tag:blogger.com,1999:blog-31885754815628224222024-02-21T05:12:11.471+05:30Cyber Law UpdateIt is a research based blog covering global news related to cyber law and information security.Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.comBlogger22125tag:blogger.com,1999:blog-3188575481562822422.post-73101045512737589492010-04-15T11:44:00.002+05:302010-04-15T12:11:55.744+05:30Shri Umarshankar Sivasubramanian V/s ICICI Bank will change e-security followed the banking Industry in India<script type="text/javascript"><br />var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");<br />document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));<br /></script><p class="MsoNormal" style="text-align:justify"><span class="Apple-style-span" style=" ;font-size:13px;">On April 12, 2010, Shri Thiru PWC Davidar, IAS, the Adjudicating Officer and Secretary to Government Information Technology Department, Government of Tamil Nadu, has passed the landmark judgment in the first petition filed under the Information Technology Act, 2000 (Act) by Shri Umarshankar Sivasubramanian (Petitioner) against ICICI Bank.</span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;"><o:p> </o:p></span></span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;">ICICI Bank was directed to pay Rs. 12,85,000/-(also the IT Secretary) has passed an award for payment of Rs 12.85 lakhs to the Petitioner in this phishing case. The Adjudicating Officer concluded that ICICI has failed to establish the <b style="mso-bidi-font-weight:normal">due diligence</b> was exercised to prevent the convention of the nature of unauthorized access as laid out in section 43 of the Act.<span style="mso-spacerun:yes"> </span>It has further observed by the Adjudicating Officer that ICICI Bank has failed to put in place a foolproof Internet Banking system with adequate levels of authentication and validation which would have prevented the type of unauthorized access in the instant case (Phishing fraud case).<o:p></o:p></span></span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;"><span style="mso-spacerun:yes"> </span><o:p></o:p></span></span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;">Before this judgment, SBI Bank was using only one layer of security (Egg Layer Security) for online payment through their banking website <a href="http://www.sbi.co.in/">www.sbi.co.in</a> Simply, you have to login to your bank account online and you can make an e-payment. <o:p></o:p></span></span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;"><o:p> </o:p></span></span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;">But after this judgment, it has been changed. SBI Bank is now using more than one layer of security (Onion Layer Security) for online payment. Now, you are require to punch-in (using online key and not by your keyboard) a secured password sent onto your registered mobile for every online payment through their website. <o:p></o:p></span></span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;"><o:p> </o:p></span></span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;">I trust other bankers are following SBI bank practice. If not soon they should in order to minimize their financial risk. <o:p></o:p></span></span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;"><o:p> </o:p></span></span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;">Certainly, ICICI Bank has right to appeal against this order. But this judgment will make our country e-banking <span style="mso-spacerun:yes"> </span>pretty secured. <o:p></o:p></span></span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;"><o:p> </o:p></span></span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;">Wish you a pretty secured e-banking. <o:p></o:p></span></span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;"><o:p> </o:p></span></span></p> <p class="MsoNormal" style="text-align:justify"><span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;">Copy of judgment is available on </span></span><a href="http://www.naavi.org/cl_editorial_10/umashankar_judgement.pdf">http://www.naavi.org/cl_editorial_10/umashankar_judgement.pdf</a> It is uploaded by Shri Na Vijayashankar, Techno Legal Consultant, who was representing the Petitioner in the above case. <span class="apple-style-span"><span style="Georgia","serif";font-family:";font-size:10.0pt;color:black;"><o:p></o:p></span></span></p><script type="text/javascript"><br />var pageTracker = _gat._getTracker("UA-4887885-2");<br />pageTracker._trackPageview();<br /></script><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com3tag:blogger.com,1999:blog-3188575481562822422.post-4880459376828202582009-06-30T16:03:00.003+05:302009-09-04T14:59:20.496+05:30Al-Qaida plans cyber war against Britain: Top UK minister<script type="text/javascript"><br />var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");<br />document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));<br /></script><p class="MsoNormal"><span class="Apple-style-span" style="font-family:Arial;font-size:100%;"><span class="Apple-style-span" style="font-size:12px;"></span></span></p><span class="Apple-style-span" style="font-family:Arial;font-size:100%;"><p class="MsoNormal"><st1:city><st1:place><span class="apple-style-span"><span style="font-family:Arial;font-size:9.0pt;color:black;">LONDON</span></span></st1:place></st1:city><span class="apple-style-span"><span style=" ;font-family:Arial;font-size:9.0pt;color:black;">: </span></span><st1:country-region><st1:place><span class="apple-style-span"><span style=" ;font-family:Arial;font-size:9.0pt;color:black;">Britain</span></span></st1:place></st1:country-region><span class="apple-style-span"><span style=" ;font-family:Arial;font-size:9.0pt;color:black;"> faces growing threat from the al-Qaida, which is on track to launch a cyber-warfare campaign against the country, </span></span><st1:country-region><st1:place><span class="apple-style-span"><span style=" ;font-family:Arial;font-size:9.0pt;color:black;">UK</span></span></st1:place></st1:country-region><span class="apple-style-span"><span style=" ;font-family:Arial;font-size:9.0pt;color:black;">'s security <span class="apple-style-span"><span style=" ;font-family:Arial;font-size:9.0pt;color:black;">minister has warned.