Sunday, November 9, 2008

Cyber Law Update October 2008 - Issue no. 11

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

THE CYBER THREAT TODAY
Major Attacks on the Rise

Crooks and spies using the Internet to commit crimes against U.S. businesses and to attack government networks are getting more sophisticated, and the increasing number of such crimes not only impacts the economy but threatens national security. Published in FBI

FBI warns of increased cyber crimes

The FBI (Federal Bureau of Investigation) has warned that citizens and nations alike have increasingly become victim to cyber crime in the past year, costing tens of millions of dollars and threatening US security.
According to a report in New Scientist, FBI assistant director Shawn Henry said that as many as two dozen countries have taken an aggressive interest in penetrating the networks of US companies and government agencies. Published in ThaiIndia

Cyber Crime Rates on the Rise in the UK

Britain had witnessed soaring cyber crime rates in 2007, reveals an online identity firm.

The report has shown that cyber crime in the UK rose by more than 9 percent in 2007. Published in MedIndia

Stark warning over cyber attacks on UK businesses

Sustained cyber espionage attacks are being waged on companies that play a key role in the U.K. national infrastructure, a U.K. cyber defense chief has warned.

The computer systems of critical businesses in the United Kingdom, such as power companies and large financial institutions, are being repeatedly probed to steal information or uncover weaknesses that could take them down. Published in ZDnetAsia

Cyber Security and the “financial meltdown”

“We are experiencing a financial meltdown due to a fundamental misunderstanding and mismanagement of modern financial systems, which is generating a crisis of confidence in our core institutions. Today, all our critical infrastructures are reliant on cyber systems that are also misunderstood and mismanaged. These vulnerabilities place both our financial and physical security in jeopardy unless we update the method we use to control our cyber systems,” said Larry Clinton, president of the Internet Security Alliance (ISA). Published in TalkRadioNews

Cyber security threats grow in sophistication, subtlety

The annual report from Georgia Tech Information Security Center identifies five evolving cyber security threats, and the news is not good.

GTISC interviewed a range of industry security experts to explore the threats and the available countermeasures. The five are malware, botnets, cyber warfare, threats to VoIP and mobile devices, and the "evolving cyber crime economy."

In all five areas, attackers are becoming increasingly sophisticated, increasingly subtle, and increasingly adept at exploiting new Web developments, such as the rise of social network sites. Industry and government need to become equally concerted and sophisticated to contain these threats if the Internet is to be a trusted communications medium. Published in ComputerWorld

IT security guide: Understanding cyber-risks means knowing what questions to ask
New guide gives CFOs 50 questions about cyberthreats to ask various department heads

A good place for senior executives to start in trying to understand their companies' financial exposure to cyberthreats is by getting an overall assessment — not just from IT, but also from business units and corporate operations such as the human resources, legal and public relations departments.

That piece of advice is contained in an information guide that the American National Standards Institute (ANSI) and the Internet Security Alliance (ISA) jointly released today in an effort to help high-level execs prepare for the financial implications of possible cyberattacks. Published in Computer World

To curb cyber crimes, software to be certified

To curb the growing menace of cyber crimes in the country, Union Ministry of Communications and Information Technology will set up the first ever Indian accreditation facility for software in Kolkata. B J Srinath, senior director of Indian Computer Emergency Response Team under the IT ministry, said: “The accreditation facility will be the first-of-its-kind in India and will accredit the security aspects of software developed by companies.” Published in Indian Express

Corporates should gear up for cyber security audit: Debesh Das

Corporate entities should gear up for cyber security audit by independent agencies in line with financial audit in order to rein in cyber crime.

"We should never neglect the cyber security issue. This should be top priority. Corporates should brace themselves for cyber security audit in line with financial audit," West Bengal Information Technology Minister Debesh Das said today. Published in Economic Times

Computer Monitoring Software and Data Recovery Tools Provide Cyber Security

Pandora (News - Alert) Corp, a manufacturer of personal computer (PC) monitoring software and recovery tools, recently announced that data recovery tools and computer monitoring software will be two good resources for the cyber security awareness month.

In order to remind PC owners about the importance of Internet protection, antivirus software, password and firewall strengths, October is celebrated as cyber security awareness month. This will help in reminding the PC owner about the active steps that need to be taken so as to prevent one from becoming a victim of phishing scams, cyber attacks and identity thefts. Published in TMCnet

Report: Russian Hacker Forums Fueled Georgia Cyber Attacks

An exhaustive inquiry into August's cyber attacks on the former Soviet bloc nation of Georgia finds no smoking gun in the hands of the Russian government. But experts say evidence suggests that Russian officials did little to discourage the online assault, which was coordinated through a Russian online forum that appeared to have been prepped with target lists and details about Georgian Web site vulnerabilities well before the two countries engaged in a brief but deadly ground, sea and air war. Published in Washingtonpost

Teenage hacker admits Scientology cyber-attack

A teenager hacker has admitted carrying out a cyber attack that crashed Church of Scientology websites as part of a campaign by a mysterious underground group, justice officials said Friday. Published in AFP

Cyber Police Bust 'Fraudsters'
An alleged internet fraud ring is busted as police shut down a website which apparently shared stolen credit card information.

Cyber crime is on the rise as more people shop online
Sixty people across the globe have been arrested in connection with the "Darkmarket" website, including Britons from Leicester, Manchester, Humberside, South Yorkshire and London. Published in Sky News

Cyber crime flourishes in the absence of law

Darakhshan Police are investigating a cyber crime, but interestingly without any technical expertise or experience. The case was lodged by a female complainant and pertained to obnoxious phone calls, SMS’s and emails received on her cell-phone as well as private and office email IDs. Published in TheNews.com.pk

Nigeria: Senate Considers Bill Against Cyber Crime

The Senate yesterday referred a Bill for an Act to outlaw perpetration of financial crimes through such electronic devices as mobile phones, internet and the Automatic Teller Machines (ATM) to its Committee on Judiciary, Human Rights and Legal Matters. Published in All Africa

Feds indict international cyber crook accused of $1.7m ATM spree

Hack resume lists Pentagon, NASA, Hamas
An international cyber criminal with a resume that includes breaking into computers maintained by NASA, the Pentagon, the Israeli parliament, and Hamas has been indicted in New York for conspiracy and fraud involving access devices. Publihsed in The Register

Spurned woman ‘kills’ cyber hubby

A JAPANESE woman has been arrested for the cold- blooded murder of her husband – in cyberspace.
The 43-year-old woman, identified as Mayumi Tomari, from the Miyazaki prefecture in southern Japan, was outraged that her virtual husband divorced her character in an online game, Maple Story. Published in Dispatch

Cyber Thieves

Thieves in today´s society aren´t coming in through the windows or doors anymore, now they keep their selves at a distance and are attacking their prey by using the technology that so many of us depend on in today´s society. The internet not only provides us with the comfort of performing our every day tasks but it has become a way of life. Published in American Chronicle

WA schoolchildren tell of poisonous cyber bullying

Edith Cowan University researchers found that 10 per cent of Year Nine and 10 students had been bullied using digital technology. Published in News.com.au

Dutch cyber-bullies punished

TWO TEENAGE toughs have been convicted of theft for stealing virtual goods in an online computer game world and punished by a Netherlands court.

The Dutch yoofs, 14 and 15 years old, apparently bullied a 13-year-old boy into giving them a virtual amulet and a virtual mask within the online adventure game Runescape. Published in The Inquirer

Man caught viewing child porn in cyber cafe has sentence adjourned

A POLISH man who was caught looking at child pornography in an internet cafe, leading to the discovery of more than 1,000 images in his home, has had his sentence adjourned for six months to allow further interaction with the Probation Services. Published in Irish Times

Andover couple cuffed on cyber attack charges

An Andover couple arrested while jogging today is accused of launching a cyber attack against their neighbors – from reportedly signing them up for a nudist group to filing false reports to child welfare workers about their kids, prosecutors charged today. Published in Boston Herald

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PRODUCTS AND SERVICES
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cyber Law College has been the pioneer in Cyber Law education in India. It provides various courses and trainings on Cyber Law for E-Commerce Professionals, Law Students, Business Management Students, Engineers, Company Secretaries and Chartered Accountants and Legal professionals who would like to specialize in Cyber Laws. For more details email at cyberlawcollege@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.

