Thursday, April 15, 2010

Shri Umarshankar Sivasubramanian V/s ICICI Bank will change e-security followed the banking Industry in India

On April 12, 2010, Shri Thiru PWC Davidar, IAS, the Adjudicating Officer and Secretary to Government Information Technology Department, Government of Tamil Nadu, has passed the landmark judgment in the first petition filed under the Information Technology Act, 2000 (Act) by Shri Umarshankar Sivasubramanian (Petitioner) against ICICI Bank.

ICICI Bank was directed to pay Rs. 12,85,000/-(also the IT Secretary) has passed an award for payment of Rs 12.85 lakhs to the Petitioner in this phishing case. The Adjudicating Officer concluded that ICICI has failed to establish the due diligence was exercised to prevent the convention of the nature of unauthorized access as laid out in section 43 of the Act. It has further observed by the Adjudicating Officer that ICICI Bank has failed to put in place a foolproof Internet Banking system with adequate levels of authentication and validation which would have prevented the type of unauthorized access in the instant case (Phishing fraud case).

Before this judgment, SBI Bank was using only one layer of security (Egg Layer Security) for online payment through their banking website www.sbi.co.in Simply, you have to login to your bank account online and you can make an e-payment.

But after this judgment, it has been changed. SBI Bank is now using more than one layer of security (Onion Layer Security) for online payment. Now, you are require to punch-in (using online key and not by your keyboard) a secured password sent onto your registered mobile for every online payment through their website.

I trust other bankers are following SBI bank practice. If not soon they should in order to minimize their financial risk.

Certainly, ICICI Bank has right to appeal against this order. But this judgment will make our country e-banking pretty secured.

Wish you a pretty secured e-banking.

Copy of judgment is available on http://www.naavi.org/cl_editorial_10/umashankar_judgement.pdf It is uploaded by Shri Na Vijayashankar, Techno Legal Consultant, who was representing the Petitioner in the above case.

Tuesday, June 30, 2009

Al-Qaida plans cyber war against Britain: Top UK minister

LONDON: Britain faces growing threat from the al-Qaida, which is on track to launch a cyber-warfare campaign against the country, UK's security minister has warned.

Lord West warned that al-Qaida is aiming to use the internet to launch a cyber-warfare campaign against Britain.

"We know terrorists use the internet for radicalisation and things like that at the moment, but there is a fear they will move down that path (of cyber attacks)," he was quoted as saying by the Daily Telegraph newspaper.

Britain's security minister issued the warning as he published the government's new cyber security strategy to combat the cyber-warfare threats.

Published in Times of India

IT industry backs cyber-security strategy

By James Boxell and Jeremy Lemer

The IT industry welcomed the UK’s first cyber-security strategy as providing much-needed clarity about who companies should talk to in government about investment in research and development.

However, there was disappointment at defence and security companies that the broader national security strategy, also published on Thursday, did not promise similar engagement in other critical areas of homeland security, such as counter-terror and protecting critical infrastructure.


Published in www.ft.com

Cyber Cold War: U.S. Vs. Russia

June 28, 2009 - Eric Chabrow

A new Cold War, of sorts, is emerging in cyberspace between the United States and Russia over the best way to respond to the mounting assaults on information systems and the Internet.


Whether the American or Russian approach prevails ... major governments are reaching a point of no return in heading off a cyberwar arms race.

Though both nations' governments recognize the mayhem virtual assaults pose, they are at odds on how the international community should ban together to limit cyber attacks, according to an article Sunday in The New York Times:

Russia favors an international treaty along the lines of those negotiated for chemical weapons and has pushed for that approach at a series of meetings this year and in public statements by a high-ranking official.

The United States argues that a treaty is unnecessary. It instead advocates improved cooperation among international law enforcement groups. If these groups cooperate to make cyberspace more secure against criminal intrusions, their work will also make cyberspace more secure against military campaigns, American officials say.

Other points the article makes:

Russia would ban a country from secretly embedding malicious codes or circuitry that could be later activated from afar in the event of war, apply humanitarian laws banning attacks on noncombatants and a ban on deception in operations in cyberspace - an attempt to deal with the challenge of anonymous attacks, and call for broader international government oversight of the Internet.

The U.S. would resist agreements to allow governments to censor the Internet, saying they would provide cover for totalitarian regimes. American officials worry that a treaty would be ineffective because it can be almost impossible to determine if an Internet attack originated from a government, a hacker loyal to that government, or a rogue acting independently.

The article concludes:

"Whether the American or Russian approach prevails ... major governments are reaching a point of no return in heading off a cyberwar arms race."

Published in blogs.govinfosecurity.com


Tuesday, June 23, 2009

Update on Defamtion suit filed against Google in Bombay High Court, India

Google India Faces Defamation Suit

19-08-2008
Bombay High Court has ordered Google to disclose the identity of a blogger who allegedly had criticized a Mumbai based construction company. The judgment has come in pursuance of a suit filed by Mumbai-based Gremach Infrastructure Equipments & Projects Ltd. Appellant in the plea had demanded for Google’s discloser of the name of the person who had criticized them using Google's blogging service.

Now, if Google does not disclose the name, it could face the charge of defamation. Incidentally, blogger.com offers a facility to a blogger to blog without disclosing real identity. And, in the given case the blogger had used the name ‘Toxic Writer’ and had criticized the said company. Now, the Bombay High Court has asked Google to present the blog written on February 26.

The court observed that there is merit in the contention, and on the basis of the article put up by the defendant on the blog site defamation is apparent. The court further ordered to defendant to reveal the identity of the blogger within four weeks of the order. However, Google India has not yet revealed the name of the concerned blogger.

Published in www.india-server.com


Google India says it has no control over blog content
23 Jun 2009

MUMBAI: Google India said on Monday (22 Jun 2009) that it will not be able to control the publication of content on its blogging website. The company has moved the Bombay High Court over an order restraining the website from allowing the publication of defamatory blogs.


Google India’s lawyer Srikant Doijode said that it had no control over the blogging site and the same was managed by Google Inc, USA. Even if there was an order restraining such blogs, it could not do anything, Google India submitted in court.

“The blogger service is provided by Google Inc. We (Google India) are not a party to the agreement between Google Inc and those who use the blog. We have no liability or responsibility for the content of the blog,” the company argued.

Earlier, city-based cardiologist Dr Ashwin Mehta had approached the court after finding that over 20 blogs on the website were defaming him.

A single judge of the high court had ordered Google to remove those blogs and prevent such incidents in the future.

