Posts

Showing posts from November, 2016

Sextortion and Laws in India

Image
What is SEXTORTION? A form of sexual exploitation that employs non-physical forms of coercion by threatening to release sexual images or information to extort monetary or sexual favors from the victim. Modus Operandi 1) The scammers persuade the dater to send sexually explicit photos. Once they get the photos, the scammers identify themselves as law enforcement, telling the dater they sent the pictures to a minor. They then tell the person to pay up in order to avoid arrest. The scammers are not only identifying themselves as law enforcement, they are also using actual names of officers. “These people are being contacted by Detective Don Peterson and it isn’t me,” Peterson told the paper. More than 100 people have paid between $500 to $1,500 to try to avoid arrest. 2) The groups is to create online accounts of females and post pictures of attractive ladies to draw clients. They would then post pornographic images and entice their victims to have video chats with them, usually ...

Maharashtra Cyber Project first batch training

Image
I am involved in coaching the Police officers from all Districts in the State of Maharashtra under the Maharashtra Cyber Project. I have trained them in Cyber crimes with applicable Cyber Laws and intricacies of Electronic Evidence. hese police officers would be placed at 30 different cyber crime cells at each district level in the state of Maharashtra. This is my contribution to make Maharashtra Cyber Safe, and get more convictions in cyber crime matters . #cybercrime #evidence #law #courts # cyberlaw #cybersecurity #cybersafe #maharashtra #prashantmali

IoT Malware and its Types 2017

Image
IoT Malware Types Revealed  The Internet of Things (IoT) is creating a new environment where malware can be used to create powerful botnets.  Recently, IoT devices have been used to create large-scale botnets—networks of devices infected with self-propagating malware—that can execute crippling distributed denial-of-service (DDoS) attacks. IoT devices are particularly susceptible to malware, so protecting these devices and connected hardware is critical to protect systems and networks. Linux.Darlloz The Linux.Darlloz was discovered in late 2013. The worm exploited an old PHP vulnerability (CVE-2012-1823) to access a system, it escalated privileges through default and common credential lists, it propagated through the network, and it established a backdoor on the system. While the original malware only infected computers running Intel x86 chip architectures, other versions were designed to target ARM, PPC, MIPS and MIPSEL chip architectures commonly used in Io...