28 June 2012

Indian-origin student charged with hacking in UK

An Indian-origin student of Liverpool John Moores University in the UK has been charged with hacking into the varsity's computer system, police sources on Wednesday. Charantoor Kultar Singh - 22, was arrested by police from the North West Hub of the Police Central e-Crime Unit on April 30 over the suspected hacking. 

He has now been charged with unauthorised access to a computer system and unauthorised impairment of a computer programme...............


Click here to read more ...... 
Solutions : www.xcyss.in

More than 5 in every 10 Indian children bullied online: Survey

Over half of the Indian children who surf Internet face cyber bullying -- getting threatened or being harassed online -- a Microsoft study has found. 

According to Microsoft's 'Global Youth Online Behavior Survey' of 25 countries, India ranked third with 53 per cent of respondents (children aged between 8-17) saying they have been bullied online, behind China (70 per cent) and Singapore (58 per cent). 

Cyber bullying can be defined as use of technology to harass, threaten, embarrass or target another person..............


Click here to read more ...... 
Solutions : www.xcyss.in

State-led Hacking Cost Company 1 Billion Euros

A British company suffered lost revenues of €1.0 billion ($1.25 billion) because of a state-sponsored cyber attack against its computer systems, according to the head of the United Kingdom’s inland security agency. The hit was said to be suffered through intellectual-property loss and from “commercial disadvantage in contractual negotiations.”........................


Click here to read more ...... 
Solutions : www.xcyss.in

27 June 2012

Mantralaya fire: Data from burnt computers can be retrieved: Expert


The Mantralaya inferno last week devoured over 3.5 crore pages in government files. While 2 lakh of these pages were digitized, what is worrying the government is that fire also damaged 2000 computers in which the matter was stored. But there is some hope.............
In Maharashtra alone, daily 40-50 cyber crimes are reported but seldom converted into FIR because of the lack of investigation techniques. It is not just the metros where cyber crimes are reported. There has been staggering growth of cyber crimes in rural parts too...............

Click here to read more ...... 
Solutions : www.xcyss.in

Cyber criminals may have siphoned off 2 bn euros from 60 banks


Cyber criminals may have attempted to siphon off anywhere between 60 million euros and 2 billion euros in fraudulent transfers from at least 60 banks globally, a McAfee and Guardian Analytics study said.
The study highlighted a highly sophisticated, multi-tiered, global financial fraud ring that is comprised of at least a dozen groups use active and passive automated transfer systems to steal high value amounts from high balance accounts...........


Click here to read more ...... 
Solutions : www.xcyss.in

Hacker should pay Johansson, other celebrities $150,000, feds urge


Federal prosecutors want a man who hacked the email accounts of celebrities and their associates and obtained naked images of Christina Aguilera, Renee Olstead and Scarlett Johansson to serve 71 months in prison and pay the celebrities about $150,000 in compensation.
Christopher Chaney, 35, of Jacksonville, Fla., whose pleaded guilty in Los Angeles federal court to nine counts of computer hacking, hacked almost daily for two years into email accounts of 50 people in the entertainment industry.
Prosecutors in a sentencing memorandum say Chaney took naked images of Aguilera from her stylist's email account, Olstead's from her email stream and Johansson's from emails she sent to her then husband Ryan Reynolds. He forwarded them to another hacker and two celebrity websites, who made them public. They remain in wide ciriculation...........

Click here to read more ...... 
Solutions : www.xcyss.in

US charges 24 people in massive hacking sting

US law enforcement officials on Tuesday said 24 suspected hackers had been arrested in a sting operation spanning four continents that targeted online financial fraud of stolen credit card and bank information. 

In a two-year investigation, FBI agents posed as hackers on Internet forums, watching as other hackers swapped methods for breaching data security walls and creating fake credit cards that would work for Internet and in-person purchases............
 
