Posts
Cyber Security: Build a Culture of Prevention in Your Organisation
- Get link
- X
- Other Apps
Cyber Security: Build a Culture of Prevention in Your Organisation Prashant Mali, Cyber Security Policy & Law Expert - India “You cannot buy the revolution. You cannot make the revolution. You can only be the revolution. It is in your spirit, or it is nowhere.” ― Ursula K. Le Guin , The Dispossessed Today all organization’s need “Cyber Security Revolution” i.e they need to bring in culture of cyber security within their organization. A strong cyber security culture is both a mindset and mode of operation. One that’s integrated into day-to-day thinking and decision-making can make for a near-impenetrable operation. Conversely, a security culture that’s absent will facilitate uncertainty and, ultimately, lead to security incidents that you likely can’t afford to take on. This is also brings us to have Cyber Insurance as part of the organisations culture. What is a organizations cyber security culture? An organisatio...
Definitions for Cyber World
- Get link
- X
- Other Apps
Definitions for Cyber World Cyberspace Cyberspace is the total landscape of technology-mediated communication. This includes not only the internet and the World Wide Web but also mobile and fixed phone networks, satellite and cable television, radio, the Global Positioning System (GPS), air traffic control systems, military rocket guidance systems, sensor networks, etc. As more devices become interlinked through the processes of digital convergence, cyberspace is rapidly covering more of our physical world and channels of communication and expression. Importantly, cyberspace also includes the people that use these devices and networks. The Internet A subset of cyberspace, the internet is a system of interconnected computer networks. The internet is comprised of both hardware and software that facilitate data transfer across a network of networks, ranging from local to global in scale, and encompassing private, public, corporate, governme...
Zee 24 Taas Rokthok,WhatsApp Issues Adv Prashant Mali
- Get link
- X
- Other Apps
Cyber Pornography in India – Sprouting of a Hydra’s head
- Get link
- X
- Other Apps
Cyber Pornography in India – S prouting of a Hydra’s head By Adv. Prashant Mali, Cyber Law & Cyber Security Expert, Author, Speaker Email : prashant.mali@cyberlawconsulting.com | Mobile : +919821763157 The etymology of pornography can be traced to graphos (writing or description) and porneia (prostitutes) and hence it means the description of the life, manners, etc. of prostitutes and their patrons. The first known use of the word to describe something similar to pornography as understood today was in eighteenth century, when the city of Pompeii was discovered. The entire city was full of erotic art and frescoes, symbols, inscriptions and artifacts that were regarded by its excavators as ‘pornographic’. One of the commonly accepted definitions of “pornography” in modern times defines it as sexually explicit material that is primarily designed to produce sexual arousal in viewers. In India, pornography is seen as an aggravated form of obscenity. In the India Amateur p...
How Phishing is Done via Malicious Code
- Get link
- X
- Other Apps
Hackers to phish out your personal data very easily as it is to sit in a canoe on a still pond, cast the bait and wait for the fish to bite. So many people fail to learn about phishing scams, a favorite and extremely prevalent scam among cybercriminals. A type of phishing scam is to lure the user onto a malicious website. ZeuS (Zbot) is such an example, planted on websites; visit that site and it will download a virus to your device that will steal your online banking information, then forward it to a remote server, where the thief will obtain it. Very clever. But that ingenuity is contingent on someone being gullible enough to open a phishing e-mail, and then taking that gullibility one step further by clicking on the link to the malicious site. 10 Phishing Alerts An unfamiliar e-mail or sender. If it’s earth-shaking news, you’ll probably be notified in person or via a voice phone call. An e-mail that requests personal information, particularly financial. If the mess...
How NSA Allegedly Hacks into your Network ?
- Get link
- X
- Other Apps
How NSA Allegedly Hacks into your Network ? The United States' National Security Agency succeeded years ago in penetrating the company's digital firewalls. An NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell. The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role ...