“Google only provides a platform,” argued Google India’s counsel, adding that on account of the earlier order, it (Google) will be held in contempt if there was any fresh offensive blog about Dr Mehta. Mr Doijode pointed out that if the content was defamatory and the court wanted its removal from the website, the same could be done.

Chief Justice Swatanter Kumar and justice SC Dharmadhikari have posted the case for final hearing on July 7.

Published in Economic Times

Wednesday, March 11, 2009

Cyber Law Update February 2009 - Issue no. 2

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Russia engaged in cyber war with neighboring countries

This January marked “the third successful cyberattack against a country” — when suspected Russian attackers distributed a denial of service attack that overwhelmed three of the four Internet service providers in Kyrgyzstan, disrupting Internet access, reports DefenseTech. Published in Blogs.zdnet.com

Chinese Hackers Attack U.S. Computers, Thompson Says

Chinese government and freelance hackers are the primary culprits behind as many as several hundred daily attacks against U.S. government, electric-utility and financial computer networks, a senior congressman said.

“Sophisticated hackers could really wreak havoc on our financial systems if they were successful,” House Homeland Security Committee Chairman Bennie Thompson said in an interview. The threat is “primarily from China.”

China’s Denial

Wang Baodong, a spokesman for the Chinese Embassy in the U.S., denied that the Chinese government was attacking U.S. computer systems. Published in Bloomberg

Cyber-crime cases hit record high in Japan in 2008

The police across Japan uncovered 6,321 cases of Internet-related or cyber crime in 2008, up 15.5% from the previous year and the highest number since comparable data became available in 2000, a National Police Agency survey showed Thursday. The figure represented a threefold jump from 2,081 cases recorded in 2004. Published in Japan Today

Cyber terrorists learn how to take advantage of cyberspace

The U.S. government and armed forces need to develop the knowledge, skills and attributes required for cyber-strategic leaders. And that next generation of leaders needs to understand the cyber environment.

Beginning in 1988 with the infamous "Morris Worm" attack, cybersecurity has grown in importance along with the degree of reliability the United States and other nations have placed on the cyber domain. Published in UPI

Obama orders review of cyber security

WASHINGTON (AP) — President Barack Obama on Monday ordered a 60-day review of the nation's cybersecurity to examine how federal agencies use technology to protect secrets and data. Published in Google

Nigeria: That Delay on Cyber Crime Law is Dangerous

Internet-based attacks and crimes are increasing in Nigeria as 'greedy' criminals continue to steal data from businesses and individuals.

The sad story however is government's attitude to curb the menace. IT World's Zakariyya Adaramola, wrote on the implications of the delay to act fast on the criminals. Published in All Africa

IBM Report: Threat Scores Should Give Weight to the Economics of Cyber-crime

With the number of Web-based threats and vulnerabilities growing, IBM X-Force is recommending that the security industry rethink how it ranks vulnerability threats--how easily an attack can be monetized and to what degree should be components of vulnerability scoring.

IBM’s X-Force is pushing for a reprioritization of security threats. Published in eWeek

Data Breaches Costing Customers, Not Just Money

A study by the Ponemon Institute found the average cost of data breaches - from detection to notification to lost business - is rising. The No. 1 cost to companies is lost business, which now accounts for 69 percent of total costs.


Data breaches are costly, and they are not getting any cheaper – particularly breaches due to third parties. Published in eWeek

Browsing child porn will land you in jail

The newly passed Information Technology Bill is set to make it illegal to not only create and transmit child pornography in any electronic form, but even to browse it. The punishment for a first offence of publishing, creating, exchanging, downloading or browsing any electronic depiction of children in "obscene or indecent or sexually explicit manner" can attract five years in jail and a fine of Rs 10 lakh. Published in Times of India

Cyber Crime can Kill

"It's dangerous in 'Cyberville,'" Banks said.Peter Banks, 17 year veteran of the National Center for Missing and Exploited Children, was a presenter at DMACC's Cyber Crime Awareness Conference last Saturday. Banks said that "Cyberville," as he calls it is a place where anyone with malintent has access to 30 million sites where children are exploited. Banks said that there are 600,000 registered sex offenders in America. He said that the center receives about 2000 calls a week on suspicions of the usage of child pornography, the luring of children, and child exploitation. Published in Campus Chronicle

Cracking down on cyber crime tough for experts: IGP

MANGALORE: "It is too technical! I bet half your police constables there did not understand a word of what you said", these words by a law degree student to M K Nagaraj, inspector general of police (Anti- Terrorist Cell) put the focus of a one-day workshop on cyber law for police personnel in its right perspective. Cracking down on cyber crime, Nagaraj admitted is sometimes difficult even for experts in this new area of white-collar crime. Published in Times of India

Don't Fall Victim To Cyber Crime

Cyber crime is on the attack, and it can happen to anyone.

That was the message at a day-long exercise addressing cyber-security. Published in Kfox TV

3 men charged with 'cyber flashing'

DETROIT (AP) — Authorities say three Saginaw-area men have been arrested after exposing themselves online to Wayne County sheriff's deputies posing as teenage girls.

Information from: The Saginaw News, http://www.mlive.com/saginaw and published in wsbt.com

Schools battle the bullies

…."Cyber-bullying presents unique challenges to schools because once something is put out on the Internet, it has the power to become available to the entire school and more," said Martha Turner, a counselor at Robious Middle School. "Before the Internet, bullying took the form of gossip, verbal or physical harassment." Published in Times Dispatch


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PRODUCTS AND SERVICES
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.