It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
Salient Features of iPro:
 New format of e-forms – as and when updated / revised
 Efilling of Forms
 Annual Return as per Schedule 5
 All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
 Minutes book with 500+ resolutions in-built plus user editing option
 Compliance Certificate
 Combined Company Registers
 Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
 Fixed Asset Registers & Reports
 Charges and Notice
 Certificate Printing
 Director Details Entry
 Attachment in PDF format.
For more details of the above software email at mailto:digitialsigncert@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at digitialsigncert@gmail.com


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For posting your products and services, please email details at dipak00001@gmail.com with subject line “Product”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JOBS/ FREELANCE MARKETS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details at dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW/IS EVENTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

International Conference on Cyber Security 29-30 Nov 2008, New Delhi, India
To address & debate Internet Security issues the World Council for Corporate Governance of UK (WCFCG) together with its associate the International Academy of Law, India (IAL), and in partnership with Cyber Law College are organizing an International Conference on Cyber Security in New Delhi on 29-30 Nov, 2008. Its theme is “Legislation, Monitoring & Enforcement of Cyber Laws”.
Law makers, Governmental policy makers, Legislators, Business leaders, IT experts, eminent jurists, enforcement organizations, academics, bankers & reputation agents are expected to participate. The conference aims to tap the rich tapestry of global experience to enrich thinking on cyber laws, internet security and governance issues for public good. For Participation details, visit http://www.wcfcg.net/ or contact naavi@vsnl.com. (source: naavi.com)
For posting cyber law or IS event, please email details at mailto:dipak@lawyer.comwith subject line “Events”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
BUSINESS STUFF
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with Cyber Law Update!!!
For more details email at mailto:dipak@lawyer.com with subject line “Advertise”

Friday, October 17, 2008

Cyber Law Update October 2008 - Issue no. 10

Cyber Law Update October 2008 - Issue no. 10

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Estonia’s Cyber Security Policy

A year-and-a-half after the coordinated denial-of-service attacks against its government and commercial computer systems, Estonia has released a national cyber security strategy that includes details about the attacks and offers recommendations for preventing attacks in the future and for a global stance toward cyber security. The report identifies four “policy fronts”:
1) application of a graduated system of security measures in Estonia;
2) development of Estonia’s expertise in and high awareness of information security to the highest standard of excellence;
3) development of an appropriate regulatory and legal framework to support the secure and seamless operability of information systems;
4) and promoting international cooperation aimed at strengthening global cyber security.
If you are interested in reading the detail then Estonia’s cyber security policy can be found at the following URL
http://www.mod.gov.ee/static/sisu/files/Estonian_Cyber_Security_Strategy.pdf
Published in Oliver

How to prevent cyber terrorism?

Polish law needs changes to accommodate prevention of new threats such as cyber terrorism, say MPs belonging to a parliamentary commission following their talks with heads of special services in Poland. Published in Polish Radio


World Bank Under Cyber Siege in 'Unprecedented Crisis'

The World Bank Group's computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year, FOX News has learned.

It is still not known how much information was stolen. But sources inside the bank confirm that servers in the institution's highly-restricted treasury unit were deeply penetrated with spy software last April. Invaders also had full access to the rest of the bank's network for nearly a month in June and July.

In total, at least six major intrusions — two of them using the same group of IP addresses originating from China — have been detected at the World Bank since the summer of 2007, with the most recent breach occurring just last month. Published in FoxNews

'Satyam banned from World Bank'


NEW YORK: Software major Satyam Computer Services has reportedly been banned from doing any off-shore work with the World Bank after forensic experts and bank investigators discovered that spy software was covertly installed on workstations inside the bank's Washington headquarters, allegedly by one or more contractors from Satyam Computer Services.
According to a FOX News report, apart from Satyam, two IP intrusions have been reported from China, and there have been six intrusions in all.
Investigators say that the software, which operates through a method known as keystroke logging, enabled every character typed on a keyboard to be transmitted to a still-unknown location via the Internet. Published in Indiatimes

Satyam refutes reports on World Bank bar


Hyderabad, Oct. 11 Satyam Computer Services has refuted reports in the international media that World Bank has barred it from doing offshore work. The reports said the bank had taken this decision after noticing reported intrusions into systems. “The story has no validity,” a Satyam spokesperson said.

Incidentally, a five-year contract between the bank and Satyam lapsed in September. The fourth largest IT services provider from India had bagged the contract in 2003 to implement Enterprise Resource Planning solution, extend document management and integrated messaging system.

Quoting from a World Bank statement that was issued to the agencies that ran the story, the spokesperson said here on Saturday that the story was wrong and was riddled with falsehoods and errors. “The story cites misinformation from unattributed sources and leaked e-mails that are taken out of context,” the statement said. Reported in Hindu

Electoral Rolls in Delhi Hacked!


It is reported that the Delhi Electoral rolls have been found to have been deliberately tampered with by the officials of an IT Company Webel Technology Limited. This would amount to Section 66 offence under ITA 2000 and the Company and its officials are in serious danger of being hauled up to the Courts and probably to the jails as well. Again this boils down to what "Due Diligence" the Company's top management had taken to ensure against any of its lower rank employees playing mischief. Reported in Naavi.org

Men indicted over cyber attacks


Two Europeans were indicted for allegedly launching internet attacks to shut down two retail websites in the US. Published in the Press Association

US patent office’s notice floors legal outsourcing

NEW DELHI: The US slowdown has kicked off a heated debate in the US legal circles. At the heart of debate is a recent notice by the United States Patent and Trademark Office (USPTO) barring companies who send information overseas regarding inventions and patents without government clearance. While some believe offshoring is good as it cut costs for legal firms, lawyer groups in the US are against it. Published in Economic Times

Cyber Intelligence-led Security - Reshaping the Role of Today’s CIO

Today, an increasing number of CIOs are embracing a new paradigm in the way they approach enterprise security. Previously, a significant amount of security resources were focused on protecting the perimeter. Now, however, a new, more dynamic and proactive approach is emerging as traditional reactive measures are no longer sufficient. Published in CIO


Cyber threats on the rise, FBI official says

Malicious cyber activity has grown more prevalent and sophisticated during the past year and threats come from organized crime groups, terrorist organizations and foreign governments, according to a senior FBI official. Published in FCW

Straightening the Tangle


The growing broadband adoption in India is encouraging, however, it has also opened a plethora of security concerns among enterprises

As the call for high-speed Internet and broadband is making waves among enterprises, hackers and fraudsters are having a ball of a time finding exciting opportunities to access vital documents in bandwidth-intensive unprotected networks of organizations. The network, according to experts is no longer delineating a physical network perimeter, people using the system-employees, customers, and partners constitute the new boundaries. … Experts also believe that India's unsafe security environment could be costing its BPO industry an estimated $500 mn annually. Published in VoiceNData

Outsourced--And Out Of Control


As the economy sinks and budgets are squeezed, outsourcing looks more and more like a thrifty necessity. But when it comes to the data security of those far-flung offices, businesses may find they get what they pay for.
A study released Tuesday, compiled from surveys of information technology managers and users in 10 countries, reveals an alarming gap between the information-security practices of developed countries and those of emerging markets like China, Brazil and, to a lesser degree, India. Published in Forbes

U.S. IT Security Better Than Rest of the World?


