Posts
Cyber Pornography in India – Sprouting of a Hydra’s head
- Get link
- X
- Other Apps
Cyber Pornography in India – S prouting of a Hydra’s head By Adv. Prashant Mali, Cyber Law & Cyber Security Expert, Author, Speaker Email : prashant.mali@cyberlawconsulting.com | Mobile : +919821763157 The etymology of pornography can be traced to graphos (writing or description) and porneia (prostitutes) and hence it means the description of the life, manners, etc. of prostitutes and their patrons. The first known use of the word to describe something similar to pornography as understood today was in eighteenth century, when the city of Pompeii was discovered. The entire city was full of erotic art and frescoes, symbols, inscriptions and artifacts that were regarded by its excavators as ‘pornographic’. One of the commonly accepted definitions of “pornography” in modern times defines it as sexually explicit material that is primarily designed to produce sexual arousal in viewers. In India, pornography is seen as an aggravated form of obscenity. In the India Amateur p
How Phishing is Done via Malicious Code
- Get link
- X
- Other Apps
Hackers to phish out your personal data very easily as it is to sit in a canoe on a still pond, cast the bait and wait for the fish to bite. So many people fail to learn about phishing scams, a favorite and extremely prevalent scam among cybercriminals. A type of phishing scam is to lure the user onto a malicious website. ZeuS (Zbot) is such an example, planted on websites; visit that site and it will download a virus to your device that will steal your online banking information, then forward it to a remote server, where the thief will obtain it. Very clever. But that ingenuity is contingent on someone being gullible enough to open a phishing e-mail, and then taking that gullibility one step further by clicking on the link to the malicious site. 10 Phishing Alerts An unfamiliar e-mail or sender. If it’s earth-shaking news, you’ll probably be notified in person or via a voice phone call. An e-mail that requests personal information, particularly financial. If the message
How NSA Allegedly Hacks into your Network ?
- Get link
- X
- Other Apps
How NSA Allegedly Hacks into your Network ? The United States' National Security Agency succeeded years ago in penetrating the company's digital firewalls. An NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell. The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role
Court in EU Backs 'Right to be Forgotten on Google"
- Get link
- X
- Other Apps
Court in EU Backs 'Right to be Forgotten' European Union Internet users now can ask Google and other search engines to remove certain sensitive information from Internet search results, Europe's highest court ruled on May 13,2014. The ruling, handed down by the Court of Justice of the European Union , states the "operator of the search engine ... is, in certain circumstances, obliged to remove links to Web pages that are published by third parties and contain information relating to a person from the list of results displayed following a search made on the basis of that person's name." The court's ruling on the "right to be forgotten" stems from a case involving a man in Spain who argued that Google's search results disclosed details about the auction of his repossessed home over unpaid debts. "[The man] stated that the proceedings concerning him had been fully resolved for a number of years and that reference to them was now
DDoS Analysis for 2014-A Serious Risk
- Get link
- X
- Other Apps
DDoS Analysis for 2014 DDoS attacks are evolving in complex, dangerous ways. Companies assessing their risk and protection should consider: • Nearly twice as many companies (60 percent) report being attacked in 2013. • Almost 92 percent of those attacked were hit repeatedly. • 57% of DDoS targets were victims of theft: funds, customer data or intellectual property. • Though attack duration is down, the number of attacks between 1–5 Gbps shot up nearly three times. • DDoS drains manpower: over half of businesses (57 percent) need 6 or more people to mitigate DDoS attacks. • Risks of $1M a day (estimated outage losses) are common: 4 in 10 companies would suffer this much or more. • DDoS is costly across the enterprise. Customer service and other public-facing areas now take as large a hit as IT/Security. In protecting against DDoS attacks, companies must ask: What do they stand to lose if they’re hit hard? Rigorous risk, threat and cost analysis is in order. Predicting DDoS
2014 Internet Security Threat Report
- Get link
- X
- Other Apps
2014 Internet Security Threat Report Highlights from the 2014 Internet Security Threat Report Key Findings 91% increase in targeted attacks campaigns in 2013 62% increase in the number of breaches in 2013 Over 552M identities were exposed via breaches in 2013 23 zero-day vulnerabilities discovered 38% of mobile users have experienced mobile cybercrime in past 12 months Spam volume dropped to 66% of all email traffic 1 in 392 emails contain a phishing attacks Web-based attacks are up 23% 1 in 8 legitimate websites have a critical vulnerability