It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
Salient Features of iPro:
 New format of e-forms – as and when updated / revised
 Efilling of Forms
 Annual Return as per Schedule 5
 All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
 Minutes book with 500+ resolutions in-built plus user editing option
 Compliance Certificate
 Combined Company Registers
 Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
 Fixed Asset Registers & Reports
 Charges and Notice
 Certificate Printing
 Director Details Entry
 Attachment in PDF format.
For more details of the above software email to mailto:digitialsigncert@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at digitialsigncert@gmail.com


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For posting your products and services, please email details to dipak00001@gmail.com with subject line “Product”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JOBS/ FREELANCE MARKETS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details to dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW/IS EVENTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For posting cyber law or IS event, please email details to mailto:dipak@lawyer.comwith subject line “Events”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
BUSINESS STUFF
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with Cyber Law Update!!!
For more details email to mailto:dipak@lawyer.com with subject line “Advertise”


Tuesday, January 20, 2009

Cyber Law Update January 2009 - Issue no. 1

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Cyber attacks are the greatest threat to the United States after nuclear war

FBI exports stated cyber attacks created the greatest threat to the United States after nuclear war and weapons of mass destruction. US experts highlighted that the economy, where almost everything important is linked to or controlled by computers is especially under the risk of being hacked. Published in Ecommerce Journal

FBI calls for global cooperation on cyber crime

The FBI has called for greater international coordination in anti-hacking laws at the first International Conference on Cyber Security. Published in VNUNet

Fordham/FBI Conference Draws Experts In Fight Against Cyber Crime

Some 300 international experts on cyber security gathered at Fordham University Tuesday, Jan. 6 for a three-day conference on the emerging global threat of cyber crime and cyber terrorism.The conference, which attracted representatives from 37 nations, runs through Thursday and is sponsored jointly by the Federal Bureau of Investigation’s New York Division and Fordham’s Department of Computer and Information Sciences.“We live in a world of instant connectivity . . . where we have no geographic boundaries, are not limited by time zones nor foreign languages,” said John Tognino, chairman of Fordham’s Board of Trustees, who joined Joseph M. McShane, S.J., president of Fordham, in welcoming conference participants to the Lincoln Center campus. “It is also true that almost anyone today has the ability, despite increasingly sophisticated firewalls, to bring down an entire computer operation.”“How then, do we protect our nation, or local communities and even our very own identities?” Published in Fordham

Cyber attack has Pentagon worried

Senior military leaders took the exceptional step of briefing President George W. Bush last week on a severe and widespread electronic attack on Defense Department computers that may have originated in Russia, posing unusual concern among commanders and potential implications for national security. Published in Chicago Tribune

Its not just war; its cyber war! Israel and Gaza engaged in cyber war

News of cyber war fare is reported from the warzone! News bases sites, telecommunication etc are the initial targets on both sides. Israel and the Arab world are showing mastery of cyber war fare and hacking of enemy sites on the rise due to the recent escalation of tension.Published in Hacked Info

Iran cyber attacking Israel

Iranian hackers have launched a massive campaign against Israeli web sites and have managed to bring many of them to a standstill. Published in Press IT

Kosovo, Serb Hackers Fight Cyber War

A group of hackers from Kosovo defaced the website of Serbia’s ministry of energy on Thursday in a payback strike for a similar intervention on the website of Kosovo’s energy ministry by Serb hackers earlier this week.
"United States of Albania" and “Don’t play if you don’t know the game”, were the messages displayed in red and black colours on the page of the Serbian energy ministry, hacked by the self-proclaimed Albanian and Kosova Hackers Group. "Oops!! you got owned , This is our revenge." Publihsed in Balkanin Sight

New initiative in Omaha: Cyber crime put on notice

From the outside, the central Omaha office building doesn't look as if it would house FBI agents in dark suits searching for cyber predators. But on the second floor, investigators are tracking down criminals who exploit children, scam adults and steal identities via computer.Published in Omaha

Cyber security vital to prevent corporate espionage

"Business organisations need to induct integrated security technologies to safeguard their operations as hacking' for corporate espionage now constitutes a real threat," Naveen Agrawal, executive director for advisory services in KPMG said here on Saturday. Published in Times of India

Cyber hunters in China in for crash landing

BEIJING, Jan 3 — The cyber hunters who roam China's online space could soon become the hunted themselves. The Chinese legislature is deliberating a new law ...Published in The Malaysian Insider

Cyber court to help net online criminals

Malaysia may need a cyber court to deal with cyber crimes in view of the increasing number of such cases, says Energy, Water and Communications Minister Datuk Shaziman Abu Mansor.
He said the ministry had submitted more than 30 cases to the Attorney-General’s Chambers in three years.
“If in future we cannot cope any more, we may need to have a cyber court,” he told reporters after launching a community broadband centre in Kampung Merchang here yesterday.Published in the Star

Avoiding the Most Common Programming Errors

These mistakes show that the bad guys aren't necessarily skilled as they are simply exploiting your errors.Published in Internetnews

Spam e-mails pose many risks

For many, receiving one special e-mail can brighten a bad day. But opening the wrong e-mail can ruin a day, or worse, a computer’s operating system.

As spam e-mail gets more sophisticated, including spam posing as coming from familiar e-mail addresses, or even your own, it’s increasingly difficult for people to determine safe messages from detrimental ones.
Published in Carroll Country Times

'Cyber stalker' denied bail

A 30-year-old man asked a police officer posing as a child in an internet chat room to wear a miniskirt with no knickers when they met, a court in Perth has heard.Published in SMH

Hong Kong businessman guilty of spam to influence stocks

A Hong Kong businessman has recently pleaded guilty for his part in dispatching tens of millions of spam messages to pump up the prices of Chinese stocks between 2004 and 2006. Published in Network World

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PRODUCTS AND SERVICES ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cyber Law College has been the pioneer in Cyber Law education in India. It provides various courses and trainings on Cyber Law for E-Commerce Professionals, Law Students, Business Management Students, Engineers, Company Secretaries and Chartered Accountants and Legal professionals who would like to specialize in Cyber Laws. For more details email to dipak@lawyer.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.

It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
Salient Features of iPro:
 New format of e-forms – as and when updated / revised
 Efilling of Forms
 Annual Return as per Schedule 5
 All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
 Minutes book with 500+ resolutions in-built plus user editing option
 Compliance Certificate
 Combined Company Registers
 Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
 Fixed Asset Registers & Reports
 Charges and Notice
 Certificate Printing
 Director Details Entry
 Attachment in PDF format.
For more details of the above software email to mailto:digitialsigncert@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at digitialsigncert@gmail.com


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For posting your products and services, please email details to dipak00001@gmail.com with subject line “Product”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JOBS/ FREELANCE MARKETS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details to dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW/IS EVENTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For posting cyber law or IS event, please email details to mailto:dipak@lawyer.comwith subject line “Events”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
BUSINESS STUFF
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with Cyber Law Update!!!
For more details email to mailto:dipak@lawyer.com with subject line “Advertise”

Sunday, November 9, 2008

Cyber Law Update October 2008 - Issue no. 11

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

THE CYBER THREAT TODAY
Major Attacks on the Rise

Crooks and spies using the Internet to commit crimes against U.S. businesses and to attack government networks are getting more sophisticated, and the increasing number of such crimes not only impacts the economy but threatens national security. Published in FBI

FBI warns of increased cyber crimes

The FBI (Federal Bureau of Investigation) has warned that citizens and nations alike have increasingly become victim to cyber crime in the past year, costing tens of millions of dollars and threatening US security.
According to a report in New Scientist, FBI assistant director Shawn Henry said that as many as two dozen countries have taken an aggressive interest in penetrating the networks of US companies and government agencies. Published in ThaiIndia

Cyber Crime Rates on the Rise in the UK

Britain had witnessed soaring cyber crime rates in 2007, reveals an online identity firm.