While there are some problems with IT security in the U.S., Americans in general have better security behavior to prevent data loss than other parts of the world. That's a general finding in a new report sponsored by Cisco that asked 2,000 globally dispersed professionals about their views on behaviors that could lead to data leakage.
….So what are some of the better IT behaviors?
One of them is using corporate-owned assets to communicate with personal e-mail. In the U.S., 39 percent of respondents admitted to using their company owned computer for personal e-mail while in Germany the figure was 47 percent, India 58 percent and in China a whopping 61 percent. Published in Internet news.com

Cyber Security Study: Many consumers less secure than they think


In our latest report on staying safe in cyberspace, 7 online blunders, the top mistake we warn about is assuming your security software is protecting you.
Now, a study just released by the National Cyber Security Alliance, underscores our advice by suggesting that many online consumers think their computers are more secure than they really are. Published in Consumer Report Electronics

Americans Still Somewhat Befuddled by Cyber Security


Users continue not to install antivirus software, believe they have protections they don't.

Every year there's a kickoff for a campaign on cyber-security awareness in the form of National Cyber Security Awareness Month. The campaign looks to better inform people on the hazards that may await them online. Each year, Symantec and the National Cyber Security Alliance perform some basic assessments of users' internet behaviors and each year they get a disappointing confirmation that many Americans still just don't get some important concepts cyber security. Published in DailyTech

Warning! You Might Be Fooled Into Clicking This Pop-Up


Have you ever been clicking your way through cyberspace, when suddenly, a very important-looking window pops up? It usually looks like it’s part of Microsoft Windows, and it says something like, “Warning! Your computer is at risk! Click ‘OK’!” Do you click on it? Is your computer really at risk? Is Windows trying to tell you something?
By now, you’ve probably figured out where this is going: that pop-up is a scam, something known as “scareware.” Published in Privacy Council

Uganda cyber laws going to Parliament
Uganda's draft electronic laws have been approved by Cabinet and are set to be debated before they are passed into law by Parliament.
The Ministry of ICT hopes to enact the draft laws -- the Computer Misuse Bill, Electronic Signatures Bill and Electronic Transactions Bill -- during this financial year, according to ICT Minister Ham Mukasa Mulira. Published in Network World

Copyright (New Technologies) Amendment comes into force in New Zeeland


Associate Commerce Minister Judith Tizard has announced that recent amendments to copyright legislation will soon come into force. The amendments update New Zealand's copyright law to reflect current advances in digital technology.
"The Copyright (New Technologies) Amendment Act 2008 will ensure our copyright laws keep up to speed with the dynamic nature of digital technology," Judith Tizard said. Reported in Behive.govt.nz

Spies Launch 'Cyber-Behavior' Investigation

A while back, the Office of the Director of National Intelligence (ODNI) said it wanted to start reviewing wannabe spies' "cyber behavior," before they handed the spooks security clearances. Suspect activities might include "social network usage," "compulsive internet use," "distribution of pirated materials," and "online contact with foreign nationals," the ODNI said. Published in Wired News

Scrabulous makers score a mixed ruling

Rajat and Jayant Agarwalla, the Indian brothers who came up with the Scrabble-style word game for Facebook called Scrabulous, told fans that their country's courts ruled that their game did not violate Mattel Inc.'s copyrights.It did, however, consider the name Scrabulous a trademark violation and ordered the Agarwallas to stop using the word, the brothers said. Published in LA Times

Banks Team Up for Cyber Security Awareness Month to Help Canadians Avoid Online Threats From Social Networking and File Sharing Sites

The Internet has made it easier than ever to bank, shop, communicate with others and find information about almost anything at any time. But as Internet use among Canadians continues to rise, so too does the number of criminals who commit identity theft and fraud using information they've found online. Published in Market Watch

Corporate, Government and Academic Leaders Unite to Fight Cyber Crime, Identity Theft and other Identity Management Challenges


An unprecedented coalition of leading corporate, government and academic institutions today announced the formation of the Center for Applied Identity Management Research (CAIMR). CAIMR is focused on developing research and solutions for society's most daunting identity management challenges such as cyber crime, terrorism, financial crimes, identity theft and fraud, weapons of mass destruction, and narcotics and human trafficking. The Center is the first of its kind to bring cross-disciplinary experts in criminal justice, financial crime, biometrics, cyber crime and cyber defense, data protection, homeland security and national defense to address identity management challenges that impact individuals, public safety, commerce, government programs and national security. Published in Market Watch

Cyber Crime Cell arrest one for extortion over web

Chandigarh, October 12 Cyber Crime Investigation Cell of the Chandigarh Police today arrested one Puja Negi, for involvement in an “extortion through the Web” racket. Published in Newsline

IB to go hi-tech, get more manpower to fight terror

NEW DELHI: Intelligence Bureau — which has come under flak for its failure to keep tabs on tech savvy jihadis — is set for major revamp with the government recruiting 6,000 more spies to strengthen its existing cadre of nearly 25,000 personnel. The IB will also get modern gadgets to monitor cyber communication. Published in Times of India

Fed Blotter: New Charges Filed Against Alleged Cyber Peeping Tom

Federal prosecutors are going after a Florida college student who allegedly installed spyware on a woman's laptop to covertly snap nude photos of her through her webcam.
Published in Wired News

Compulsory registration for cyber cafes in MP town

In view of spiralling cyber crimes in the financial capital of Madhya Pradesh, it was made mandatory for the cyber cafe owners to register themselves at the Indore Police's web portal. Published in Central Chronicle

Average privacy policy takes 10 minutes to read, research finds


Website privacy policies take on average 10 minutes to read and sometimes run into thousands of words, researchers have found. While some are short, others would take over half an hour to read, researchers said.
Published in out-law.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PRODUCTS AND SERVICES

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cyber Law College has been the pioneer in Cyber Law education in India. It provides various courses and trainings on Cyber Law for E-Commerce Professionals, Law Students, Business Management Students, Engineers, Company Secretaries and Chartered Accountants and Legal professionals who would like to specialize in Cyber Laws. For more details email at cyberlawcollege@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.

It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
Salient Features of iPro:
 New format of e-forms – as and when updated / revised
 Efilling of Forms
 Annual Return as per Schedule 5
 All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
 Minutes book with 500+ resolutions in-built plus user editing option
 Compliance Certificate
 Combined Company Registers
 Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
 Fixed Asset Registers & Reports
 Charges and Notice
 Certificate Printing
 Director Details Entry
 Attachment in PDF format.
For more details of the above software email at digitalsigncert@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at digitalsigncert@gmail.com


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For posting your products and services, please email details at dipak00001@gmail.com with subject line “Product”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

JOBS/ FREELANCE MARKETS

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details at dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CYBER LAW/IS EVENTS

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS event, please email details at mailto:dipak@lawyer.comwith subject line “Events”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

BUSINESS STUFF

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with Cyber Law Update!!!
For more details email at mailto:dipak@lawyer.com with subject line “Advertise”

Monday, September 29, 2008

Cyber Law Update September 2008 - Issue no. 9

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Perils of wireless Internet

Recent blasts expose the safety gaps in cyberspace and underscore the need for smart vigilance.

R.K.Raghavan

It is the same old story again. As in the case of a few past blasts, such as the series of UP explosions (November 2007) and Ahmedabad (August 2008), terrorists involved in the five explosions of Delhi on September 13 sent e-mails to the media just a few minutes before the bombs took off, warning the authorities of their action. There are, however, several unexplained issues here. Published in The Hindu Businessline

Centre to issue guidelines to internet service providers (Article published in Hindu)

The Winds of Cyber War


The computer attacks Russia allegedly orchestrated against Georgia in August have raised the cyber warfare bar to a new threat level. The cyber assault that accompanied Russia's armed maneuver into its former territory of Georgia escalated to an international event.
The concept of hurting a nation's technological infrastructure as part of a wider conflict is not new. The extent to which the digital warfare was waged, however, clearly added to a growing concern that has already led U.S. officials to prepare for the next wave of computer warfare. Published in TechNewWorld

Homeland Security found to be unprepared for 'cyber' threats

WASHINGTON--When politicians got together six years ago and decided to glue together a medley of federal agencies to create the U.S. Department of Homeland Security, one of the justifications was a better focus on cybersecurity.

