Posts

Guidelines for giving FIR to Accussed

Being a public document, the FIR  cannot be withheld from public domain and would not only lend credence but would bring transparency in the working if the Police Department in case the same is put in public domain. . In this background, it has become imperative that certain directions be issued. Therefore, taking cue from the judgment passed by the learned Division Bench of Delhi High Court, the following directions are issued:- (i) The accused is entitled to get a copy of the First Information report at an earlier stage as prescribed under Section 207 of the Cr.P.C. (ii) An accused who has reasons to suspect that he has been roped in a criminal case and his name may be finding place in a First Information Report can submit an application through his representative/agent/parokar for grant of a certified copy before the concerned police officer or to the Superintendent of Police on payment of such fee which is payable for obtaining such a copy from the court. On such applicati

If police refuses to register your FIR then what to do ?

Image
If police refuses to register your FIR then what to do ? Its a very common phenomenon that people are saying that police is not lodging their FIR. Even sometimes people are ill-treated by the police. If Police officer concerned (SHO), refuses to Register complaint/FIR, than by virtue of section 154(3), of CRPC a written Complaint may be send by Post to the Superintendent of Police (SP) or the Commissioner of Police (in Metropolitan areas); If Superintendent of Police or the Commissioner of Police (in Metropolitan areas) is satisfied that the Complaint discloses cognizable offence, he may himself investigate the case or cause the investigation of the case by any Police officer subordinate to him. Even after that if no any action has been taken then an application can be made under section 156(3) read with section 190 of Code of Criminal Procedure to a judicial Magistrate/ Metropolitan Magistrate thereby praying that police to

Hackers Can Turn Siri And Google Now Against You

Hackers Can Turn Siri And Google Now Against You !!! 😎👊 One of the new features in iOS 9 is the ability to train Siri to only recognize your voice so your phone doesn’t respond to commands from just anybody. According to a report from Wired, though, a pair of researchers at ANSSI—a French government agency—have figured out a way to use radio waves to silently activate Siri or Android’s Google Now from across the room. The hack only works if the target device has Siri or Google Now enabled, and has headphones or earbuds plugged in that also have a microphone. Wired explains, “Their clever hack uses those headphones’ cord as an antenna, exploiting its wire to convert surreptitious electromagnetic waves into electrical signals that appear to the phone’s operating system to be audio coming from the user’s microphone.” In theory, the attack could be used to anything you can do using the Siri or Google Now voice interaction. The attacker could make calls, send text messages, open malicious

India And Pakistan Are At a Private Cyber War

Image
India And Pakistan Are At a Private Cyber War by defacing each others Government websites: India and Pakistan continue to squabble over Kashmir. Both the countries tend to be good friends but are mostly seen in battlefields against each other. At the borders or in the game of cricket, they are historic rivals. And with the world shifting towards digitization, their war has also gone digital.  Yes, the cyber war between these two neighboring countries seems to have begun. On Saturday, September 26, a Pakistani hacker Faisal Afzal aka 'Faisal 1337' hacked the official website of Kerala Government, kerala.gov.in. Reportedly, the text on the homepage at that moment read: "Official website of the RC Office, Govt of Kerala — New Delhi Hacked! Pakistan Zindabad." Also mentioned below was, "We Are Team Pak Cyber Attacker. Security is just an illusion". The hacker also mentioned about his attack on his Facebook page. In few minutes, the news spread

Hacking is Not that Hard ..

Hacking is Not that Hard  ▫ More than 90% of successful breaches  required only the most basic techniques. ▫ Only 3% of breaches were unavoidable  without difficult or expensive actions. ▫ Outsiders with insiders help of or with gross negligence  of insiders were responsible for most  breaches. ▫ 85% of breaches took months to be  discovered; the average time is five  months. ▫ 96% of successful breaches could have  been avoided if the victim had put in place  simple or intermediate controls. ▫75% of attacks use publicly known  vulnerabilities in commercial software  that could be prevented by regular  patching. ▫ One study found that antivirus software  missed as much of 95% of malware in the  first few days after its introduction. ▫ Another study found that 25% of malware  is not detected by current techniques.

Chinese Cyber attacks History from 1995

Ø   1995 – Major General Wang Pufeng describes attacking via Internet Ø   1997 – Major General Wang Baocun’s 10 Features of Chinese InfoWar Ø   1997 – “ War Beyond Limits” (Unrestricted Warfare) is written by 2 Senior Chinese Colonels Ø   May 03, 2001 China warns of massive hack attacks Ø   2002 - “informatisation” campaign begins Chinese Communist Party (CCP) General Secretary and Central Military Commission (CMC) Chairman Jiang Zemin, a speech before the 16th Party Congress Ø   2003 - Titan Rain US DoD & Government websites targeted Ø   2004 – Japan targeted by Chinese over disputed Daiyu Islands Ø   2007 – GhostNet Global CnC network with IP addresses in People’s Republic of China   Ø   2008 – Byzantine Hades - targeted cyber operations against the U.S. government using social engineering and malicious attachments and links in e-mail messages.  Ø   2008 - MI5 writes to more than 300 senior executives at banks, accountants and legal firms warning them - t