Posts

Sextortion and Laws in India

Image
What is SEXTORTION? A form of sexual exploitation that employs non-physical forms of coercion by threatening to release sexual images or information to extort monetary or sexual favors from the victim. Modus Operandi 1) The scammers persuade the dater to send sexually explicit photos. Once they get the photos, the scammers identify themselves as law enforcement, telling the dater they sent the pictures to a minor. They then tell the person to pay up in order to avoid arrest. The scammers are not only identifying themselves as law enforcement, they are also using actual names of officers. “These people are being contacted by Detective Don Peterson and it isn’t me,” Peterson told the paper. More than 100 people have paid between $500 to $1,500 to try to avoid arrest. 2) The groups is to create online accounts of females and post pictures of attractive ladies to draw clients. They would then post pornographic images and entice their victims to have video chats with them, usually ...

Maharashtra Cyber Project first batch training

Image
I am involved in coaching the Police officers from all Districts in the State of Maharashtra under the Maharashtra Cyber Project. I have trained them in Cyber crimes with applicable Cyber Laws and intricacies of Electronic Evidence. hese police officers would be placed at 30 different cyber crime cells at each district level in the state of Maharashtra. This is my contribution to make Maharashtra Cyber Safe, and get more convictions in cyber crime matters . #cybercrime #evidence #law #courts # cyberlaw #cybersecurity #cybersafe #maharashtra #prashantmali

IoT Malware and its Types 2017

Image
IoT Malware Types Revealed  The Internet of Things (IoT) is creating a new environment where malware can be used to create powerful botnets.  Recently, IoT devices have been used to create large-scale botnets—networks of devices infected with self-propagating malware—that can execute crippling distributed denial-of-service (DDoS) attacks. IoT devices are particularly susceptible to malware, so protecting these devices and connected hardware is critical to protect systems and networks. Linux.Darlloz The Linux.Darlloz was discovered in late 2013. The worm exploited an old PHP vulnerability (CVE-2012-1823) to access a system, it escalated privileges through default and common credential lists, it propagated through the network, and it established a backdoor on the system. While the original malware only infected computers running Intel x86 chip architectures, other versions were designed to target ARM, PPC, MIPS and MIPSEL chip architectures commonly used in Io...

Cyber Frauds and Laws in India

Image
Stop Cyber Frauds.. Share & help. Fraud Internet Websites and Phishing knowledge 1. Before checking name of any website, first look for the domain extension i.e .com,  .org,  .co.in,  .net,  .in etc. The name just before extension is the *DOMAIN NAME* of the website.  Eg: www.domainname.com E.g., in http://amazon.diwali-festivals.com, the word before .com is *"diwali-festivals"* (and NOT "amazon").  *AMAZON* word is seperated with ( . ) dot So, this webpage *does _not_ belong to amazon.com*, but it belongs to *"diwali-festivals.com"*, which most of us haven't heard of before. You can similarly check for fraudulent (so-called) banking websites. Before your e-banking login, make sure that the name just before ".com" is the name of your bank.  Eg: "something.icicibank.com"  belongs to +ICICI*,  but "icicibank.something.com" belongs to something and not icicibank. "icicibank.com.nu"  belongs to ...

New age Cyber Crimes : 2016

Image
New Age Cyber Crimes : 2016 New trends in cybercrime are emerging all the time, with estimated costs to the global economy running to billions of dollars. In the past, cybercrime was committed mainly by individuals or small groups. Today, we are seeing highly complex cybercriminal networks bring together individuals from across the globe in real time to commit crimes on an unprecedented scale. Criminal organizations turning increasingly to the Internet to facilitate their activities and maximize their profit in the shortest time. The crimes themselves are not necessarily new – such as theft, fraud, illegal gambling, sale of fake medicines – but they are evolving in line with the opportunities presented online and therefore becoming more widespread and damaging . Identity theft Identity theft and fraud is one of the most common types of cybercrime. The term Identity Theft is used, when a person purports to be some other person, with a view to crea...