Cyber Law, Cyber Security, Privacy, Data Protection Blog - FREE TO SHARE
Tuesday, November 29, 2016
Sextortion and Laws in India
A form of sexual exploitation that employs non-physical forms of coercion by threatening to release sexual images or information to extort monetary or sexual favors from the victim.
An INTERPOL-coordinated operation targeting organized crime networks behind ‘sextortion’ cases around the world has resulted in the arrest of 58 individuals, including three men linked to the group which harassed Scottish teenager Daniel Perry.
Wednesday, November 23, 2016
Maharashtra Cyber Project first batch training
Wednesday, November 2, 2016
IoT Malware and its Types 2017
- Locate and compromise IoT devices to further grow the botnet.
- Launch DDoS attacks based on instructions received from a remote C&C.

How to Prevent Infection
- Stop the telnet service and block TCP port 48101 if you’re not currently using it
- Set Busybox execution to be run only for a specific user
- Scan for open telnet connections on your network
- Disconnect device from the network.
- While disconnected from the network and Internet, perform a reboot. Because Mirai malware exists in dynamic memory, rebooting the device clears the malware.
- Ensure that the password for accessing the device has been changed from the default password to a strong password.
- You should reconnect to the network only after rebooting and changing the password. If you reconnect before changing the password, the device could be quickly reinfected with the Mirai malware.
- Ensure all default passwords are changed to strong passwords. Default usernames and passwords for most devices can easily be found on the Internet, making devices with default passwords extremely vulnerable.
- Update IoT devices with security patches as soon as patches become available.
- Disable Universal Plug and Play (UPnP) on routers unless absolutely necessary.
- Purchase IoT devices from companies with a reputation for providing secure devices.
- Consumers should be aware of the capabilities of the devices and appliances installed in their homes and businesses. If a device comes with a default password or an open Wi-Fi connection, consumers should change the password and only allow it to operate on a home network with a secured Wi-Fi router.
- Understand the capabilities of any medical devices intended for at-home use. If the device transmits data or can be operated remotely, it has the potential to be infected.
- Monitor Internet Protocol (IP) port 2323/TCP and port 23/TCP for attempts to gain unauthorized control over IoT devices using the network terminal (Telnet) protocol.(link is external)
- Look for suspicious traffic on port 48101. Infected devices often attempt to spread malware by using port 48101 to send results to the threat actor.
Thursday, October 27, 2016
Cyber Frauds and Laws in India
Stop Cyber Frauds.. Share & help.
Fraud Internet Websites and Phishing knowledge
1. Before checking name of any website, first look for the domain extension i.e .com, .org, .co.in, .net, .in etc.
The name just before extension is the *DOMAIN NAME* of the website.
Eg: www.domainname.com
E.g., in http://amazon.diwali-festivals.com, the word before .com is *"diwali-festivals"* (and NOT "amazon").
*AMAZON* word is seperated with ( . ) dot So, this webpage *does _not_ belong to amazon.com*, but it belongs to *"diwali-festivals.com"*, which most of us haven't heard of before.
You can similarly check for fraudulent (so-called) banking websites.
Before your e-banking login, make sure that the name just before ".com" is the name of your bank.
Eg:
"something.icicibank.com" belongs to +ICICI*,
but "icicibank.something.com" belongs to something and not icicibank.
"icicibank.com.nu" belongs to "com"!
2. There can also be a typo in domain done purposely to confuse user to do phishing. eg: www.facebookk.com or faceb00k dot com does not relates to facebook.com
3. Nowdays you may have also seen various spam messages forwarded by users claiming to get free mobile or mobile phone at Rs.250/- or Free Talktime etc.
Before attempting to forward such messages, always check for domain name and website. Inputing data and doing some task as said on their website may result in your smartphone infected by some malware. There are several scripts present on such website which may be executed. So Beware and dont fall in such trap. There is nothing *FREE* in this world.
4. Also please check before downloading apk or android apps for smartphone. http://googleplay.com/store/apps/com.ife.google
Does not belongs to *Google*, it belongs to googleplay.com which is not owned by Google.
But http://play.google.com/store/apps/com.ife.google belongs to *Google*.
Please share this information widely and help your family and friends avoid falling for such tricks.
#cybersecurity #cybercrime #banking #fraud #cyberfraud #phishing #socialmedia #ecommerce
Friday, October 14, 2016
New age Cyber Crimes : 2016
FIR : All you want to know about in a criminal case
FIR - What is? The first information report is a report giving information of the commission of a cognizable crime, which may be made by t...

-
The Telecommunications Act of 2023 has strengthened the dispute resolution framework by introducing an online grievance redressal system. T...
-
Types of Cyber Attacks There are several effective methods for disrupting computer systems. We are talking of a method known as cyber ...
-
Indian Narcotics Control Bureau (NCB) on 9th February has arrested the country's first 'darknet' narcotics operative who alleg...