The report has shown that cyber crime in the UK rose by more than 9 percent in 2007. Published in MedIndia

Stark warning over cyber attacks on UK businesses

Sustained cyber espionage attacks are being waged on companies that play a key role in the U.K. national infrastructure, a U.K. cyber defense chief has warned.

The computer systems of critical businesses in the United Kingdom, such as power companies and large financial institutions, are being repeatedly probed to steal information or uncover weaknesses that could take them down. Published in ZDnetAsia

Cyber Security and the “financial meltdown”

“We are experiencing a financial meltdown due to a fundamental misunderstanding and mismanagement of modern financial systems, which is generating a crisis of confidence in our core institutions. Today, all our critical infrastructures are reliant on cyber systems that are also misunderstood and mismanaged. These vulnerabilities place both our financial and physical security in jeopardy unless we update the method we use to control our cyber systems,” said Larry Clinton, president of the Internet Security Alliance (ISA). Published in TalkRadioNews

Cyber security threats grow in sophistication, subtlety

The annual report from Georgia Tech Information Security Center identifies five evolving cyber security threats, and the news is not good.

GTISC interviewed a range of industry security experts to explore the threats and the available countermeasures. The five are malware, botnets, cyber warfare, threats to VoIP and mobile devices, and the "evolving cyber crime economy."

In all five areas, attackers are becoming increasingly sophisticated, increasingly subtle, and increasingly adept at exploiting new Web developments, such as the rise of social network sites. Industry and government need to become equally concerted and sophisticated to contain these threats if the Internet is to be a trusted communications medium. Published in ComputerWorld

IT security guide: Understanding cyber-risks means knowing what questions to ask
New guide gives CFOs 50 questions about cyberthreats to ask various department heads

A good place for senior executives to start in trying to understand their companies' financial exposure to cyberthreats is by getting an overall assessment — not just from IT, but also from business units and corporate operations such as the human resources, legal and public relations departments.

That piece of advice is contained in an information guide that the American National Standards Institute (ANSI) and the Internet Security Alliance (ISA) jointly released today in an effort to help high-level execs prepare for the financial implications of possible cyberattacks. Published in Computer World

To curb cyber crimes, software to be certified

To curb the growing menace of cyber crimes in the country, Union Ministry of Communications and Information Technology will set up the first ever Indian accreditation facility for software in Kolkata. B J Srinath, senior director of Indian Computer Emergency Response Team under the IT ministry, said: “The accreditation facility will be the first-of-its-kind in India and will accredit the security aspects of software developed by companies.” Published in Indian Express

Corporates should gear up for cyber security audit: Debesh Das

Corporate entities should gear up for cyber security audit by independent agencies in line with financial audit in order to rein in cyber crime.

"We should never neglect the cyber security issue. This should be top priority. Corporates should brace themselves for cyber security audit in line with financial audit," West Bengal Information Technology Minister Debesh Das said today. Published in Economic Times

Computer Monitoring Software and Data Recovery Tools Provide Cyber Security

Pandora (News - Alert) Corp, a manufacturer of personal computer (PC) monitoring software and recovery tools, recently announced that data recovery tools and computer monitoring software will be two good resources for the cyber security awareness month.

In order to remind PC owners about the importance of Internet protection, antivirus software, password and firewall strengths, October is celebrated as cyber security awareness month. This will help in reminding the PC owner about the active steps that need to be taken so as to prevent one from becoming a victim of phishing scams, cyber attacks and identity thefts. Published in TMCnet

Report: Russian Hacker Forums Fueled Georgia Cyber Attacks

An exhaustive inquiry into August's cyber attacks on the former Soviet bloc nation of Georgia finds no smoking gun in the hands of the Russian government. But experts say evidence suggests that Russian officials did little to discourage the online assault, which was coordinated through a Russian online forum that appeared to have been prepped with target lists and details about Georgian Web site vulnerabilities well before the two countries engaged in a brief but deadly ground, sea and air war. Published in Washingtonpost

Teenage hacker admits Scientology cyber-attack

A teenager hacker has admitted carrying out a cyber attack that crashed Church of Scientology websites as part of a campaign by a mysterious underground group, justice officials said Friday. Published in AFP

Cyber Police Bust 'Fraudsters'
An alleged internet fraud ring is busted as police shut down a website which apparently shared stolen credit card information.

Cyber crime is on the rise as more people shop online
Sixty people across the globe have been arrested in connection with the "Darkmarket" website, including Britons from Leicester, Manchester, Humberside, South Yorkshire and London. Published in Sky News

Cyber crime flourishes in the absence of law

Darakhshan Police are investigating a cyber crime, but interestingly without any technical expertise or experience. The case was lodged by a female complainant and pertained to obnoxious phone calls, SMS’s and emails received on her cell-phone as well as private and office email IDs. Published in TheNews.com.pk

Nigeria: Senate Considers Bill Against Cyber Crime

The Senate yesterday referred a Bill for an Act to outlaw perpetration of financial crimes through such electronic devices as mobile phones, internet and the Automatic Teller Machines (ATM) to its Committee on Judiciary, Human Rights and Legal Matters. Published in All Africa

Feds indict international cyber crook accused of $1.7m ATM spree

Hack resume lists Pentagon, NASA, Hamas
An international cyber criminal with a resume that includes breaking into computers maintained by NASA, the Pentagon, the Israeli parliament, and Hamas has been indicted in New York for conspiracy and fraud involving access devices. Publihsed in The Register

Spurned woman ‘kills’ cyber hubby

A JAPANESE woman has been arrested for the cold- blooded murder of her husband – in cyberspace.
The 43-year-old woman, identified as Mayumi Tomari, from the Miyazaki prefecture in southern Japan, was outraged that her virtual husband divorced her character in an online game, Maple Story. Published in Dispatch

Cyber Thieves

Thieves in today´s society aren´t coming in through the windows or doors anymore, now they keep their selves at a distance and are attacking their prey by using the technology that so many of us depend on in today´s society. The internet not only provides us with the comfort of performing our every day tasks but it has become a way of life. Published in American Chronicle

WA schoolchildren tell of poisonous cyber bullying

Edith Cowan University researchers found that 10 per cent of Year Nine and 10 students had been bullied using digital technology. Published in News.com.au

Dutch cyber-bullies punished

TWO TEENAGE toughs have been convicted of theft for stealing virtual goods in an online computer game world and punished by a Netherlands court.