….Now, Homeland Security is weathering a deluge of criticism of its lackluster cybersecurity efforts on grounds that they have proven to be inefficient, bureaucratic, and not even able to do a decent job of monitoring federal computer networks. Published in CNET News

Experts call for united global action against cyber attacks


The world has to unite against the growing menace of cyber terrorism, IT experts said Thursday, evoking a recent "cyber war" against Georgia as the latest example of the threat.
"The world has finally woken up and understood that cyber security needs a global approach and is a very serious matter," Estonian politician Mart Laar told a cyber security forum in the Estonian capital Tallinn. Published in Pak Tribune

Cyber-crooks sting South Africa for A$26m

A cyber-crime syndicate is believed to have defrauded the South African government of more than £12.8m (A$26m) in a series of spyware frauds. Published in Secure Computing

Cyber-Ark Highlights the Seriousness of Data Security

Security firm Cyber-Ark has slammed a data breach in the UK that has seen the personal details of 5,000 Ministry of Justice staff go missing, saying that the situation highlights the need for EU controls on data security. Published in IDM

Cyber attack launched on Shiite websites: Iran report


Sunni Muslim computer hackers have attacked hundreds of Shiite websites including Shia Islam's most popular site linked to the community's leader in Iraq, Iran's Fars news agency reported on Friday (19 September 2008). Published in AFP

Anti cyber crime measures are 'a threat to privacy'


The world's leading international telecommunications organisation thas been slammed by privacy advocates for trying to stem the number of DoS attacks by limiting the amount of anonymity on the web. Published in ComputerWorldUK


Cyber attacks cripple opposition Myanmar media

The Internet sites of three Myanmar opposition media groups in exile suffered widespread cyber attacks, the anniversary of last year's failed uprising against the Southeast Asia country's military dictatorship. Published in eTaiwan

Cyber Attack Data Sharing Is Lacking, Congress Told

U.S. intelligence agencies are unable to share information about foreign cyber attacks against companies for fear of jeopardizing intelligence-gathering sources and methods, cyber security expert Paul B. Kurtz told lawmakers yesterday. Published in Washington Post

The Generals Go Cyber?


Burma's military junta has so successfully suppressed the media that Internet sites based outside the country are one of the few remaining sources of reliable news for Burmese people. Now it appears not even those sites are safe. Shortly before yesterday's anniversary of the 1988 pro-democracy uprising and last year's Buddhist-monk-led Saffron Revolution, the Web sites of my newspaper, The Irrawaddy, and other Burmese news portals came under cyber attack. I am not alone in believing that the junta is behind the attack, just as it was behind the shutdown of Internet access in Burma during last year's uprising. Published in Wall Street Journal

Hacker tool can watch you through webcam

Cover your webcams and unplug your microphones, because the latest freely-available hacker tools could use your own hardware against you without your knowledge.
Security specialist Prevx showed us some of the latest scary techniques being used to take unsuspecting web users' credit card details, passwords and personal information, as well as turn on your webcam and watch you. Published in TechRadar.com

Cops identify cyber cafe from where email threat to Advani was sent


Police have claimed to have identified the cyber cafe from which the email, purportedly sent by Indian Mujahideen terrorists, to eliminate BJP leader L K Advani during his Shillong visit on September 29, was sent. Published in Times of India


Teenage cyber terrorist sent to jail


Hammaad Munshi, from Dewsbury, West Yorkshire, England, was 15 when he was recruited into a worldwide plot to wipe out non-Muslims.
He was arrested in 2006 after police found material promoting "murder and destruction", including a guide to making napalm, on his computer and under his bed. Now 18, he has been convicted of making a record of information likely to be used for terrorist purposes. Published in Irish Independent

Senate moves to criminalise ATM, mobile phone, cyber offences


A bill for an Act to provide for the prohibition of electronic fraud in all electronic transactions in Nigeria and for other related matters

The bill, which is being sponsored by Senator Ayo Arise (PDP, Ekiti), has passed through first reading.
Violators of provisions of the law are liable on conviction, to jail terms ranging from five to 14 years. Published in The Punch

Cyber security top priority for UAE government

Dubai: Cyber security of the UAE government's information and ensuring that its own citizens protect it has become a priority, said Dubai eGovernment eServices Director Salem Al Shair…Published in Gulf News

Nigeria: EFCC Develops Software to Combat Cyber Crime

The Economic and Financial Crimes (EFCC) says it is developing computer softwares that would monitor internet services in the country as a way to combat cyber crimes.
Spokesman of the Commission, Mr. Femi Babafemi, who disclosed this to IT World, said the Commission is partnering with Information and Communication experts to develop the software. He said already, the report of the technical committee on the development of the software has been submitted to the chairman, adding that so far, over 136 cyber crime suspects have been arrested since Mrs. Farida Waziri took over as chairman of the Commission. Published in All Africa

Improved OnGuardOnline.gov Site Teaches Cyber-Safety to the Average Person

One of the better places for the average person to learn about the sometimes murky waters of the Internet is free and sponsored by the Federal Trade Commission. Although OnGuardOnline.gov and AlertaEnLinea.gov, its Spanish-language counterpart, have been around for awhile, some new and exciting improvements have been made to the site with a just released Web 2.0 redesign. Published in Blogcritics

Banking crisis: Cyber squatters cash in

It is not just hedge funds and short-sellers that are looking to cash-in on the global financial meltdown. Cyber-speculators have got in on the act too, snapping up online domain names in a game of guess the brand and the hope of selling their piece of internet property to the highest bidder.
Yesterday (September 16 2008) the rather long-winded domain name www.bankofamericamerrilllynch.com went up for sale on auction site eBay with an asking price of $1500 (£832). Published in Guardian

Cyber sleaze hits city’s top business family

A well-known builder’s family was hounded out of its wits recently when all its members, including four women, started receiving phone calls from unknown persons propositioning them to provide ‘female escorts’ as advertised in an internet-based agency. The ‘escort agency’ advertised Punjabi women available as escorts in Nagpur and listed the phone numbers of all the members of the family. Shocked by the flurry of calls, the angry and embarrassed family approached the cyber crime cell of crime branch in July. The cyber cell team, cracking the case, exposed the role of a disgruntled relative who wanted to avenge the fact that he was distanced from the family business as a sub-contractor around a year ago over a dispute. Published in Times of India

Comments: Disgruntled employees, friends and even lovers had restored to e-revenge in past. Hence, you are advise not to sharing your personal details and photo online.

OPINION: Cyber-Bullying - A Dark Side of the Internet

The Internet places a profound and staggering degree of information and knowledge at our fingertips. The Internet is the ultimate library and encyclopedia. It enables an army of telecommuting working men and women to work at home. It facilitates instant back and forth communication by e-mail. Online, we read newspapers and listen to music. The Internet is where we can advertise goods for sale on e-bay and purchase all sorts of items at retail stores. However, there is a dark aspect to the Internet. Published in Southern Maryland Online

Cyber sex can cause depression

People who frequently indulge in online sex, fetish and swinging sites have “alarmingly high” rates of depression, anxiety and stress, says a shocking new research. What’s more, people who seek out cyber sex typically devote hours a day to the covert activity, the study found. The Australian research also revealed that overwhelmingly male, well-educated, and aged anywhere from 18 to 80 indulge in such kind of ‘pleasure’. Published in Times of India

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

JOBS/ FREELANCE MARKETS

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details at dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CYBER LAW OR IS EVENTS