Click here to read more ......
Solutions : www.xcyss.in

MI-5 chief warns of "astonishing," industrial-scale state-sponsored cybercrime


Anyone paying any attention to digital security at all knows the whole universe of cybercrime outgrew its hacker roots years ago, when it was largely taken over by organized crime gangs, primarily in the former Soviet Union, China and the United States.
Now it's outgrown organized crime as well, according to Jonathan Evans, head of MI-5, the British internal counter-intelligence and security unit that functions like a combination of the FBI and CIA in the United States.
Despite the resources and experience of a world-class intelligence operation such as MI-5, Britain is all but overwhelmed by complex, persistent, attacks that are anything but trivial early experiments into the potential for cyberespionage and warfare...............
Vulnerabilities in the internet are being exploited aggressively not just by criminals but also by states. The extent of what is going on is astonishing.
State-sponsored cybercrime isn't conducted by small teams assembled for a specific attack, as many organized criminal gangs operate........................

Click here to read more ...... 
Solutions : www.xcyss.in

Trojan Milicenso malware affects printers worldwide


Security researchers from antivirus company Symantec have pointed out a malware programme called Trojan.Milicenso that has infected printers connected to Windows PCs worldwide and is causing the automatic printing of pages full of garbled data................


If figures provided by Symantec are to believed, India and the U.S. are the worst hit regions followed by Europe and South America...........


Symantec says the Trojan.Milicenso can hit an infected computer via various ways, such as malicious e-mail attachments or visiting sites with malicious scripts...................



Click here to read more ...... 
Solutions : www.xcyss.in

26 June 2012

Hackers targeting Indian banks with advanced SpyEye, Zeus malaware variants


After targeting financial institutions in Europe, hackers are now increasingly targeting Indian financial institutions with the latest variants of malaware like SpyEye and Zeus to siphon larger amounts of money from bank accounts, Japanese security company Trend Micro has cautioned.....

The new software allows the criminal to siphon money out while he sleeps. It could significantly increase the number of hacked accounts and the speed with which they are drained..........


Click here to read more ...... 
Solutions : www.xcyss.in

Government must fight off 100 cyber attacks a month



The government’s IT agency deals with about 100 cyber-attacks a month, attempts to retrieve information from the government’s online infrastructure.
Cedric Mallia, who heads Mita’s agency’s computer emergency response team (Cert) that monitors government servers, said most of the attacks originated from foreign sources................
The main theme that featured in several discussions held during this weeklong event was the adoption of cross-boundary cooperation to achieve the universal goal of cyber-security......
We’re living in a hypo-connective world, where we’re connected to online systems all the time, everywhere. The main challenge remains to continue providing security and protect internet users without removing these connectivity benefits...............


Click here to read more ......
Solutions : www.xcyss.in

25 June 2012

.IN domain most sought after for Indian phishing attacks


Symantec’s latest analysis of the cyber threat landscape has revealed the rise of .in URLs in spam.

Last year, the India domain (.in) ranked 10th in the distribution list, while it has now jumped to the 5th position. Furthermore, 25 per cent of phishing attacks on Indian brands used the .in domain.

In May 2012, Symantec Intelligence also observed a whopping 187 per cent rise over the previous month in phishing attacks on Indian brands, all of which were in the banking sector. While these originated around the world, Hyderabad hosted the second highest number of phishing attacks on Indian brands. Hyderabad also tops the list of cities for this month that hosted phishing sites in India of non-Indian brands followed by Nashik, New Delhi and Bangalore on the 3rd and 4th place respectively................


Click here to read more ...... 
Solutions : www.xcyss.in

Cyber bullying on rise among teens


He's big, he's bad, and he's unnerving to face. We all have that terrifying bully at school and the characteristic brow-beater in the playground. But today, harassment doesn't stop there. With the hoard of teens and tweens moving into cyber space, the world has another breed of bully- the cyber bully! 

Cyber bullying is essentially the persistent harassment of an individual via technology like the internet, cellphone, etc……….

The internet provides not only a vivid interface for communication, but also the much needed anonymity essential for such a form of harassment. People, inept at social interactions, use the net to vent their aggression as they don’t feel an immediate sense of threat………….. 