The Dutch yoofs, 14 and 15 years old, apparently bullied a 13-year-old boy into giving them a virtual amulet and a virtual mask within the online adventure game Runescape. Published in The Inquirer

Man caught viewing child porn in cyber cafe has sentence adjourned

A POLISH man who was caught looking at child pornography in an internet cafe, leading to the discovery of more than 1,000 images in his home, has had his sentence adjourned for six months to allow further interaction with the Probation Services. Published in Irish Times

Andover couple cuffed on cyber attack charges

An Andover couple arrested while jogging today is accused of launching a cyber attack against their neighbors – from reportedly signing them up for a nudist group to filing false reports to child welfare workers about their kids, prosecutors charged today. Published in Boston Herald

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PRODUCTS AND SERVICES
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cyber Law College has been the pioneer in Cyber Law education in India. It provides various courses and trainings on Cyber Law for E-Commerce Professionals, Law Students, Business Management Students, Engineers, Company Secretaries and Chartered Accountants and Legal professionals who would like to specialize in Cyber Laws. For more details email at cyberlawcollege@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.

It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
Salient Features of iPro:
 New format of e-forms – as and when updated / revised
 Efilling of Forms
 Annual Return as per Schedule 5
 All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
 Minutes book with 500+ resolutions in-built plus user editing option
 Compliance Certificate
 Combined Company Registers
 Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
 Fixed Asset Registers & Reports
 Charges and Notice
 Certificate Printing
 Director Details Entry
 Attachment in PDF format.
For more details of the above software email at mailto:digitialsigncert@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at digitialsigncert@gmail.com


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For posting your products and services, please email details at dipak00001@gmail.com with subject line “Product”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JOBS/ FREELANCE MARKETS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details at dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW/IS EVENTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

International Conference on Cyber Security 29-30 Nov 2008, New Delhi, India
To address & debate Internet Security issues the World Council for Corporate Governance of UK (WCFCG) together with its associate the International Academy of Law, India (IAL), and in partnership with Cyber Law College are organizing an International Conference on Cyber Security in New Delhi on 29-30 Nov, 2008. Its theme is “Legislation, Monitoring & Enforcement of Cyber Laws”.
Law makers, Governmental policy makers, Legislators, Business leaders, IT experts, eminent jurists, enforcement organizations, academics, bankers & reputation agents are expected to participate. The conference aims to tap the rich tapestry of global experience to enrich thinking on cyber laws, internet security and governance issues for public good. For Participation details, visit http://www.wcfcg.net/ or contact naavi@vsnl.com. (source: naavi.com)
For posting cyber law or IS event, please email details at mailto:dipak@lawyer.comwith subject line “Events”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
BUSINESS STUFF
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with Cyber Law Update!!!
For more details email at mailto:dipak@lawyer.com with subject line “Advertise”

Friday, October 17, 2008

Cyber Law Update October 2008 - Issue no. 10

Cyber Law Update October 2008 - Issue no. 10

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Estonia’s Cyber Security Policy

A year-and-a-half after the coordinated denial-of-service attacks against its government and commercial computer systems, Estonia has released a national cyber security strategy that includes details about the attacks and offers recommendations for preventing attacks in the future and for a global stance toward cyber security. The report identifies four “policy fronts”:
1) application of a graduated system of security measures in Estonia;
2) development of Estonia’s expertise in and high awareness of information security to the highest standard of excellence;
3) development of an appropriate regulatory and legal framework to support the secure and seamless operability of information systems;
4) and promoting international cooperation aimed at strengthening global cyber security.
If you are interested in reading the detail then Estonia’s cyber security policy can be found at the following URL
http://www.mod.gov.ee/static/sisu/files/Estonian_Cyber_Security_Strategy.pdf
Published in Oliver

How to prevent cyber terrorism?

Polish law needs changes to accommodate prevention of new threats such as cyber terrorism, say MPs belonging to a parliamentary commission following their talks with heads of special services in Poland. Published in Polish Radio


World Bank Under Cyber Siege in 'Unprecedented Crisis'

The World Bank Group's computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year, FOX News has learned.

It is still not known how much information was stolen. But sources inside the bank confirm that servers in the institution's highly-restricted treasury unit were deeply penetrated with spy software last April. Invaders also had full access to the rest of the bank's network for nearly a month in June and July.

In total, at least six major intrusions — two of them using the same group of IP addresses originating from China — have been detected at the World Bank since the summer of 2007, with the most recent breach occurring just last month. Published in FoxNews

'Satyam banned from World Bank'


NEW YORK: Software major Satyam Computer Services has reportedly been banned from doing any off-shore work with the World Bank after forensic experts and bank investigators discovered that spy software was covertly installed on workstations inside the bank's Washington headquarters, allegedly by one or more contractors from Satyam Computer Services.
According to a FOX News report, apart from Satyam, two IP intrusions have been reported from China, and there have been six intrusions in all.
Investigators say that the software, which operates through a method known as keystroke logging, enabled every character typed on a keyboard to be transmitted to a still-unknown location via the Internet. Published in Indiatimes

Satyam refutes reports on World Bank bar


Hyderabad, Oct. 11 Satyam Computer Services has refuted reports in the international media that World Bank has barred it from doing offshore work. The reports said the bank had taken this decision after noticing reported intrusions into systems. “The story has no validity,” a Satyam spokesperson said.

Incidentally, a five-year contract between the bank and Satyam lapsed in September. The fourth largest IT services provider from India had bagged the contract in 2003 to implement Enterprise Resource Planning solution, extend document management and integrated messaging system.

Quoting from a World Bank statement that was issued to the agencies that ran the story, the spokesperson said here on Saturday that the story was wrong and was riddled with falsehoods and errors. “The story cites misinformation from unattributed sources and leaked e-mails that are taken out of context,” the statement said. Reported in Hindu

Electoral Rolls in Delhi Hacked!