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SOCIETY DAY 2008
Event in Bangalore on October 17, 2008
Sept 26: As in the previous years, Digital Society Foundation (Trust promoted by Naavi and others) will celebrate October 17, 2008 as the Digital Society Day of India in recognition of the fact that on October 17, 2000, ITA 2000 was given effect to bringing in the legal recognition for electronic documents for the first time in India. The theme for the current year is "Privacy and Data Protection in Cyber Space". The event will consist of a day long programme to be held at KLE Law College, Rajaji Nagar, Bangalore in association with KILPAR (Karnataka Institute of Legislative and Parliamentary Affairs) and KLE Society's Law College. The seminar will discuss the issues in balancing the demand for Privacy Rights Protection by Human Rights Activists with the Law Enforcement needs in the light of Cyber Terrorism and Cyber Wars. It is intended to collect the views of Legal Experts on the "Essential Features of a Suggested Data Protection Act of India" to be consolidated and presented to Nasscom and Ministry of Communications and Information Technology for further action.
(Law Students wishing to present a paper on the occasion may kindly submit the paper before October 10th to naavi , through e-mail (naavi@vsnl.com) and print copy. The best paper presenter may be invited to briefly present his views during the seminar)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For posting cyber law or IS event, please email details at mailto:dipak@lawyer.comwith subject line “Events”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

BUSINESS STUFF

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with us!!!
For more details email at mailto:dipak@lawyer.com with subject line “Advertise”

Wednesday, September 24, 2008

Domain name fraud: Hoax email to solicit business from .com owners

If you recieve an email information you that someone had made application for registration of domain name similar to your .com domain name.

It is a hoax email to solicit more business for the owner of .com domain name. They want you to register under different domains such as .asia .in .org net. and so on.

Sample of hoax email

From: Dr. ABC
Date: 9/23/2008 9:29:19 AM
To:
Subject: XXX Enquiry

Dear XXX,

We are one of the Domain Name Dispute Resolution (DNDR) Committee members authorized by ANIC(Asia Internet Network Information Center).

Now we have something urgent on intellectual property need to confirm with your company.

On the Sep 22, 2008, we received an application from one person from China Intellectual Property Protection Agency (Taiwan) Corporation named “Roger L. Forbes” who wants to register the “XXX” as Internet Brand,TradeMark Domain and Asia Pacific domains. Considering these domains and internet brand would involve the intellectual property of your company’s name,patents,trademarks,and copyright, and in order to avoid confusion between them, so we inform you urgently. If you considered these domains and internet brand are important to you and there was necessary to protect them by registering them first, please let someone who is responsible for trademark or domain name contact me as soon as possible.

Thank you for you cooperation.

I am waiting for your urgent reply,
Kind Regards,
Dr. ABC
Chief Law Officer,Senior Consulting Director

Internet Brand Justice & Safety Dept.
ABC xxx xxx Ltd (Branch Office)
Help Dispute Tel: ..........(Mon–Fri,9am to 6:30pm,GMT+8)

Wednesday, September 17, 2008

Misuse of wireless network to send terror email

Terrorists had allegedly used unsecured wi-fi networks to send terror emails to media and remained anonymous till date. Earlier terrorists were using cyber cafes to send terror emails but now they are exploiting wi-fi and tomorrow some other technology. Similar trend is being witnessed in other areas of information security. As the world catches on to the dangers of opening unknown e-mail attachments and better spam filters are created, the focus of attacks is turning to the web itself.[1] Trend Micro Incorporated, a global leader in Internet content security, reported that cybercriminals are not only leveraging new technologies to propagate cybercrime, but are also reinventing forms of social engineering to cleverly ensnare both consumers and businesses, according to the "Trend Micro Threat Roundup and Forecast 1H 2008" report.[2]

Is wi-fi technology is safe?

“The vulnerability is more in the negligence of the users of wi-fi rather than the technology itself” says Na.Vijayashankar, better known as Naavi, the well known Cyber Law Consultant in India. He was the author of the first book on Cyber Laws in India and a pioneer in the spreading of Cyber Law Education in the country.

The users are not taking sufficient measures to secure their wi-fi nor the service providers are take necessary steps to educate them on same. It is easier for users to secure its wired network because it is visible to them. This advantage is not available to wi-fi users. Naavi says, “The invisibility of the network users induces complacency. Psychologically, it is difficult for ordinary users to visualize that a person from out of our physical boundary may also have access to the device.” If this vulnerability of wi-fi is not plugged then the same can be misused by terrorists to send terror emails and remain anonymous as reported in the above mentioned two incidences.

How wi-fi works?

Wi-fi uses radio signals to connect and communicate with a hotspot and a PC or a laptop situated in a short distance of 100 to 200 feet in an office building, a university or even at homes. You can move around in a campus of university or an office without losing net connectivity.

When the hotspot is in open mode, it sends broadcast a message “I am available” in a vicinity of 100 to 200 feet and a laptop or a PC equipped with a wireless network receiver in this vicinity able to connected to the particular wi-fi and connect to net. One can access wi-fi network even from 800 feet by using an antenna. So if your wi-fi network is not secured then it can be misused by not only by your neighbours residing in your and nearby buildings but also by a stranger few streets away from your office or home.

Whereas in closed mode, the user sends a message “I want to connect with XYZ wi-fi hotspot”, which is responded by the hotspot “I am XYZ”. You can have additional security login id and password for connecting to wi-fi.

Wi-fi software faults make interception easier. Security Consultant Chris O’Ferrell has been able to connect to wireless networks in Washington D. C. from outside a Senate office building, as reported in “High Wireless Acts” by Noguchi. Y in Washington Post dated 28 April, 2002. Back home. Asian School of Cyber Laws recently conducted experiments near several software parks. The finding of the same was very shocking and reveals lack of cyber security. “The wireless networks of a whopping 90% of the software companies were leaking out sensitive information. A malicious hacker could easily sit in a parked car with a laptop; run some sniffing software and access huge mounts of sensitive data including source codes!” For more details refer Cyber Crimes Hit List – 2006 issued by Asian School of Cyber Laws and available on their website www.asianlaws.org.

Precautions to be taken by users to secure their wi-fi:

Keep wi-fi in closed mode rather than open mode.
Use a log-in id and password to access wi-fi and periodically change your password.
Use wi-fi protected access2 (WPA2), which more secured than wired equivalent privacy (WEP)
When you are not using wi-fi, switch off the same.
Check the audit trails of net sessions to ensure that all logs are properly recorded and not misused by unauthorized user.

Naavi warns all wi-fi users, including potential users, to avoid wi-fi if you cannot adopt the requisite security.


Footnotes

[1] For more details read article on “The new multiple face of Internet threats” available at http://www.canada.com/calgaryherald/news/story.html?id=1e082603-ec50-4b79-af5d-9996d1d39732
[2] Source: Trend Micro Incorporated


*********

Today(17-09-2008), I had secured a wi-fi network of my business associate…I feel great…although it is a drop in the ocean (an initiative to secure wi-fi networks in Mumbai)
Perils of wireless Internet

Recent blasts expose the safety gaps in cyberspace and underscore the need for smart vigilance.

R.K.Raghavan

It is the same old story again. As in the case of a few past blasts, such as the series of UP explosions (November 2007) and Ahmedabad (August 2008), terrorists involved in the five explosions of Delhi on September 13 sent e-mails to the media just a few minutes before the bombs took off, warning the authorities of their action. There are, however, several unexplained issues here. Published in The Hindu Businessline

Centre to issue guidelines to internet service providers (Article published in Hindu)


Monday, September 15, 2008

Cyber Law Update September 2008 - Issue no. 8

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

LHC Web site defaced – was the particle detector really at risk?

The Telegraph is reporting that attackers have defaced a Web page on the Compact Muon Solenoid Experiment Monitoring (CMSMON) system that monitors the fallout from the big bang experiment presently taking place beneath CERN.
The question that should stand out is why this system was public faced. CERN scientists said the attackers were “one step” away from the control system that operates one of the huge magnets used in the gargantuan machine. Published in the Tech Herald

Cyber Crime: An Economic Problem

During ISOI 4 (hosted by Yahoo! in Sunnyvale, California) whenever someone made mention of RBN (the notoriously malicious and illegal bulletproof hosting operation, the Russian Business Network) folks would immediately point out that an operation just as bad was just "next door" (40 miles down the road?), working undisturbed for years. They spoke of Atrivo (also known as Intercage). The American RBN, if you like.

