touch with each other with mobiles as their favourite gadget..........

The GenY Survey 2011-12 by Tata Consultancy Services (TCS) covered 12,000 high school students aged between 12-18 in 12 cities including Mumbai, Delhi, Kochi, Pune and Lucknow between July and December 2011. 

While 84 per cent of the respondents had internet access at home, 85 per cent used social networking site such as Facebook and 79 per cent owned a mobile phone. Preferring entertainment on the move, 28 per cent of the respondents said mobile phone was their favourite gadget...........

Majority of youngsters preferred information technology as a career option followed by engineering and medicine.........


Click here to read more ...... 
Solutions : www.xcyss.in

Boy held for posting slanderous message about teachers

A class XII boy student in Madurai has been arrested for allegedly posting photographs of two women teachers with some slanderous comment on a social networking site.

The 18-year old boy had been pulled up by the teachers after they saw him chatting with a girl student in the school campus during working hours.

Angered by this, the student posted the photos of the teachers with allegedly calumnious messages on the networking site. He had also provided their e-mail IDs in that post...........


Click here to read more ...... 
Solutions : www.xcyss.in

23 May 2012

Why is India paranoid about privacy?


Lack of effective legislation to protect personal data and the government’s efforts to monitor communications contribute to rising unease...........

When the world’s largest online company Google Inc. changed its privacy policy in March making personal information more vulnerable, it immediately came under the scrutiny of both the US and the UK governments. But India has no teeth to handle such a situation; the changes by Google do not fall within the purview of the country’s Information Technology Act, 2000, minister of state for communications Sachin Pilot told the Rajya Sabha on 30 March.

While India, too, may need a law to protect its people from being exploited by companies—51 million of Facebook’s 900 million users are from India—many Indians also fear the possibility of the government monitoring personal information under the garb of protecting the nation..........

As companies develop more tools to collect and analyse user data, there are increasing concerns of how data on people are being collected, used, shared and combined, both by governments as well as by private companies.............

In India, though Internet penetration is a dismal 10%, it is expected to leapfrog with the advancements in mobile telephony................

Click here to read more ...... 

Solutions : www.xcyss.in

Top Internet security expert warns 'cyber warfare technology will be used by terrorists'

Cyber crime weapon production increases


Cyber criminals are cranking out new weapons at a brisk pace, tailoring malicious software for a spectrum of gadgets including smartphones, tablets, and Macintosh computers...

A “threats report” released late Monday by McAfeeshowed that the number of new pieces of malicious code, or “malware,” targeting Windows machines in the first three months of this year was the highest in four years. There was also a rise in malware aimed at mobile gadgets running on Google-backed Android software and at Macintosh computers based on Apple operating systems.................

For a long time cyber criminals concentrated their attention on getting into Windows-powered personal computers (PCs) because the popularity of the operating system meant a wealth of potential victims.

But as Apple and Android devices have caught on around the world, they have emerged as a new target.

As more homes and businesses use these platforms, the attacks will spread............

The number of networks of virus-infected computers, referred to as “botnets,” rose to nearly five million, with Colombia, Japan, Poland, Spain and the United States seeing the biggest increases.

Hackers use ploys such as booby-trapped emails or links to secretly infect machines with malware that can let them not only steal data or track keystrokes but use the infected machines to launch further attacks.................

Click here to read more ...... 
Solutions : www.xcyss.in

Cyber Crooks: In It for the Money


Hacktivists steal headlines with their often-audacious attacks against high-profile targets. While it's easy for IT and security professionals to get caught up and imagine hacktivists will be breaking into their networks next, cyber-criminals intent on making money remain the bigger threat................
A majority of the respondents in the latest Impact of Cybercrime on Business report said financial fraud was the primary motivation behind cyber-attacks against their organizations. Theft of customer data and intellectual property was the next common reason behind the attacks, followed by disruption of business operations..........
Cybercriminals are no longer isolated amateurs. They are members of organized groups and contract out work to highly-skilled individuals to craft and execute targeted attacks. The goal of attackers is to obtain valuable information, and what constitutes valuable information has expanded in recent months. Employee records and login information for Facebook and email accounts can be sold alongside credit card data on the black market..........