The IT Act, 2000 states punishment to all those publishing information which is obscene as also to any form of breach in privacy and confidentiality. The Indian Penal Code (IPC) also covers this issue……………. 


Click here to read more ...... 
Solutions : www.xcyss.in

India unblocks access to video, file-sharing sites


India has now allowed access to video and file-sharing sites, including The Pirate Bay, which were blocked earlier over the issue of Internet piracy. The Madras High Court's earlier ruling made Internet service providers (ISPs) block access to entire sites to prevent a single film from being shared online......

The order stated that only specific web addresses, URLs, carrying the pirated content should be blocked, but not the entire website................


Click here to read more ...... 
Solutions : www.xcyss.in

Your online identity matters at work

In an era where online profiles are often seen and judged before the real person, it is important to ensure that your online identity presents a good image to your prospective employers.........

Social networking sites, which were earlier considered to be a domain only for teenagers, are increasingly being used as an important tool for building professional relationships and businesses. According to a survey conducted by reppler.com (a social media monitoring website), 91% of recruiters visited a potential employee's online profile as part of the recruitment procedure and 69% rejected the applicants on the basis of the content found on their online profile. However, 68% of them also hired prospective candidates on the basis of their presence on social networking sites..........


Click here to read more ...... 
Solutions : www.xcyss.in

22 June 2012

Social media 'could cut suicide'

Social media sites should be harnessed to help prevent suicide among young people, according to researchers................
In the past, internet sites have been criticised for encouraging self-harm. But the report says new media could instead be used to direct young people to seek help....
Now the researchers say the possible dangers posed by new media could be counteracted if the sites provided support for vulnerable young people.
They say because it is still a relatively new phenomenon, it is important to understand why internet postings can influence some young people to self-harm or take their own life.........
Click here to read more ...... 
Solutions : www.xcyss.in

Does the government need new internet surveillance powers?


Surveillance of citizens by governments is generally a bad thing. All things being equal, the more of it the worse. So regardless of the specific details of the legislation the government is going to propose in relation to the real time monitoring of Internet and mobile phone traffic data, it is something we should have a negative presumption about.....................
Whenever a new piece of cyber-surveillance is proposed, the same three issues are always brought up: terrorism, child pornography and cyber-crime. And sure enough, it is these three issues that supposedly justify the renewed intrusion this time around.
The argument that the government needs real time, rather than retrospective access to traffic data for investigating ‘ordinary decent’ cyber-crime, or even quintessentially evil child pornography is surely disingenuous. The conventional approach to crime is that one waits for a crime to take place before one tries to investigate it.................

Click here to read more ...... 
Solutions : www.xcyss.in

Is Monitoring Software an Invasion of Privacy… or is It the Smart Thing to do to Protect Your Children?


In recent years, cyber crime − a crime committed through the use of technology such as a computer or cell phone − has led to a disturbing number of tragedies, including an alarmingly high amount of teen suicides, sexual assaults and kidnappings. The Cyber Bullying Research Center reports that over 80% of teenagers use their cell phone every single day and nearly 25% of them have been the victims of bullying or sexual solicitations via this same technology.......................

Many recent news, alleged child molesting, has served cautionary tale for parents of the very real possibility that crimes against their children can occur right under their noses.

Many of these types of crimes could be intercepted and possibly prevented if the parents were able to track cell-phone activity and further monitor their child's surroundings.....................


Click here to read more ...... 
Solutions : www.xcyss.in

Are We Moving To the Cloud Yet?


Is it a good idea for you to shift your business to the cloud? Depends on which country you're talking about. Business Software Alliance (BSA), a global association of the software industry, has come out with a report on the adoption of cloud computing. While Japan and the US ranked at the top, India has been found to have a better regulatory environment for cloud computing. A host of parameters, from data privacy to privacy laws, have been used to arrive at the rankings....................

India scored 19, ahead of China and Brazil, due to a more liberal environment, and because its industry-led standards were found to be world class. India scored low on broadband deployment (which had the highest weightage in the report) and on lack of adequate clarity on intellectual property rights protection..............