It is reported that the Delhi Electoral rolls have been found to have been deliberately tampered with by the officials of an IT Company Webel Technology Limited. This would amount to Section 66 offence under ITA 2000 and the Company and its officials are in serious danger of being hauled up to the Courts and probably to the jails as well. Again this boils down to what "Due Diligence" the Company's top management had taken to ensure against any of its lower rank employees playing mischief. Reported in Naavi.org

Men indicted over cyber attacks


Two Europeans were indicted for allegedly launching internet attacks to shut down two retail websites in the US. Published in the Press Association

US patent office’s notice floors legal outsourcing

NEW DELHI: The US slowdown has kicked off a heated debate in the US legal circles. At the heart of debate is a recent notice by the United States Patent and Trademark Office (USPTO) barring companies who send information overseas regarding inventions and patents without government clearance. While some believe offshoring is good as it cut costs for legal firms, lawyer groups in the US are against it. Published in Economic Times

Cyber Intelligence-led Security - Reshaping the Role of Today’s CIO

Today, an increasing number of CIOs are embracing a new paradigm in the way they approach enterprise security. Previously, a significant amount of security resources were focused on protecting the perimeter. Now, however, a new, more dynamic and proactive approach is emerging as traditional reactive measures are no longer sufficient. Published in CIO


Cyber threats on the rise, FBI official says

Malicious cyber activity has grown more prevalent and sophisticated during the past year and threats come from organized crime groups, terrorist organizations and foreign governments, according to a senior FBI official. Published in FCW

Straightening the Tangle


The growing broadband adoption in India is encouraging, however, it has also opened a plethora of security concerns among enterprises

As the call for high-speed Internet and broadband is making waves among enterprises, hackers and fraudsters are having a ball of a time finding exciting opportunities to access vital documents in bandwidth-intensive unprotected networks of organizations. The network, according to experts is no longer delineating a physical network perimeter, people using the system-employees, customers, and partners constitute the new boundaries. … Experts also believe that India's unsafe security environment could be costing its BPO industry an estimated $500 mn annually. Published in VoiceNData

Outsourced--And Out Of Control


As the economy sinks and budgets are squeezed, outsourcing looks more and more like a thrifty necessity. But when it comes to the data security of those far-flung offices, businesses may find they get what they pay for.
A study released Tuesday, compiled from surveys of information technology managers and users in 10 countries, reveals an alarming gap between the information-security practices of developed countries and those of emerging markets like China, Brazil and, to a lesser degree, India. Published in Forbes

U.S. IT Security Better Than Rest of the World?


While there are some problems with IT security in the U.S., Americans in general have better security behavior to prevent data loss than other parts of the world. That's a general finding in a new report sponsored by Cisco that asked 2,000 globally dispersed professionals about their views on behaviors that could lead to data leakage.
….So what are some of the better IT behaviors?
One of them is using corporate-owned assets to communicate with personal e-mail. In the U.S., 39 percent of respondents admitted to using their company owned computer for personal e-mail while in Germany the figure was 47 percent, India 58 percent and in China a whopping 61 percent. Published in Internet news.com

Cyber Security Study: Many consumers less secure than they think


In our latest report on staying safe in cyberspace, 7 online blunders, the top mistake we warn about is assuming your security software is protecting you.
Now, a study just released by the National Cyber Security Alliance, underscores our advice by suggesting that many online consumers think their computers are more secure than they really are. Published in Consumer Report Electronics

Americans Still Somewhat Befuddled by Cyber Security


Users continue not to install antivirus software, believe they have protections they don't.

Every year there's a kickoff for a campaign on cyber-security awareness in the form of National Cyber Security Awareness Month. The campaign looks to better inform people on the hazards that may await them online. Each year, Symantec and the National Cyber Security Alliance perform some basic assessments of users' internet behaviors and each year they get a disappointing confirmation that many Americans still just don't get some important concepts cyber security. Published in DailyTech

Warning! You Might Be Fooled Into Clicking This Pop-Up


Have you ever been clicking your way through cyberspace, when suddenly, a very important-looking window pops up? It usually looks like it’s part of Microsoft Windows, and it says something like, “Warning! Your computer is at risk! Click ‘OK’!” Do you click on it? Is your computer really at risk? Is Windows trying to tell you something?
By now, you’ve probably figured out where this is going: that pop-up is a scam, something known as “scareware.” Published in Privacy Council

Uganda cyber laws going to Parliament
Uganda's draft electronic laws have been approved by Cabinet and are set to be debated before they are passed into law by Parliament.
The Ministry of ICT hopes to enact the draft laws -- the Computer Misuse Bill, Electronic Signatures Bill and Electronic Transactions Bill -- during this financial year, according to ICT Minister Ham Mukasa Mulira. Published in Network World

Copyright (New Technologies) Amendment comes into force in New Zeeland


Associate Commerce Minister Judith Tizard has announced that recent amendments to copyright legislation will soon come into force. The amendments update New Zealand's copyright law to reflect current advances in digital technology.
"The Copyright (New Technologies) Amendment Act 2008 will ensure our copyright laws keep up to speed with the dynamic nature of digital technology," Judith Tizard said. Reported in Behive.govt.nz

Spies Launch 'Cyber-Behavior' Investigation

A while back, the Office of the Director of National Intelligence (ODNI) said it wanted to start reviewing wannabe spies' "cyber behavior," before they handed the spooks security clearances. Suspect activities might include "social network usage," "compulsive internet use," "distribution of pirated materials," and "online contact with foreign nationals," the ODNI said. Published in Wired News

Scrabulous makers score a mixed ruling

Rajat and Jayant Agarwalla, the Indian brothers who came up with the Scrabble-style word game for Facebook called Scrabulous, told fans that their country's courts ruled that their game did not violate Mattel Inc.'s copyrights.It did, however, consider the name Scrabulous a trademark violation and ordered the Agarwallas to stop using the word, the brothers said. Published in LA Times

Banks Team Up for Cyber Security Awareness Month to Help Canadians Avoid Online Threats From Social Networking and File Sharing Sites

The Internet has made it easier than ever to bank, shop, communicate with others and find information about almost anything at any time. But as Internet use among Canadians continues to rise, so too does the number of criminals who commit identity theft and fraud using information they've found online. Published in Market Watch

Corporate, Government and Academic Leaders Unite to Fight Cyber Crime, Identity Theft and other Identity Management Challenges


An unprecedented coalition of leading corporate, government and academic institutions today announced the formation of the Center for Applied Identity Management Research (CAIMR). CAIMR is focused on developing research and solutions for society's most daunting identity management challenges such as cyber crime, terrorism, financial crimes, identity theft and fraud, weapons of mass destruction, and narcotics and human trafficking. The Center is the first of its kind to bring cross-disciplinary experts in criminal justice, financial crime, biometrics, cyber crime and cyber defense, data protection, homeland security and national defense to address identity management challenges that impact individuals, public safety, commerce, government programs and national security. Published in Market Watch