Solutions : www.xcyss.in

22 May 2012

Firewalls can help hackers break into Facebook, Twitter

WASHINGTON: Firewall technology designed to boost security can unwittingly reveal data that could help a hacker break into Facebook and Twitter accounts, a new study says.

Using Android smartphones, Z. Morley Mao, computer science associate professor at the University of Michigan, and doctoral student Zhiyun Qian revealed how an attacker could hijack a TCP (transmission control protocol) Internet connection by taking advantage of publicly available information on smartphones. 



Click here to read more ......

Solutions : www.xcyss.in

Internet attacks target small cities, small biz in India

 25% of bot- infections reported from small cities, targeted attacks up from 77 a day to 82 .

Small and emerging cities and small and medium enterprises are the latest targets for cyber criminals. Cities such as Bhubaneshwar, Surat, Cochin, Jaipur, Vishakhapatnam and Indore are increasingly facing the risk of cyber attacks, with 25% of bot- infections in India reported in such cities, said the new finiding from Symantec.
The Internet Security Threat Report, from Symantec also shows that advanced targeted attacks are spreading beyond the more commonly assumed target of large organizations with 50% targeting small and medium organizations in 2011. In addition, the report highlights that while the number of vulnerabilities decreased by 20%, the number of malicious attacks continued to skyrocket by 81%.



Click here to read more ......

Solutions : www.xcyss.in

RBI warns against fraud emails

 MUMBAI: The Reserve Bank of India today warned the general public against fraud emails bearing its name being sent by unscrupulous entities asking customers to share information.

The central bank said it was come to its notice about an email from mail id: alert@rbi.org, which was signed by RBI Online offering a new online security platform.

 
Click here to read more ......

Solutions : www.xcyss.in

बीएसएनएल के सीनियर एसडीई ने बनाए 25 महिलाओं के अश्लील वीडियो

धर्मशाला से गिरफ्तार बीएसएनएल के सीनियर एसडीई आरके शर्मा उर्फ प्रशांत योगी अब तक 25 महिलाओं के अश्लील वीडियो बना चुका है। योगी ने जयश्री से शादी रचाने से पहले तीन शादियां की थीं। इनसे वह तलाक ले चुका था।

बेंगलुरु से आई मेडिटेशन सेंटर में ठहरी पर्यटक महिला की शिकायत पर पुलिस ने रविवार को योगी को गिरफ्तार किया था............

सुधेड़ में आरके शर्मा के निजी आवास में संचालित किए जा रहे यथार्थ मेडिटेशन इंटरनेशल सेंटर में वह बाहरी राज्यों की महिलाओं को आकर्षित कर बुलाता था। इसके लिए उसने कई वेबसाइट और ब्लॉग बनाए हैं। मेडिटेशन के नाम पर अन्य राज्यों की महिलाएं प्रशांत योगी के पास मेडिटेशन और योग सीखने आती थी। प्रशांत योगी बाथरूम में गुप्त कैमरे लगाकर उनके अश्लील वीडियो बना रहा था............

योगी ने बाथरूम में स्विच के पीछे गुप्त कैमरा छिपा रखा था। इसका कनेक्शन उसके बेडरूम में रखे कंप्यूटर से जुड़ा था...................


Click here to read more ...... 
Solutions : www.xcyss.in

सावधान! फेसबुक पर चैटिंग से कंप्‍यूटर को खतरा


अगर आप फेसबुक पर चैटिंग करते हैं तो जरा सावधान हो जाइये। एक नया कंप्यूटर वायरस फेसबुक चैट मैसेंजर के जरिए फैल रहा है। यह वॉयरस आपके कंप्यूटर के एंटी वायरस पर हमला कर उसे निष्क्रिय कर देता है और फिर आपके दोस्तों को अपने आप लिंक भी भेज देता है। इंटरनेट सिक्‍योरिटी एक्सपर्ट्स ग्रुप ट्रेंड माइक्रो ने steckt.Evl नाम का यह नया वायरस खोजा है..........

