CYBER LAW NEWS
Russia engaged in cyber war with neighboring countries
This January marked “the third successful cyberattack against a country” — when suspected Russian attackers distributed a denial of service attack that overwhelmed three of the four Internet service providers in Kyrgyzstan, disrupting Internet access, reports DefenseTech. Published in Blogs.zdnet.com
Chinese Hackers Attack U.S. Computers, Thompson Says
Chinese government and freelance hackers are the primary culprits behind as many as several hundred daily attacks against U.S. government, electric-utility and financial computer networks, a senior congressman said.
“Sophisticated hackers could really wreak havoc on our financial systems if they were successful,” House Homeland Security Committee Chairman Bennie Thompson said in an interview. The threat is “primarily from China.”
Wang Baodong, a spokesman for the Chinese Embassy in the U.S., denied that the Chinese government was attacking U.S. computer systems. Published in Bloomberg
Cyber-crime cases hit record high in Japan in 2008
The police across Japan uncovered 6,321 cases of Internet-related or cyber crime in 2008, up 15.5% from the previous year and the highest number since comparable data became available in 2000, a National Police Agency survey showed Thursday. The figure represented a threefold jump from 2,081 cases recorded in 2004. Published in Japan Today
Cyber terrorists learn how to take advantage of cyberspace
The U.S. government and armed forces need to develop the knowledge, skills and attributes required for cyber-strategic leaders. And that next generation of leaders needs to understand the cyber environment.
Beginning in 1988 with the infamous "Morris Worm" attack, cybersecurity has grown in importance along with the degree of reliability the United States and other nations have placed on the cyber domain. Published in UPI
Obama orders review of cyber security
WASHINGTON (AP) — President Barack Obama on Monday ordered a 60-day review of the nation's cybersecurity to examine how federal agencies use technology to protect secrets and data. Published in Google
Nigeria: That Delay on Cyber Crime Law is Dangerous
Internet-based attacks and crimes are increasing in Nigeria as 'greedy' criminals continue to steal data from businesses and individuals.
The sad story however is government's attitude to curb the menace. IT World's Zakariyya Adaramola, wrote on the implications of the delay to act fast on the criminals. Published in All Africa
IBM Report: Threat Scores Should Give Weight to the Economics of Cyber-crime
With the number of Web-based threats and vulnerabilities growing, IBM X-Force is recommending that the security industry rethink how it ranks vulnerability threats--how easily an attack can be monetized and to what degree should be components of vulnerability scoring.
IBM’s X-Force is pushing for a reprioritization of security threats. Published in eWeek
Data Breaches Costing Customers, Not Just Money
A study by the Ponemon Institute found the average cost of data breaches - from detection to notification to lost business - is rising. The No. 1 cost to companies is lost business, which now accounts for 69 percent of total costs.
Data breaches are costly, and they are not getting any cheaper – particularly breaches due to third parties. Published in eWeek
Browsing child porn will land you in jail
The newly passed Information Technology Bill is set to make it illegal to not only create and transmit child pornography in any electronic form, but even to browse it. The punishment for a first offence of publishing, creating, exchanging, downloading or browsing any electronic depiction of children in "obscene or indecent or sexually explicit manner" can attract five years in jail and a fine of Rs 10 lakh. Published in Times of India
Cyber Crime can Kill
"It's dangerous in 'Cyberville,'" Banks said.Peter Banks, 17 year veteran of the National Center for Missing and Exploited Children, was a presenter at DMACC's Cyber Crime Awareness Conference last Saturday. Banks said that "Cyberville," as he calls it is a place where anyone with malintent has access to 30 million sites where children are exploited. Banks said that there are 600,000 registered sex offenders in America. He said that the center receives about 2000 calls a week on suspicions of the usage of child pornography, the luring of children, and child exploitation. Published in Campus Chronicle
Cracking down on cyber crime tough for experts: IGP
MANGALORE: "It is too technical! I bet half your police constables there did not understand a word of what you said", these words by a law degree student to M K Nagaraj, inspector general of police (Anti- Terrorist Cell) put the focus of a one-day workshop on cyber law for police personnel in its right perspective. Cracking down on cyber crime, Nagaraj admitted is sometimes difficult even for experts in this new area of white-collar crime. Published in Times of India
Don't Fall Victim To Cyber Crime
Cyber crime is on the attack, and it can happen to anyone.
That was the message at a day-long exercise addressing cyber-security. Published in Kfox TV
3 men charged with 'cyber flashing'
DETROIT (AP) — Authorities say three Saginaw-area men have been arrested after exposing themselves online to Wayne County sheriff's deputies posing as teenage girls.
Information from: The Saginaw News, http://www.mlive.com/saginaw and published in wsbt.com
Schools battle the bullies
…."Cyber-bullying presents unique challenges to schools because once something is put out on the Internet, it has the power to become available to the entire school and more," said Martha Turner, a counselor at Robious Middle School. "Before the Internet, bullying took the form of gossip, verbal or physical harassment." Published in Times Dispatch
PRODUCTS AND SERVICES
iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.
It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
Salient Features of iPro:
New format of e-forms – as and when updated / revised
Efilling of Forms
Annual Return as per Schedule 5
All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
Minutes book with 500+ resolutions in-built plus user editing option
Combined Company Registers
Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
Fixed Asset Registers & Reports
Charges and Notice
Director Details Entry
Attachment in PDF format.
For more details of the above software email to mailto:email@example.com
For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at firstname.lastname@example.org
For posting your products and services, please email details to email@example.com with subject line “Product”
JOBS/ FREELANCE MARKETS
For posting cyber law or IS related jobs or assignments, please email details to firstname.lastname@example.org with subject line “Job”
CYBER LAW/IS EVENTS
For posting cyber law or IS event, please email details to mailto:email@example.com subject line “Events”
Advertise with Cyber Law Update!!!
For more details email to mailto:firstname.lastname@example.org with subject line “Advertise”