Click here to read more ...... 
Solutions : www.xcyss.in

Cost of Cyber Attacks are Skyrocketing


If your company were hit with a cyber attack today, how much would it cost? The entire bill -- including costs from regulatory fines, potential lawsuits, damage to your organization's brand, and hardware/software repair, recovery and protection?
It's a question you can't ignore, as the costs of online attacks are skyrocketing. According to a 2011 study by the Ponemon Institute, the cost of cybercrime in the US could range from $1.5 million to $36.5 million annually...........
Cyber attacks, often in the form of data breaches and network intrusions, can impact operations, frequently result in lost productivity, legal expenses, third party liabilities, exposed intellectual property, and damage to a firm's reputation.............................

Click here to read more ......
Solutions : www.xcyss.in

Man held for sending lewd SMSs

A man who allegedly send vulgar text messages and emails to his friend and her sister was arrested by the cyber crime cell of theMumbai police on Thursday. 

The accused, Mohsin Mansuri, found it tough to profess his love for his friend.............


Click here to read more ...... 
Solutions : www.xcyss.in

21 June 2012

Vimeo, Torrent sites unblocked, new High Court ruling requires URLs to be specified

Indian ISP’s have restored access to file-sharing and video streaming sites, thanks to a new ruling by the Madras High Court that no longer requires ISPs to block entire websites, but to list specific URLs pertaining to the copyright infringement................


Via Medianama:
“The order of interim injunction dated 25/04/2012 is hereby clarified that the interim injunction is granted only in respect of a particular URL where the infringing movie is kept and not in respect of the entire website. Further, the applicant is directed to inform about the particulars of URL where the interim movie is kept within 48 hours.”..........
 
Click here to read more ...... 
Solutions : www.xcyss.in

20 June 2012

Impact of Cybercrime on Businesses revealed


Check Point has announced the results of a new survey revealing 65 per cent of organizations which experienced targeted attacks report the hacker's motivation was driven by financial fraud, and resulted in business disruption and the loss of sensitive information, including intellectual property and trade secrets. The report, The Impact of Cybercrime on Businesses, also showed companies reporting an average of 66 new security attack attempts per week, with successful incidents costing businesses anywhere from $100,000 to $300,000.............................. 
According to the survey, SQL injections were cited as the most serious types of attacks organizations had experienced in the last two years, and more than one-third of the respondents had each experienced APTs, botnet infections and DoS attacks. Following investigations of targeted threats, respondents reported the biggest consequences were a disruption to their business and the loss of sensitive data and intellectual property...........................
Click here to read more ...... 
Solutions : www.xcyss.in

Beware of cyber criminals

If you find visiting the nearby departmental store to purchase essentials loathsome and make online purchases instead, beware. The cyber criminals are on the prowl and they may hack your account. This was learnt the hard way by Dhanbad district chamber of commerce president Rajiv Sharma whose e-bay account was hacked when he made online purchase of a mobile handset. ............


Click here to read more ...... 
Solutions : www.xcyss.in

19 June 2012

Could US cyberspies have moles inside Microsoft?


US government officials could be working under cover at Microsoft to help the country's cyber-espionage programme, according to one leading security expert.
The warning comes in the wake of the Flame virus that targeted key computers in the Middle East, and in part used confidential Microsoft certificates in order to access machines.


Click here to read more ......

 Solutions : www.xcyss.in

Hackers mess up All India quota PG medical seats allotment

NEW DELHI: Authorities may still be grappling with the menace of leakage of question papers, but merit has come under fresh threats, this time from hackers who have succeeded in turning the merit list in prestigious 50% All India quota post-graduate medical courses upside down to allot low-ranked candidates premium seats in prestigious colleges.

Click here to read more ......

 Solutions : www.xcyss.in

Matrimonial sites becoming new crime spot


Wedding portals have become one of the most lucrative venues for new age con artistes to loot people. Cyber Crime sleuths say that hundreds of youngsters are falling prey to the sweet talk of these highly 'educated' con artistes and losing a lot of money.
In the last one year, Cyber Crime sleuths recorded two cases where con artistes successfully used matrimonial sites to dupe people. The recently arrested B Tech graduate B Ravi Kishore duped 54 women by posing as an IIT graduate with a Master's degree from University of California..............