Cyber Crime Cell arrest one for extortion over web

Chandigarh, October 12 Cyber Crime Investigation Cell of the Chandigarh Police today arrested one Puja Negi, for involvement in an “extortion through the Web” racket. Published in Newsline

IB to go hi-tech, get more manpower to fight terror

NEW DELHI: Intelligence Bureau — which has come under flak for its failure to keep tabs on tech savvy jihadis — is set for major revamp with the government recruiting 6,000 more spies to strengthen its existing cadre of nearly 25,000 personnel. The IB will also get modern gadgets to monitor cyber communication. Published in Times of India

Fed Blotter: New Charges Filed Against Alleged Cyber Peeping Tom

Federal prosecutors are going after a Florida college student who allegedly installed spyware on a woman's laptop to covertly snap nude photos of her through her webcam.
Published in Wired News

Compulsory registration for cyber cafes in MP town

In view of spiralling cyber crimes in the financial capital of Madhya Pradesh, it was made mandatory for the cyber cafe owners to register themselves at the Indore Police's web portal. Published in Central Chronicle

Average privacy policy takes 10 minutes to read, research finds


Website privacy policies take on average 10 minutes to read and sometimes run into thousands of words, researchers have found. While some are short, others would take over half an hour to read, researchers said.
Published in out-law.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PRODUCTS AND SERVICES

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cyber Law College has been the pioneer in Cyber Law education in India. It provides various courses and trainings on Cyber Law for E-Commerce Professionals, Law Students, Business Management Students, Engineers, Company Secretaries and Chartered Accountants and Legal professionals who would like to specialize in Cyber Laws. For more details email at cyberlawcollege@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.

It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
Salient Features of iPro:
 New format of e-forms – as and when updated / revised
 Efilling of Forms
 Annual Return as per Schedule 5
 All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
 Minutes book with 500+ resolutions in-built plus user editing option
 Compliance Certificate
 Combined Company Registers
 Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
 Fixed Asset Registers & Reports
 Charges and Notice
 Certificate Printing
 Director Details Entry
 Attachment in PDF format.
For more details of the above software email at digitalsigncert@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at digitalsigncert@gmail.com


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For posting your products and services, please email details at dipak00001@gmail.com with subject line “Product”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

JOBS/ FREELANCE MARKETS

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details at dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CYBER LAW/IS EVENTS

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS event, please email details at mailto:dipak@lawyer.comwith subject line “Events”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

BUSINESS STUFF

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with Cyber Law Update!!!
For more details email at mailto:dipak@lawyer.com with subject line “Advertise”

Monday, September 29, 2008

Cyber Law Update September 2008 - Issue no. 9

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Perils of wireless Internet

Recent blasts expose the safety gaps in cyberspace and underscore the need for smart vigilance.

R.K.Raghavan

It is the same old story again. As in the case of a few past blasts, such as the series of UP explosions (November 2007) and Ahmedabad (August 2008), terrorists involved in the five explosions of Delhi on September 13 sent e-mails to the media just a few minutes before the bombs took off, warning the authorities of their action. There are, however, several unexplained issues here. Published in The Hindu Businessline

Centre to issue guidelines to internet service providers (Article published in Hindu)

The Winds of Cyber War


The computer attacks Russia allegedly orchestrated against Georgia in August have raised the cyber warfare bar to a new threat level. The cyber assault that accompanied Russia's armed maneuver into its former territory of Georgia escalated to an international event.
The concept of hurting a nation's technological infrastructure as part of a wider conflict is not new. The extent to which the digital warfare was waged, however, clearly added to a growing concern that has already led U.S. officials to prepare for the next wave of computer warfare. Published in TechNewWorld

Homeland Security found to be unprepared for 'cyber' threats

WASHINGTON--When politicians got together six years ago and decided to glue together a medley of federal agencies to create the U.S. Department of Homeland Security, one of the justifications was a better focus on cybersecurity.

….Now, Homeland Security is weathering a deluge of criticism of its lackluster cybersecurity efforts on grounds that they have proven to be inefficient, bureaucratic, and not even able to do a decent job of monitoring federal computer networks. Published in CNET News

Experts call for united global action against cyber attacks


The world has to unite against the growing menace of cyber terrorism, IT experts said Thursday, evoking a recent "cyber war" against Georgia as the latest example of the threat.
"The world has finally woken up and understood that cyber security needs a global approach and is a very serious matter," Estonian politician Mart Laar told a cyber security forum in the Estonian capital Tallinn. Published in Pak Tribune

Cyber-crooks sting South Africa for A$26m

A cyber-crime syndicate is believed to have defrauded the South African government of more than £12.8m (A$26m) in a series of spyware frauds. Published in Secure Computing

Cyber-Ark Highlights the Seriousness of Data Security

Security firm Cyber-Ark has slammed a data breach in the UK that has seen the personal details of 5,000 Ministry of Justice staff go missing, saying that the situation highlights the need for EU controls on data security. Published in IDM

Cyber attack launched on Shiite websites: Iran report


Sunni Muslim computer hackers have attacked hundreds of Shiite websites including Shia Islam's most popular site linked to the community's leader in Iraq, Iran's Fars news agency reported on Friday (19 September 2008). Published in AFP

Anti cyber crime measures are 'a threat to privacy'


The world's leading international telecommunications organisation thas been slammed by privacy advocates for trying to stem the number of DoS attacks by limiting the amount of anonymity on the web. Published in ComputerWorldUK


Cyber attacks cripple opposition Myanmar media

The Internet sites of three Myanmar opposition media groups in exile suffered widespread cyber attacks, the anniversary of last year's failed uprising against the Southeast Asia country's military dictatorship. Published in eTaiwan

Cyber Attack Data Sharing Is Lacking, Congress Told

U.S. intelligence agencies are unable to share information about foreign cyber attacks against companies for fear of jeopardizing intelligence-gathering sources and methods, cyber security expert Paul B. Kurtz told lawmakers yesterday. Published in Washington Post

The Generals Go Cyber?