In fact, while many spam operations use botnets and operate all around the world, a lot of the big players own their own network space and operate hosting farms, which are constant and "legitimate", right in the US—for years now. Published in CircleID

U.S. takes a look at arming itself for cyber-warfare

Never let it be said that the U.S. government makes snappy decisions about arming itself for cyber-warfare. Julian Barnes at the Los Angeles Times reports that the military is currently debating whether or not to develop the ability for the U.S. government to go on the offensive during a potential cyber-attack rather than simply defend U.S. computer systems in case of cyber-warfare. Barnes' article points out that the recent cyber-attacks associated with the conflict in Georgia have escalated the debate, which "reflects a newfound uncertainty over the state of global cyber-warfare capabilities." Published in The Standard

Defense Ministry’s Cyber Network Is Hacker-Proof

A Defense Ministry spokesman assured Tuesday that the department's cyber-security system is ``hacker-proof," adding that its intra-net computer data network is detached from the external Internet.
Source: koreatimes.co.kr Published in Crime Research

Is the cyber terrorism threat exaggerated?

Cyber terrorism, a term coined by the media rather than security agencies, is one of the apocalyptic scenarios portrayed by fiction writers and movie producers on a regular basis. The story of a teenager bringing an entire nation to its knees with a computer and internet connection not only inflicts terror and awe in general public, it also fuels a lot of misapprehension feeding on the natural fear of unknown technology.

While it would not be advisable for any national security outlook to discount cyber terrorism completely, the threat must be kept in perspective. As communications technology becomes more pervasive and integrated into the national economy and infrastructure, providing security to it and preventing its abuse obviously becomes a national security concern. Published in India Post

‘Lack of Cyber laws makes it impossible to fight Net crimes’

KUWAIT CITY : Internet-related crimes are on the rise in Kuwait and the lack of Cyber laws makes it impossible to tackle such fraudulent practices, says a Kuwaiti lawyer. Speaking to the Arab Times on Wednesday, Labeed Abdal added that hackers are increasingly targeting Kuwait and many other countries, knowing full well that they can get away with their crimes. He went on to explain that some people send abusive emails to settle personal scores and that the law enforcement agencies are unable to act on such matters due to non-existence of Cyber laws, “which must be in tune with the latest changes in the Internet domain.” Published in Arab Times Online

Braga pushes passage of cyber crime bill

THE Davao City Council, through a resolution proposed by Councilor Pilar Braga, urged the House of Representatives to fast track the formulation of the final draft of the cyber crime bill.
"We push for a its speedy endorsement to the Senate because we urgently need of legislation. The longer it takes for the bill to become a law, the more daring cyber crimes are being committed," Braga said Wednesday. Published in Sun Star

Experts call for united global action against cyber attacks

TALLINN (AFP) — The world has to unite against the growing menace of cyber terrorism, IT experts said Thursday, evoking a recent "cyber war" against Georgia as the latest example of the threat.
"The world has finally woken up and understood that cyber security needs a global approach and is a very serious matter," Estonian politician Mart Laar told a cyber security forum in the Estonian capital Tallinn. Published in AFP

NASS, EFCC, ICPC, CBN to partner against cyber crime

National Assembly, the Economic and Financial Crimes Commission (EFCC), the Independent Corrupt Practices and Other Related Offences Commission (ICPC) and the Central Bank of Nigeria (CBN) have resolved to partner themselves in the fight against cyber crime and money laundering. Published in Tribune

NHRC asks for speedy inquiry in cyber fraud

KENDRAPARA: National Human Rights Commission (NHRC) has directed police here to speed up the inquiry and submit report on an alleged cyber fraud in which an Oriya engineer working in a Dubai company was cheated. Published in Economic Times

Cyber experts to help make WiFi networks more secure

In light of the recent controversy over wireless fidelity (WiFi) network connection, Maharashtra police have joined hands with the Federation of Indian Chambers of Commerce and Industry (FICCI) to secure the WiFi network across the state. Published in DNA India

‘Cyber Safe Thane’ Organised by Thane Police & NASSCOM

NASSCOM, the premier trade body and ‘voice’ of the Indian IT-BPO industry, today announced that it would be organising ‘Cyber Safe Thane’, a three day awareness campaign on Cyber safety and security issues for customers, industry, academia, and other stakeholders in Thane from September 18-20th, 2008. Prdomain Business Register (press release)

Stop taking Net for granted!

NEW DELHI: We live in an exciting world of technology which is changing every day. There's YouTube, Second Life, MySpace, iPhone.

You probably hadn't even heard of these a year ago, but today they dominate the discussions about societal trends and the future of communications and the Internet.

Once upon a time, e-commerce drove the Internet debate, but now it's clear we have entered a new era.

Today, consumers have ushered in the 'Any Era' demanding access to any information, from any device, any time and anywhere they want it. And they not only want access; they want the ability to contribute, personalise and socialise. Published in Indiatimes

House panel to banks: devise systems to thwart cyber crimes

The parliamentary standing committee on personnel, public grievances, law and justice on Wednesday asked public sector banks to devise a special monitoring system to check cyber crimes and strengthen the present vigilance system to curtail corruption. The committee observed that the present banking set up was not equipped to tackle cyber crimes, which are quite familiar at the international level. The committee was concerned about effects of cyber crimes on the Indian banking system. Published in Financial Express

Chennaiites lose Rs 1 cr to phishing this year

CHENNAI: Chennaiites have lost over Rs 1 crore to phishers in 2008 alone, thanks to fraudsters taking advantage of the increase in the number of people switching to net-banking. Complaints of phishing have been flooding the bank fraud wing of the central crime branch of city police. In spite of warnings by banks, educated customers are falling prey to online robbers. Police have identified as many as 21 types of phishing mails, most of them involving spoofing of the web pages of mainstream banks. Some other phishing mails exploit the tendency of people to fall for free money or gifts. Published in Times of India

Case registered against eight for cyber fraud

Acting on the directive of the National Human Rights Commission, the police have registered a criminal case against a 25-year-old net-savvy married woman and seven others on alleged cyber fraud charge. Published in Kalinga Times

Cyber cheat lived it up after Rs 20 lakh heist

AHMEDABAD: Ellisbridge police officials are now trying to connect the dots in the sensational Rs 20-lakh online heist of Sanjay Koliya, 20, of Rajkot.

As Ellisbridge police grilled him, Sanjay gave details of his life after he became rich overnight. The investigating officers are now probing how exactly and in what manner the young cyber cheat spent his ill-gotten wealth. Published in Times of India

Cyber Crimes: You Could Be the Next Victim

Welcome to the world of cyber crimes, welcome to the den of cyber-criminals.
Experts are of the opinion that cyber crime, which commonly refers to any illegal activity committed on the Internet, dates back to the 1980s. Because of declining economic standards in most developing countries, numerous jobless youths found earning a living increasingly difficult despite having relevant degrees and certifications. They decided to devise a means of survival. The result of their "ingenuity" is this pest threatening to inconvenience Internet users. Published in The Industry Standard

Teacher arrested in cyber-sex sting

A 46-year-old Paradise man, Butte County substitute teacher and father of two Paradise High School students was arrested Wednesday for soliciting sex over the Internet with someone he allegedly believed was a 13-year-old girl.

According to a Butte County Sheriff's Office press release, Gerald William Lemay was arrested for arranging a meeting with a minor for sexual purposes. Published in Paradise Post

Cyber Bullying: Responsibilities and Solutions

A Missouri woman is indicted on federal charges of causing the suicide death of a teenage girl who frequented the social networking site MySpace. An eighth grade student from Pelham Middle School, N.Y. is the recipient of insulting remarks posted on her MySpace page by a classmate. Another eighth grader receives embarrassing comments as she instant messages with friends. A 13-year-old Vermont boy was bullied for months online. He eventually committed suicide. These are but four examples of a problem known as cyber bullying. Published in Tech Learning

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Jobs/ Freelance Market
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details at dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Cyber Law or IS events
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Coming soon….