ट्रेंड माइक्रो ने बताया कि यह वॉयरस अभी फेसबुक जैसी सोशल नेटवर्किंग वेबसाइटों की इंस्टेंट मैसेजिंग एप्लीकेशन के जरिए फैल रहा है। यह एक लिंक के रूप में आता है और क्लिक करते ही अपनी कॉपी डाउनलोड कर लेता है। एंटी वॉयरस को निष्क्रिय करते ही यह कंप्यूटर में अपने आप अन्य नुकसानदेह सॉफ्टवेयर डाऊनलोड कर लेता है। यही नहीं यह उन एप्लीकेशन की फाइलों को भी डिलीट कर देता है जिन्हें इसने निष्क्रिय किया होता है। इस वॉयरस के जरिए इंटरनेट पर आपको कंप्यूटर का दुरुपयोग किया जा सकता है और कंप्यूटर में सेव की गई निजी जानकारियों को भी चुराया जा सकता है............
 

Click here to read more ......
Solutions : www.xcyss.in

एमबीबीएस छात्रा की अंतरंग वीडियो क्लिप इंटरनेट पर, मचा हड़कंप


रोहतक.पंडित बीडी शर्मा स्वास्थ्य विश्वविद्यालय में अध्ययनरत एमबीबीएस अंतिम वर्ष की एक छात्रा की अंतरंग वीडियो क्लिप इंटरनेट पर अपलोड होने से हड़कंप मच गया है। वीडियो क्लिप को डाउन लोड उसके ही मित्र ने की है। मामला संज्ञान में आते ही संस्थान के अधिकारियों ने छात्रा के रूम की जांच पड़ताल कर उसे सील कर दिया है।

सूत्रों के अनुसार एमबीबीएस के अंतिम वर्ष की छात्रा का मित्र एनआरआई है और वह विदेश में रह रहा है। विदेश से कंम्यूटर पर वैब कैम का इस्तेमाल करते हुए फोटो और वीडियो शेयर कर लिए। इसका फायदा उठाते हुए उसके एनआरआई मित्र ने उसकी क्लिप एक साइट पर अपलोड कर दी।

हैरत की बात है कि इसकी भनक छात्रा को कतई नहीं मिली। इसका पता तब चला, जब संस्थान के ही किसी छात्र ने उसकी तस्वीरें देखी.........................

Click here to read more ...... 
Solutions : www.xcyss.in

Ravi sentenced for cyber bullying

Indian American student Dharun Ravi was on Monday (May 22) sentenced to 30 days in jail by a US judge on hate crime charges by using a webcam to spy on a homosexual roommate who later committed suicide, terming his behavior "cold, calculated and methodically conceived." Ravi was also hit with three years probation, 300 hours of community service, a USD 10,000 fine and counseling on cyber bullying and "alternate lifestyles"...............


The case has polarised opinion across the country about whether hate crime statutes should be used for non-violent crimes and whether Ravi is being scapegoated for a wave of bullying cases against gay teenagers...........
  
Click here to read more ...... 
Solutions : www.xcyss.in

21 May 2012

Anonymous takes out Indian CERT as attacks continue


Hacktivist group Anonymous continued its attacks on the Indian government and creative industries at the weekend by taking out the web sites of the national CERT and the country’s President in retaliation for widespread blocks on video and file sharing sites.

The group’s @opindia_revenge Twitter account documented the latest attacks, which also appeared to take offline the web site of film company and broadcaster Reliance Big Entertainment, and government portal india.gov.in.............


Click here to read more ...... 
Solutions : www.xcyss.in

MHA unveils new cyber structure

Faced with increasing cyber crimes and defacements of Indian websites, the Union home ministry has unveiled a new cyber security architecture to deal with the new threats to national security from cyber space.

Cyber attacks on the Prime Minister’s Office (PMO), CBI and other government infrastructure in recent times has prompted the MHA to draw up an institutional structure for cyber security, clearly defining the roles and responsibilities of stakeholders...............

The government will set up a National Centre of Excellence for cyber forensic services (CoE), exclusively devoted to render Cyber Forensic Services and act as a National Research and Training Centre on Cyber Forensics apart from offering forensic analysis services to law enforcement agencies. It will also impart the critical training to cyber crime police personnel in states. The Data Security Council of India (DSCI) core team will liaise with this centre for inputs and guidance to state agencies.......