Click here to read more ...... 
Solutions : www.xcyss.in

Anonymous India to use RTI in fight against Internet censorship


After a spate of attacks on a number of Indian websites and a ground protest event on June 9, that evoked lukewarm response, hactivist group Anonymous Operation India has chosen the Right to Information Act (RTI) as the latest tool in their battle against Internet censorship.
Anonymous India is urging Indian citizens to file RTI applications to seek information regarding the correspondence of public servants with Google, Facebook or other websites on content censorship. Anonymous India says they will collate the information and use it "in even more powerful ways." But did not venture upon further details.
This phase called 'Operation RTI Engaged' is a part of many initiatives planned by the hacker collective in their effort to force the Government of India rethink its Internet censorship strategy.............

Solutions : www.xcyss.in

Student hacks friend's email to deny him admission abroad


Jealous of his friend's performance, an MSc. (economics) passout from the Calcutta University allegedly hacked his email account and sent mails with a view to deny him an opportunity to study abroad........

Soumyatanu Mukherjee, 25, was arrested for hacking the email account of his friend Agnirup Sarkar. Mukherjee hacked the account and sent emails to foreign universities where Sarkar had applied for Ph.D that he did not wish to study there..............

School friends Mukherjee and Sarkar, after completing their MSc. in Economics from the Calcutta University, had applied for Ph.D in several foreign universities, including Virginia Tech in US. When Sarkar did not receive any communication from any of the universities, he called them up one by one. He was told they had received mails in which he himself had said that he did not wish to study there...................


Click here to read more ...... 
Solutions : www.xcyss.in

18 June 2012

Smartphones new targets of cybercrime

Cybercriminals are now targeting smartphones as they are looking for prey beyond the PC and mobiles suit them well, especially those using Android operating system, say experts.

With smartphones becoming more powerful and popular, we have seen a lot threat moving to them from PCs.

Although the risks to computers have not totally subsided, malicious software authors are now creating mobile-specific malware.

The number of vulnerabilities in the mobile space are rising and malware authors not only reinventing existing malware for mobile devices, but creating mobile-specific malware geared to the unique mobile opportunities...........


Click here to read more ...... 
Solutions : www.xcyss.in

14 June 2012

Cyber crime: How real is the threat?


With the announcement of new domain names such as  .porn, .lol and .google replacing traditional .com and .org domain names,  experts say the new web addresses could boost cyber crime. The new domain names, which in some cases will be practical and others comical, not only give web hosts more options but they also give cyber criminals more targets........

It might be easier to get fooled into going to illegitimate website. The chance of phishing attacks will be higher because there will be new domain names.........

A recent survey by internet security software maker Norton Antivirus, found that 60 per cent of Canadians have experienced cyber crime...........


Click here to read more ...... 
Solutions : www.xcyss.in

Terror experts remain vigilant


More than a decade after the 9/11 attacks, al-Qaida remains a potential threat in New Jersey, but officials who focus on homeland security in the region say they are more concerned about the threat posed by radicalized, local lone-wolf operators who could orchestrate small-scale attacks. They also see a growing risk of targeted cyber-attacks on the computer systems of New Jersey utilities, businesses and even law enforcement.........

Many cyber-attacks on businesses go unreported because company officials think their sensitive information was not compromised. But they may in fact have merely been used to infiltrate another corporation or entity........

Most organizations can't detect targeted intrusions. One can't rely on antivirus software – it won't detect it..........

Click here to read more ...... 
Solutions : www.xcyss.in

13 June 2012

IT security: How to put the genie back in the bottle


Regulatory compliance, cyberattacks, insider threats… the list goes on. Gaining control over IT security is a big messy problem for most large organizations, and getting worse with increasing regulatory requirements, more targeted attacks from criminal groups, and the potential for insider abuse. While security can equal compliance, compliance does not equal security.
Since these threats are persistent — point-in-time compliance approaches to security are doomed to fail..... 