Burma's military junta has so successfully suppressed the media that Internet sites based outside the country are one of the few remaining sources of reliable news for Burmese people. Now it appears not even those sites are safe. Shortly before yesterday's anniversary of the 1988 pro-democracy uprising and last year's Buddhist-monk-led Saffron Revolution, the Web sites of my newspaper, The Irrawaddy, and other Burmese news portals came under cyber attack. I am not alone in believing that the junta is behind the attack, just as it was behind the shutdown of Internet access in Burma during last year's uprising. Published in Wall Street Journal

Hacker tool can watch you through webcam

Cover your webcams and unplug your microphones, because the latest freely-available hacker tools could use your own hardware against you without your knowledge.
Security specialist Prevx showed us some of the latest scary techniques being used to take unsuspecting web users' credit card details, passwords and personal information, as well as turn on your webcam and watch you. Published in TechRadar.com

Cops identify cyber cafe from where email threat to Advani was sent


Police have claimed to have identified the cyber cafe from which the email, purportedly sent by Indian Mujahideen terrorists, to eliminate BJP leader L K Advani during his Shillong visit on September 29, was sent. Published in Times of India


Teenage cyber terrorist sent to jail


Hammaad Munshi, from Dewsbury, West Yorkshire, England, was 15 when he was recruited into a worldwide plot to wipe out non-Muslims.
He was arrested in 2006 after police found material promoting "murder and destruction", including a guide to making napalm, on his computer and under his bed. Now 18, he has been convicted of making a record of information likely to be used for terrorist purposes. Published in Irish Independent

Senate moves to criminalise ATM, mobile phone, cyber offences


A bill for an Act to provide for the prohibition of electronic fraud in all electronic transactions in Nigeria and for other related matters

The bill, which is being sponsored by Senator Ayo Arise (PDP, Ekiti), has passed through first reading.
Violators of provisions of the law are liable on conviction, to jail terms ranging from five to 14 years. Published in The Punch

Cyber security top priority for UAE government

Dubai: Cyber security of the UAE government's information and ensuring that its own citizens protect it has become a priority, said Dubai eGovernment eServices Director Salem Al Shair…Published in Gulf News

Nigeria: EFCC Develops Software to Combat Cyber Crime

The Economic and Financial Crimes (EFCC) says it is developing computer softwares that would monitor internet services in the country as a way to combat cyber crimes.
Spokesman of the Commission, Mr. Femi Babafemi, who disclosed this to IT World, said the Commission is partnering with Information and Communication experts to develop the software. He said already, the report of the technical committee on the development of the software has been submitted to the chairman, adding that so far, over 136 cyber crime suspects have been arrested since Mrs. Farida Waziri took over as chairman of the Commission. Published in All Africa

Improved OnGuardOnline.gov Site Teaches Cyber-Safety to the Average Person

One of the better places for the average person to learn about the sometimes murky waters of the Internet is free and sponsored by the Federal Trade Commission. Although OnGuardOnline.gov and AlertaEnLinea.gov, its Spanish-language counterpart, have been around for awhile, some new and exciting improvements have been made to the site with a just released Web 2.0 redesign. Published in Blogcritics

Banking crisis: Cyber squatters cash in

It is not just hedge funds and short-sellers that are looking to cash-in on the global financial meltdown. Cyber-speculators have got in on the act too, snapping up online domain names in a game of guess the brand and the hope of selling their piece of internet property to the highest bidder.
Yesterday (September 16 2008) the rather long-winded domain name www.bankofamericamerrilllynch.com went up for sale on auction site eBay with an asking price of $1500 (£832). Published in Guardian

Cyber sleaze hits city’s top business family

A well-known builder’s family was hounded out of its wits recently when all its members, including four women, started receiving phone calls from unknown persons propositioning them to provide ‘female escorts’ as advertised in an internet-based agency. The ‘escort agency’ advertised Punjabi women available as escorts in Nagpur and listed the phone numbers of all the members of the family. Shocked by the flurry of calls, the angry and embarrassed family approached the cyber crime cell of crime branch in July. The cyber cell team, cracking the case, exposed the role of a disgruntled relative who wanted to avenge the fact that he was distanced from the family business as a sub-contractor around a year ago over a dispute. Published in Times of India

Comments: Disgruntled employees, friends and even lovers had restored to e-revenge in past. Hence, you are advise not to sharing your personal details and photo online.

OPINION: Cyber-Bullying - A Dark Side of the Internet

The Internet places a profound and staggering degree of information and knowledge at our fingertips. The Internet is the ultimate library and encyclopedia. It enables an army of telecommuting working men and women to work at home. It facilitates instant back and forth communication by e-mail. Online, we read newspapers and listen to music. The Internet is where we can advertise goods for sale on e-bay and purchase all sorts of items at retail stores. However, there is a dark aspect to the Internet. Published in Southern Maryland Online

Cyber sex can cause depression

People who frequently indulge in online sex, fetish and swinging sites have “alarmingly high” rates of depression, anxiety and stress, says a shocking new research. What’s more, people who seek out cyber sex typically devote hours a day to the covert activity, the study found. The Australian research also revealed that overwhelmingly male, well-educated, and aged anywhere from 18 to 80 indulge in such kind of ‘pleasure’. Published in Times of India

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

JOBS/ FREELANCE MARKETS

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details at dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CYBER LAW OR IS EVENTS

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SOCIETY DAY 2008
Event in Bangalore on October 17, 2008
Sept 26: As in the previous years, Digital Society Foundation (Trust promoted by Naavi and others) will celebrate October 17, 2008 as the Digital Society Day of India in recognition of the fact that on October 17, 2000, ITA 2000 was given effect to bringing in the legal recognition for electronic documents for the first time in India. The theme for the current year is "Privacy and Data Protection in Cyber Space". The event will consist of a day long programme to be held at KLE Law College, Rajaji Nagar, Bangalore in association with KILPAR (Karnataka Institute of Legislative and Parliamentary Affairs) and KLE Society's Law College. The seminar will discuss the issues in balancing the demand for Privacy Rights Protection by Human Rights Activists with the Law Enforcement needs in the light of Cyber Terrorism and Cyber Wars. It is intended to collect the views of Legal Experts on the "Essential Features of a Suggested Data Protection Act of India" to be consolidated and presented to Nasscom and Ministry of Communications and Information Technology for further action.
(Law Students wishing to present a paper on the occasion may kindly submit the paper before October 10th to naavi , through e-mail (naavi@vsnl.com) and print copy. The best paper presenter may be invited to briefly present his views during the seminar)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For posting cyber law or IS event, please email details at mailto:dipak@lawyer.comwith subject line “Events”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

BUSINESS STUFF

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with us!!!
For more details email at mailto:dipak@lawyer.com with subject line “Advertise”