The IDSA’s latest report on “India’s Cyber Security Challenge”, released by NSA Shivshanker Menon this week says United States was the first country to formally declare “cyber war” as fifth domain warfare after land, sea, air and space. In 2010, China overtly introduced its first department dedicated to defensive cyber warfare and information security.
“The race is on. India is a target. There have been numerous incidents of sensitive government and military computers being attacked by unknown entities and information being stolen,” says the report adding as many as 219 government websites were defaced by various hacker groups in January to October 2011...........
Click here to read more ...... 
Solutions : www.xcyss.in

Problems with social networking


We all know how wonderful social networking is—how we’re all in touch with each other and updated on each other’s lives. Sometimes, we know even more about people who live abroad than those who live right next door. But some problems have come about because of all the sharing and connectivity too..........
  • Life envy – All of a sudden, you find yourself wondering why your life isn’t as fun and fabulous as those of your friends. Whenever you check Facebook, Twitter, tumblr, or Instagram, they’ve uploaded photos of themselves at a party having the time of their lives while you… are still in your pajamas at three in the afternoon on a Saturday.

  • Friends are reduced to likes – Instead of seeing who liked your photo or status update, you’re checking to see how many did. It doesn’t really matter who liked what you posted, but how many likes you were able to get! But then again, once someone really special laughs at a joke you just told him, he’s all that matters, right? Or at least he should be.

  • False information can spread like wildfire – Some people are careless in sharing news without checking the facts first..........

  • People are less sensitive – It’s easy to comment on someone’s post when you aren’t right in front of them. It gives you more bravado, something you might think twice about if you were having an actual conversation. This has been the cause of many fights, or the reason for blocking and hiding friends.........

  • Stalking becomes easy – If you want to know more about a person you’ve just met or heard about, all you need to do is search for them and go through what they have posted on their social networking sites. Because of this, how many people haven’t been hired because of what they’ve posted on their pages..................

  • You feel lonely – It may not make sense, but as social networking brings us together, it can make you feel lonely too. As you see everyone’s connections and friendships, how people comment and like everyone else’s posts and not yours, how people get in touch with you only when they want you to like their photo so they can win a contest, and so on. Or what if you see a photo of all your friends at a get-together and you had no idea about it?..................



Click here to read more ...... 
Solutions : www.xcyss.in

Indian hackers deface Multan government website


The Multan district government website was defaced by Indian hackers on Sunday. The hackers had erased all official data on the website and posted anti-Pakistan and anti-government slogans on the homepage.
Indian national songs, supposedly sung at a concert, were being played as background music on the website.
The website, www.multan.gov.pk, is the Multan government’s official website and contains important data vis a vis the district.
A group named ‘Indishell’ claimed hacking the website, with its name prominently mentioned on the homepage, along with a message saying ‘We have an EYE on you’, that is strategically placed under cat eyes with pupils donned as the Indian flag.
The website had information including maps, buildings, history, culture of Multan along with a list of ongoing developmental projects in the district.....................


Click here to read more ...... 
Solutions : www.xcyss.in

Hackers push India into signing Budapest Convention


Stung by an alarming number of 8,000 cyber attacks targeting government institutions foiled since the Commonwealth Games, India has been pushed into signing the Budapest Convention - the only existing international treaty to fight the growing menace and also join hands with the US and UK to strengthen this international legal framework against cyber crime.

While New Delhi's close ally Moscow, and Beijing have been campaigning for a new treaty to deal with cyber crimes, India is unwilling to join that framework as most cyber attacks targeting India have originated in China.
Governments world-wide have complained about their networks being targeted from Chinese soil. But last March, the Chinese government denied allegations of supporting hackers to launch cyber attacks against other countries.
But a report by US Northrop Grumman for the US-China Economic and Security Review Commission, accused Beijing of funding research to bolster cyber attacks against US military commands and the contractors that serve them, particularly telecommunications systems.
While India will have its own cyber-security architecture soon, it is also studying the Budapest Convention that was adopted in 2001. Sources said India will take final call soon on signing the Budapest Convention...........