Click here to read more ...... 
Solutions : www.xcyss.in

India's vulnerability to cyber attacks

A much-delayed cyber security policy is only making things worse

A fourfold increase in cyber attacks in the last four years underscores how easily India Inc can be hacked. A much-delayed cyber security policy is only making things worse………...

If the government doesn’t ‘wake up’ and implement ‘urgent measures’ to thwart the threat of cyber attack, much of the destruction has a good chance of coming true………….

Just last week, the proliferation of another powerful malware, Flame, has poignantly raised important questions about India’s preparedness in handling a cyber security challenge. Over the last decade, the country has seen an increase in the number of cyber attacks, from 2,565 in 2008 to 8,266 in 2009 and 10,315 in 2010………….

Even viruses that don’t specifically target the Indian state, but originate abroad and then find their way here, can wreak havoc…………….

But, is India prepared to handle a coordinated cyber attack? Experts point out that a major flaw in the country’s cyber-security policy has been the absence of any comprehensive cyber security approach. As a result, the legal and law enforcement agencies of the country have been unable to maintain pace with the rapid growth of internet penetration in India and the world…………….

The risk is more pronounced for private companies, where loss of important data could mean a tremendous advantage for the competitor. “Everyone is vulnerable. However, if I have to rank in terms of merit, the IT/BPO sector has the highest standards of security because of the pressure of foreign countries, followed by banks and then telecom,” says Kamlesh Bajaj, CEO, Data Security Council of India and former head of Cert-in…………...
Solutions : www.xcyss.in

Youth arrested for cheating girls online

Hyderabad, A youth who dated and cheated as many as 22 girls by collecting money from them using his fake matrimonial profile has landed behind bars. 


Ravi Kishore Bojanki from Masab Tank confessed that he had created a profile on a matrimonial site falsely stating that he did IIT in Mumbai and MS from University of California and was presently working with a IT major here.............


Upon seeing his impressive profile, many girls including the complainant contacted him and subsequently developed close relationship with him online and even fixed matrimonial alliance. However, Ravi, taking advantage of the situation and to earn easy money squeezed huge amounts from these girls by exploiting them emotionally with false stories like his father was undergoing surgery or his mother met with an accident. The accused extracted about Rs 12 lakh from the victims and was leading a lavish life..... 
Click here to read more ...... 

Solutions : www.xcyss.in

12 June 2012

Certified IT Security Professional Course launched


Governments across the world are bringing in laws, rules and regulations to safeguard their cyberspace. Demand for IT professionals with sound Information Security knowledge is skyrocketing. In recent past US and Europe were hit by massive unemployment but still demand for IT professionals with cybersecurity knowledge grew by 11%. Indian Government is laying in slew of measures to secure Indian cyberspace and has directed that critical information infrastructure organisations to hire only Indian cybersecurity professionals as CISOs and for Information Security related activities.

Using 25 years of experience in the field, XCySS has developed an in-house focussed course for the IT professional to lay a strong knowledge base over which they can specialise in the field of their choice. This course comprehensively covers all domains of Information Security / Cybersecurity including the emerging field of Cloud Security which is designed to help IT professionals to build and shape their career in the field of Information Technology. 


Who should attend: Undergraduates, software developers, website designer System Administrators, Network Administrators, Database Administrators, IT managers, Penetration tester, IT Service Providers, ISMS implementers, software developers, researchers, incident handlers, Risk Assessors, IT/ITeS Subject Matter Experts, website developer and managers, SEO professionals and Information Security Enthusiast/Aspirants and ISO 27001 Lead Auditors. 


For detail:
Contact: email: info(at)xcyss(dot)com
Tele: 011-25128910
Website: www.xcyss.in

Global energy assets in the frontline of cyber war


Enemies could use cyber-weapons in case of political tension. Therefore, governments are concerned that energy and communications networks would be the first victims of any conflict with a cyber-savvy aggressor........