For posting cyber law or IS event, please email details at dipak00001@gmail.com with subject line “Events”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
BUSINESS STUFF
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with us!!!
For more details email at dipak00001@gmail.com with subject line “Advertise”


Tuesday, September 2, 2008

Cyber Law Update August 2008 - Issue no. 7

A classic cyber war?

It is again eventful times in cyberspace. It all started earlier this month with the entry of Russian troops into neighbouring Georgia’s South Ossetia, a region not reconciled to its present political status within Georgia, and with strong affinity for North Ossetia that is part of Russia. Reported in The Hindu Businessline

Public, private sectors at odds over cyber security

The government has largely argued that the private sector is better suited to tackle the problem. But big corporations say it's too big for them to handle.
By Joseph Menn, Los Angeles Times Staff Writer
Three very big and very different computer security breaches that have dominated recent headlines did more than show how badly the Internet needs major repairs. They also exposed the huge rift between corporate America and the federal government over who should fix it, cyber-security experts say. Reported in La Times

Thousands of cyber attacks each day on key utilities Jonathan Richards

Computer networks controlling electricity supplies, telecommunications and banking are being attacked thousands of times a day in a new cyberwar against Britain waged by criminals and terrorists — some of them backed by foreign states — the Government has said. Reported in Times Online

Hacker gets into Federal Emergency Management Agency's phone system

The FBI is investigating more than $12,000 in calls made when a hacker broke into the Federal Emergency Management Agency's phone system.
Source: newschannel5 Reported in Crime-Research

Hackers attack Iraq's vulnerable computers

Ahmed Khathem, the head of Iraq's newly formed cybercrimes division, sits in a borrowed office, at a borrowed desk, working on a laptop borrowed from one of his subordinates.
It is his unit's lone computer, highlighting the country's vulnerability to a community of Iraqi hackers defacing websites and attempting to hack into sensitive internal networks.
Source: USAtoday.com Reported in Crime Research

Indian hacker alleged brain behind biggest cyber-heist

LONDON: An unknown Indian hacker is being charged with the greatest cyber-heist in history for allegedly helping a criminal gang steal identities of an estimated eight million people in a hacking raid that could ultimately net more than 2.8 billion pounds in illegal funds. Reported in Economic Times

Survey: IT staff would steal secrets if laid off

Computerworld UK — Most IT staff would steal sensitive company information, including CEO's passwords and customer details, if they were laid off, according to a new survey from Cyber-Ark.
A staggering 88 percent of IT administrators admitted they would take corporate secrets, if they were suddenly made redundant. The target information included CEO passwords, customer database, research and development plans, financial reports, M&A plans and the company's list of privileged passwords. Reported in IT World

Cyber-threat environment becoming increasingly severe

Today's cyber-threat environment is increasingly severe, compounded by the emergence of new types of attacks.
This is according to TippingPoint, an intrusion prevention company which also provides IPS-secured (intrusion prevention system) network. They say the situation is worsened by the shrinking time between the discovery of vulnerabilities and the development of ways to exploit them, plus the dissolving network perimeter. Reported in Network World

The new multiple face of Internet threats

E-mail viruses are so yesterday. These days, it's your browser that has online criminals salivating.
Network worms and viruses spread by mass e-mails are unlikely to ever become extinct, but they are no longer the primary weapon used by the bad guys of the virtual world to steal your identity or life's savings. Reported in Canada.com

Hard disks seized from 3 cyber cafes

21 Aug 2008, Ahmedabad/Vadodara: Three cyber cafes in Vadodara's old city area were searched by the Ahmedabad Crime Branch and local Special Operation Group (SOG) officials in connection with Ahmedabad blasts late on Wednesday after information that those behind the blasts, including computer expert Abdul Subhan alias Taufique Bilal from Mumbai, visited these cafes. The investigating team seized 28 hard disks from all three cafes and sent it to Forensic Science Laboratory (FSL) tests. Reported in Times of India

Dalhousie to help U.S. catch cyber terrorists

A major software project is underway by the U.S. Department of Homeland Security to monitor levels of Internet traffic and detect possible security breaches — and Dalhousie University is going to help build it. Reported in The Chronicle Herald

More tools developed to crack cyber crimes

THIRUVANANTHAPURAM: Law enforcing agencies are now armed with more software tools to fight cyber crimes with a premier centre claiming to have developed them.
Emailtracer, CyberCheck, Siman and Calltrack are some of the softwares (sic) developed indigenously by the Resource Centre for Cyber Forensic (RCCF) here. Reported in Economic Times

Cyber forensic tools will soon be considered as evidence

THIRUVANANTHAPURAM: Evidence gathered using various cyber forensics tools developed by the Centre for Development of Advanced Computing (CDAC) would soon be considered as evidence in cyber crimes.
Necessary amendments in this regard would be made in the IT Act, said Communication and Information Technology Minister A Raja. He was speaking at a function organised in connection with the dedication of the Resource Centre for Cyber Forensics (RCCF) at CDAC here to the nation on Saturday. Reported in NewIndPress

City turning a hackers' den

HYDERABAD: The source code theft involving a senior techie could be a highend cyber crime but the city's netizens have been witness to a range of cyber concerns from hacked email accounts, credit card frauds to the most common crime of posting pornographic material on the profiles of social networking site members.
And this has made internet security experts brand Hyderabad as a hackers' den. They say the city has become a haven for cyber crimes, and that among the southern Indian cities Hyderabad perhaps also ranks the highest on the cyber crime radar with city internet security firms receiving cases of corporate data theft, email frauds and impersonations and mobile phone related crimes. Reported in Times of India

Covering Cyber Threats

Companies spent more than $6.3 million on data breaches in 2007
By Greg Bordonaro
As companies face a host of new risks associated with their digital data, insurers are scrambling to create a whole new field of coverage: cyber liability.
Costly and legally troublesome problems ranging from data breaches to infringement cases are on the rise, and 43 states, including Connecticut, have passed laws spelling out rules for companies that experience them. Reported in Hartford Business
Technorati Profile

Thursday, August 21, 2008

Cyber Law Update August 2008 - Issue no. 6

Cyber warfare is a military twilight zone

Before Georgia and Russia started shooting at each other, they were already fighting on the Internet. Georgian government and media websites had been almost paralysed by hackers following the so-called 'Distributed Denial of Service' attacks that began weeks before. Such cyber war techniques constitute an increasing threat, one that's now being taken seriously by the military. Reported in Radio Netherlands

Tracking a Cyber Attack

The conflict between Russia and the former Soviet Republic of Georgia has underscored the relative anonymity of cyberattackers. During the conflict, attacks were launched against Georgia’s Internet infrastructure, and a debate continues over who might be responsible.

With that debate likely to continue indefinitely, policy-makers are realizing that in cyberspace, ascribing blame might be nearly impossible.

Although the Russian government has denied involvement, it is still under suspicion, along with organized crime groups and garden-variety hackers. Reported in FCW

Malaysia Should Be Ready To Face Cyber Threats

SHAH ALAM, Aug 15 (Bernama) -- Malaysia, which appears safe from cyber attacks like those experienced in other parts of the world, should brace itself for such a threat.