Click here to read more ...... 
Solutions : www.xcyss.in

Are you a cyber crime victim?


While most cities in India are racing to garner other kinds of laurels, Bangalore is battling tooth and nail to seize the title of cyber crime capital of our country. Spams and obscene mails have become so frequent that cyber crime requires no introduction for Bangaloreans today. Close to 200 cyber crime cases are recorded every year in the city, however, only 10 per cent of them are actually solved.
There are many reasons for these increasing incidents of cyber crime in the city. Firstly, the problem stems from the root cause, that is the conviction rate has been on the decline in the last decade. Out of 307 cases that were filed in the past nine years, only 60 of them were actually charge sheeted..........
Secondly, a lot of evidence is lost either during the investigation or due to lack of awareness amongst the public. Many a time, people do not take these things seriously and end up deleting the mails.........
Cyber crime is still new and not many people are aware of its technicalities...............


Click here to read more ...... 
Solutions : www.xcyss.in

18 May 2012

Kids need counselling on social networking sites

Children addicted to social networking sites without understanding their implications are falling victim to grudges which move from cyberspace to the real world...........

Recently, a Class 10 student on Wednesday stabbed his classmate in a central Delhi school, apparently miffed at the latter posting a photograph of his on Facebook........... 

In another case  students had created a page on their teacher on a social networking site so that they can make fun of her and abuse her............

The lack of counselling and emotional management skills in children along with unhindered access to networking sites are giving way to violent expressions among children unable to handle the situation..............

Children need to be told that networking sites are not for spreading hatred or vent anger. Schools should take initiatives and counsel the students. This is a must. Unfortunately, not much attention is being given to counselling on cyber activity................



Click here to read more ...... 
Solutions : www.xcyss.in

Cybercrimes (via cell phones) up in 2011


Addicted as we are to our online life and our mobile devices, it's no surprise that a growing number of cybercriminals are lurking out there with us.
Their newest target is right in our hands: our cellphones.
Complaints of cybercrime topped 314,000 in 2011 -- up 3.4 percent from the previous year -- and California led the nation, according to a new report issued by the Internet Crime Complaint Center.......
Online crime occurs in varied forms, from identity theft that uses personal information to commit fraud, to phony job schemes involving bad check deposits, to "romance scams" that seduce the lovelorn to send money to a pseudo-suitor. Nationwide, the average victim who filed a complaint last year was duped out of $4,187, reported the center, known as IC3....

Click here to read more ...... 

Solutions : www.xcyss.in

‘Digital forensics required to combat rise in ME cyber crime’


AccessData Group, the pioneer of digital investigations and litigation support, is set to generate regional awareness about digital forensics and incident response technologies through its participation in a key cyber security conference that was held in Dubai late last week.........
Companies in the region are beginning to realise that there is a need for holistic cyber security. The malware attacks plaguing the region are growing not only in volume but also in sophistication.
Merely having a firewall or basic security system in place is no longer sufficient. Both government and private enterprises need to address this by developing a security strategy that includes digital forensics and incident response...........
It was also discussed about the rise of targeted high-tech and e-Crime, which will include the increase in malware attacks being seen around the world, including the Middle East, and the risks they pose to Critical National Infrastructure...........

There is also requirement of dynamic malware analysis tools and visualisation solutions to detect, investigate, remediate and prevent such attacks........

Click here to read more ......

Solutions : www.xcyss.in

Cybercrime will cost Scottish businesses £31 billion this year


THIS YEAR the Office of Cyber Security and Information Assurance (Oscia) projected that cybercrime alone will cost Scottish businesses and consumers well in excess of £31 billion. In an attempt to address cybercrime and to safeguard economic well-being across the country, the first e-crime Scotland Summit will be held next week on Tuesday.
As larger businesses find the finances to increasingly step up their game to identify and respond to the threat of cyber crime, small to medium sized enterprises are at risk of falling behind, which in turn puts them and their customers at greater exposure to e-crime. Many of these businesses may be put off by the cost, time, and specialist expertise needed to ensure good IT and network security. But the reality is, as next week’s event will show, there are easy steps to protect against e-crime..........

Click here to read more ......
Solutions : www.xcyss.in