Global energy infrastructure is more vulnerable than ever in an escalating cyber war thanks to “sons of Stuxnet” electronic missiles, which can be created from the virus designed to sabotage Iran’s nuclear programme.


Cyber espionage is on the rise, with Chinese hackers stealing field data and cutting-edge technology from energy companies around the world since at least 2009. But the biggest threat to everything from power grids to digital oilfields may come from malware based on the Stuxnet worm, widely thought to have been sponsored by western government agencies. Cyber weapons like Stuxnet that can take control of plants appear to be more of an operational danger than the recently-discovered Flame virus, which seems designed to gather data..............


Click here to read more ...... 
Solutions : www.xcyss.in

Certified IT Security Professional Course launched


Governments across the world are bringing in laws, rules and regulations to safeguard their cyberspace. Demand for IT professionals with sound Information Security knowledge is skyrocketing. In recent past US and Europe were hit by massive unemployment but still demand for IT professionals with cybersecurity knowledge grew by 11%. Indian Government is laying in slew of measures to secure Indian cyberspace and has directed that critical information infrastructure organisations to hire only Indian cybersecurity professionals as CISOs and for Information Security related activities.

Using 25 years of experience in the field, XCySS has developed an in-house focussed course for the IT professional to lay a strong knowledge base over which they can specialise in the field of their choice. This course comprehensively covers all domains of Information Security / Cybersecurity including the emerging field of Cloud Security which is designed to help IT professionals to build and shape their career in the field of Information Technology. 


Who should attend: Undergraduates, software developers, website designer System Administrators, Network Administrators, Database Administrators, IT managers, Penetration tester, IT Service Providers, ISMS implementers, software developers, researchers, incident handlers, Risk Assessors, IT/ITeS Subject Matter Experts, website developer and managers, SEO professionals and Information Security Enthusiast/Aspirants and ISO 27001 Lead Auditors. 


For detail:
Contact: email: info(at)xcyss(dot)com
Tele: 011-25128910
Website: www.xcyss.in


'New age' of cyber threat warning


Last month, I.T security firm Kaspersky Lab uncovered the powerful Flame virus.

Speaking at the Reuters Global Technology, Media and Telecoms summit in London, the firm's CEO Eugene Kaspersky said we are heading into a new age of cyberwars.

'Now we're living in the era of cyber weapons. The world is different. Not just cyber hooligans, vandals. Not just criminals. But governments are in the game and I'm afraid the worst, I'm still expecting, cyberterrorism,' .................


Click here to read more ...... 
Solutions : www.xcyss.in

MNC staff steal data, float start-ups

After witnessing cyber crime involving email Id-hacking, obscene Facebook profiles and online cheating, Chandigarh is witnessing thefts of source codes and confidential information of multinational companies. Such confidential data is being stolen by employees, who quit and start their businesses.............. 



Click here to read more ...... 
Solutions : www.xcyss.in

11 June 2012

India readies firewall to fight cyber attacks

India is set to take steps to protect its cyber infrastructure and designate agencies for carrying out offensive cyber attacks on other countries. The move comes at a time when proof shows countries launching cyber attacks — not only for intelligence gathering — and many nations describing the attacks as an act of war........ 
    
Stuxnet, the cyber worm created by US’s National Security Agency and Israeli military and specifically targeted at Iran’s nuclear enrichment center at Natanz, was found to have infected Indian systems. It was probably unintentional, but an intentional attack on India’s critical infrastructure cannot be ruled out. We haven’t yet seen a cyber attack, but only intelligence gathering. An attack that can debilitate our infrastructure is what we must be prepared for.................

Click here to read more ......
Solutions : www.xcyss.in

India readies firewall to fight cyber attacks


India is set to take steps to protect its cyber infrastructure and designate agencies for carrying out offensive cyber attacks on other countries. The move comes at a time when proof shows countries launching cyber attacks — not only for intelligence gathering — and many nations describing the attacks as an act of war........ 
    