Energy, Water and Communications Minister Datuk Shaziman Abu Mansor wants the country to prepare itself for the threat which could affect individuals, corporation and the government. Reported in Bernama

Black Ice: Cyber-terrorism and the Private Sector

Corporate America is still in denial about the threat of cyber-terrorist attacks against critical facilities in the energy, telecommunications and financial industries. Reported in Computer World

Terrorism cyber-recruiter jailed

LONDON (Reuters) - A man described by prosecutors as a terrorism "Mr Fix-it" who recruited young people to al Qaeda's ideology over the Internet, was jailed for 12 years on Tuesday while one of his accomplices received a 10 year term. Reported in Reuters

NCC Wants Checks on Cyber Criminals

The Nigerian Computer Society (NCS) has called on the Federal Government to pay particular attention to the devastating impact of cyber criminality and terrorism in the e-commerce and electronic fund transfer landscape. Reported in This Day Online

Microsoft, Google and Yahoo sued by the Indian Government

Microsoft, Google and Yahoo were issued notices by India's Supreme Court on Wednesday, following a complaint that they were promoting techniques and products for the selection of an unborn child's sex through advertising and links on their search engines. Posted on Blogging Madeeasy

Chandigarh police get hi-tech gadgets to combat cyber crime

Chandigarh, Aug 17 (IANS) A machine to recover deleted SMSes and another to scan through any suspected hard disk, these are among the latest gadgets acquired by the Chandigarh police to tackle cyber crime. Reported in Sindh Today

Start of school means kids need to be cyber-savvy
Tech group gives tips for back to school

WASHINGTON — Americans for Technology Leadership, a coalition of technology and consumer groups, recently launched its monthlong campaign to help educate parents on ways to make sure their kids stay safe online when they head back to school.

Children face an enormous number of possible roadblocks to their Internet safety, including cyber-bullying threats, cyber security issues such as spam, computer viruses, identity theft, spyware, phishing scams and Internet predators. Reported in Sea Coast Online

India figures in top 10 spammers' list

NEW DELHI: India figures among the top 10 spam sending countries, accounting for nearly 3% of spam sent globally in the second quarter of 2008, according to enterprise security firm Secure Computing’s Internet Threats report. Spam or unsolicited e-mails sent from emerging markets is expected to grow as internet infrastructure improves. Reported in Economic Times

Hackers too playing games at Olympics

NEW DELHI: Olympic buffs, beware! Internet hackers are trying their best to steal data from your system and corrupt it. Hackers send mails related to Olympic events with interesting subject lines and then trap surfers in their net. Internet users in India have been found more vulnerable as people are overenthusiastic over the prospect of getting two individual medals for the first time in the history of the games. Reported in Economic Times

Technorati Profile

Thursday, August 14, 2008

Cyber Law Update August 2008 - Issue no. 5

Pakistan intensifies Cyber War propaganda against India

Washington, Aug.11 (ANI): Pakistan is taking steps to intensify its cyber war propaganda against India with the help of its intelligence outfit, the Inter-Services Intelligence (ISI) by carrying reports of alleged communal fissures taking place on the Indian side of Kashmir.

Since the Amarnath land transfer controversy began, Pakistan Televisions (PTV) focus has been on the alleged human rights violations in Jammu and Kashmir.

On an average, PTV is beaming two hours of daily anti-India propaganda as compared to an hour a day that was the norm earlier. It is apparent that PTV is heavily focusing on promoting the communal divide between Hindu-dominant Jammu and the Muslim-dominant Kashmir Valley with the objective of pushing forward the two-nation theory.
The ISI is also setting up a TV channel in Bangladesh as a part of its war over airwaves in the region, says the US based Global Geopolitics Network. Reported in Thaindia

New cell phone connection may be required two guarantors

NEW DELHI, AUG 10 (PTI): In its efforts to check the use of mobile phones in terror activities, the Ministry of Home Affairs is likely to advice the Department of Telecommunication to direct all mobile phone operators to get two existing cellular customers as guarantors before issuing SIM card to new customers. Reported in Outlook India

Cyber Thugs March Through Georgia

August 13, 2008: Georgia is not just being invaded by Russian troops, it is also being hammered on the Internet, with the same Cyber War techniques Russia used against Estonia last year. Russia was accused of causing great financial harm to Estonia via Cyber War attacks, and Estonia wants this sort of thing declared terrorism, and dealt with. NATO agreed to discuss the issue, but never took any action against Russia. But as a result of that incident, NATO established a Cyber Defense Center in Estonia three months ago. Reported in Strategy Page

Britain under attack from cyber foreign security terrorists, report warns

"E-espionage" was identified by the Government as one of the two most likely risks facing the UK, the other being terror attacks on the transport network. Reported in MarketWatch

Feds crack largest U.S. identity theft

Federal authorities said yesterday that they had cracked the largest identity theft case in U.S. history, charging 11 people in the theft of more than 40 million credit and debit card account numbers from computer systems at major retailers such as T.J. Maxx and Barnes & Noble. Reported in Hindu

U.S. Warns Of Chinese Cyber-Spies

Overseas Travelers Warned That Personal Information Can Be Stolen; No Device Safe
(CBS) U.S. intelligence officials issued a strong warning Thursday that Americans traveling overseas, particularly visitors to the Olympics in China, face a serious risk of having sensitive information stolen, reports CBS News correspondent Bob Orr. Reported in CBS News

Cyber-security experts warn of Olympics spam

Singapore: Cyber-security experts warned Internet users of a deluge of viruses and spam during the Beijing Olympic Games, with those reading Chinese at a higher risk, news reports said Friday.
E-mail messages with headers such as "Beijing Olympics Cancelled" or "Beijing Olympics 2008 Lottery Promotion" should not be opened, the experts told The Straits Times. Reported in Bangkokpost

Beckstrom on cybersecurity

LAS VEGAS — Cybersecurity is hampered by a lack of understanding about the physics and economics of the networks we are trying to defend, according to Rod Beckstrom, director of the Homeland Security Department’s National Cyber Security Center, said Thursday at the Black Hat Briefings.

Risk management is a process of balancing security efforts against an acceptable level of risk because absolute security is not possible. But Beckstrom, speaking at the Black Hat Briefings yesterday, said we have no method for valuing our networks or measuring the effectiveness of our security. Reported in GCN

Google in a legal spot over blog post

MUMBAI: Google India, the domestic subsidiary of the high-profile Silicon Valley web search company, is facing defamation charges from a Mumbai-based firm, Gremach Infrastructure Equipments & Projects.

The company has filed a lawsuit against Google for hosting a series of articles on its blogging site, campaigning against its mines in Mozambique. In an interim order, the Bombay High Court has asked Google India to furnish information about the blogger. The case’s outcome will have far-reaching implications for the development of cyber law in India. Reported in Economic Times

Egypt demanding data from cyber cafés users: NGO

CAIRO (AFP) — An Egyptian NGO on Saturday accused the Egyptian authorities of forcing cyber cafés to gather personal information on Internet users, saying the measure was a violation of privacy.

"The Egyptian government imposed a new measure which increases the extent of censorship on Internet users and violates their right to privacy," the Arabic Network for Human Rights Information said in a statement. Reported in AFP.Google

Funcom employee axed over cyber-sex

Age of Conan developer Funcom have sacked a moderator this week, after the employee was caught engaging in online naughtiness. Reported in Play.TM

Ex-convict indicted in cyber stalking case against woman

A former Des Plaines man has been indicted by a Cook County grand jury on charges he sent threatening e-mails to a woman whom he allegedly has pursued since 2000, prosecutors said Friday. Reported in ChicagoTribune

Man held for cyber crime; sells ex as call girl on website

CHENNAI: The cyber crime cell of the Central Crime Branch picked up a database manager of a private firm for posting a girl's photograph and mobile number on a networking site and describing her as a call girl available for service. Reported in Time of India

Cyber crime on rise; public warned on posting pics

CHENNAI: Do you share photographs with friends on social networking sites? Then beware, for chances are high that your morphed picture, obscene of course, will be doing the rounds in cyberspace. Worse, your cell will never stop ringing with calls from strangers who want sexual favours. Reported in Times of India

The Cyber Highway to Dubai

While Dubai is undergoing significant growth and business expansion, its Internet sophistication remains behind the curve, writes branding expert Naseem Javed. Companies in Dubai must harness the power of online resources to maximize their potential, he writes. Reported in E-commerce Times