Stuxnet, the cyber worm created by US’s National Security Agency and Israeli military and specifically targeted at Iran’s nuclear enrichment center at Natanz, was found to have infected Indian systems. It was probably unintentional, but an intentional attack on India’s critical infrastructure cannot be ruled out. We haven’t yet seen a cyber attack, but only intelligence gathering. An attack that can debilitate our infrastructure is what we must be prepared for.................


Click here to read more ......
Solutions : www.xcyss.in

09 June 2012

Hacktivist group Anonymous acts on threat, brings down govt website

Hours ahead of its planned protest against certain incidents of internet censorship in India, hacker collectiveAnonymous has attacked and brought down the website run by Computer Emergency Response Team India (CERT-In), the country's premier agency dealing with cyber security contingencies.

This is the latest in a series of high-profile attacks on government and corporate websites made by the group in the last one month. The India-wing of Anonymous, a collective of internet activists, had downed websites of Internet Service Providers Association of India, All-India Trinamool Congress and Reliance Communications on charges of internet censorship...........

It brought down the official website of Mahanagar Telephone Nigam Limited (MTNL) through the distributed denial of service (DDoS) attack on Wednesday. In the CERT-In attack too, the group has used DDoS that prevents users from accessing the site.

Anonymous started attacking official websites to protest web censorship after internet service providers (ISPs) like Airtel, Reliance Communications............


Click here to read more ...... 
Solutions : www.xcyss.in

08 June 2012

Cyber experts warn of 'intelligent weapons'

Quick advances in cyber war technologies could soon lead to a new generation of so-called "intelligent cyber weapons" which top global IT defence experts warn could be virtually unstoppable. 

Programmes developed to counter attacks by malwares like Stuxnet can act independently and could possibly themselves spark conflicts. 

They are quite autonomous, and can operate independently in an unfriendly environment and might at some point become very difficult to control... that can lead to cyber conflict initiated by these agents themselves.....

Stuxnet and Flame have shown the side of cyber of which the average user does not think of but which will bring a lot of challenges to all experts who deal with critical infrastructure protection issues - IT experts, lawyers, policy makers................

The number of cyber conflicts keeps rising and it is important to understand who the actors in these events are, how to classify these events and participants, and how to interpret all that.........

Click here to read more ...... 
Solutions : www.xcyss.in

Cyber experts warn of 'intelligent weapons'

Quick advances in cyber war technologies could soon lead to a new generation of so-called "intelligent cyber weapons" which top global IT defence experts warn could be virtually unstoppable. 

"Rapid developments in cyber (technology) might lead to intelligent cyber weapons that are hard to control and it's practically impossible to use formal methods of verifying the safety of intelligent cyber weapons by their users," Enn Tyugu, IT expert at Tallinn's NATO Cyber Defence Centre said at its fourth annual conference Thursday. 

He also warned that programmes developed to counter attacks by malwares like Stuxnet can act independently and could possibly themselves spark conflicts. 

"They are quite autonomous, and can operate independently in an unfriendly environment and might at some point become very difficult to control... that can lead to cyber conflict initiated by these agents themselves," Tyugu said. 

"Stuxnet and Flame have shown the side of cyber of which the average user does not think of but which will bring a lot of challenges to all experts who deal with critical infrastructure protection issues - IT experts, lawyers, policy makers," Ilmar Tamm, Head of the NATO Cyber Defence Centre told reporters on Thursday. 

"The number of cyber conflicts keeps rising and it is important to understand who the actors in these events are, how to classify these events and participants, and how to interpret all that," Tamm said, noting Western leaders have been slow to become aware of even existing cyber threats. 

Experts at the conference noted that both China and Russia have significantly upgraded their cyber-defence capabilities in recent years by creating new IT units. 

"But the most powerful weapon today in cyber space is still the propaganda, the chance to use the Internet to spread your message," Kenneth Geers, US cyber defence expert told some 400 top IT gurus attending the meeting Thursday. 

Keir Giles, head of Oxford University's Conflict Studies Research Centre, noted that some Russian leaders seemed to "sincerely believe that the recent opposition rallies after the presidential elections in Russia were initiated by the US in cyberspace."
Click here to read more ...... 
Solutions : www.xcyss.in