</span></span><span class="apple-converted-space"><span style=" ;font-family:Arial;font-size:9.0pt;color:black;"> </span></span></span></span></p><p class="MsoNormal"><span style=" ;font-family:Arial;font-size:9.0pt;color:black;"><span class="apple-style-span">Lord West warned that al-Qaida is aiming to use the internet to launch a cyber-warfare campaign against </span></span><st1:country-region><st1:place><span class="apple-style-span"><span style=" ;font-family:Arial;font-size:9.0pt;color:black;">Britain</span></span></st1:place></st1:country-region><span class="apple-style-span"><span style=" ;font-family:Arial;font-size:9.0pt;color:black;">.</span></span><span class="apple-converted-space"><span style="font-family:Arial;font-size:9.0pt;color:black;"> </span></span><span style="font-family:Arial;font-size:9.0pt;color:black;"><br /><br /><span class="apple-style-span">"We know terrorists use the internet for radicalisation and things like that at the moment, but there is a fear they will move down that path (of cyber attacks)," he was quoted as saying by the Daily Telegraph newspaper.</span><span class="apple-converted-space"> </span><br /><br /></span><st1:country-region><st1:place><span class="apple-style-span"><span style="font-family:Arial;font-size:9.0pt;color:black;">Britain</span></span></st1:place></st1:country-region><span class="apple-style-span"><span style=" ;font-family:Arial;font-size:9.0pt;color:black;">'s security minister issued the warning as he published the government's new</span></span><span class="apple-converted-space"><span style="font-family:Arial;font-size:9.0pt;color:black;"> </span></span><span class="apple-style-span"><span style=" ;font-family:Arial;font-size:9.0pt;color:black;"><a href="http://timesofindia.indiatimes.com/World/UK/Al-Qaida-plans-cyber-war-against-Britain-Top-UK-minister/articleshow/4702632.cms##" target="undefined" id="KonaLink0" style="cursor:pointer;border-top-color:transparent !important; border-right-color:transparent !important;border-bottom-color:transparent !important; border-left-color:transparent !important;background-repeat:initial !important; background-attachment:initial !important;-webkit-background-clip: initial !important; -webkit-background-origin: initial !important;bottom: 0px;background-position: initial initial !important;right:0px"><span class="klink"><span style="text-decoration: none;text-underline:none"><span style="border-top-color:initial !important; border-left-color:initial !important;border-right-color:initial !important; border-bottom-background-repeat:initial;background-attachment: initial;-webkit-background-clip: initial;-webkit-background-origin: initial; background-position:initial initial;float:nonecolor:initial;">cyber</span></span><span class="apple-converted-space"><span style="text-decoration:none; text-underline:nonecolor:windowtext;"> </span></span></span><span class="klink"><span style="text-decoration:none;text-underline:none"><span style="border-top-color: initial !important;border-left-color:initial !important;border-right-color: initial !important;border-bottom-background-repeat:initial; background-attachment:initial;-webkit-background-clip: initial;-webkit-background-origin: initial; background-position:initial initial;float:nonecolor:initial;">security</span></span></span></a> strategy to combat the cyber-warfare threats.</span></span><span class="apple-converted-space"><span style=" ;font-family:Arial;font-size:9.0pt;color:black;"> </span></span><span style=" ;font-family:Arial;font-size:9.0pt;color:black;"><br /></span><span class="Apple-style-span" style="font-size:7;"><span class="Apple-style-span" style="font-size: 48px;"><br /></span></span></p> <p class="MsoNormal"><span class="apple-converted-space"><span style="font-family:Arial;font-size:9.0pt;color:black;"><o:p> </o:p></span></span></p> <p class="MsoNormal"><span class="apple-converted-space"><span style="font-family:Arial;font-size:9.0pt;color:black;">Published in <a href="http://timesofindia.indiatimes.com/World/UK/Al-Qaida-plans-cyber-war-against-Britain-Top-UK-minister/articleshow/4702632.cms">Times of India</a></span></span><o:p></o:p></p></span><p></p><script type="text/javascript"><br />var pageTracker = _gat._getTracker("UA-4887885-2");<br />pageTracker._trackPageview();<br /></script><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com2tag:blogger.com,1999:blog-3188575481562822422.post-27871201500706610822009-06-30T15:59:00.002+05:302009-09-04T15:01:37.281+05:30IT industry backs cyber-security strategy<script type="text/javascript"><br />var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");<br />document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));<br /></script><p class="MsoNormal"><span class="Apple-style-span" style=" ;font-family:Arial;font-size:11px;">By James Boxell and Jeremy Lemer</span></p> <p style="margin-top:0in;margin-right:0in;margin-bottom:15.6pt;margin-left: 0in"><span style="font-family:Arial;font-size:10.0pt;color:black;"><o:p> </o:p></span></p> <p style="margin-top:0in;margin-right:0in;margin-bottom:15.6pt;margin-left: 0in"><span style="font-family:Arial;font-size:10.0pt;color:black;">The IT industry welcomed the </span><st1:country-region><st1:place><span style="font-family:Arial;font-size:10.0pt;color:black;">UK</span></st1:place></st1:country-region><span style="font-family:Arial;font-size:10.0pt;color:black;">’s first<span class="apple-converted-space"> </span><a href="http://www.ft.com/cms/s/7b0ef50c-61ba-11de-9e03-00144feabdc0.html" target="_blank"><b><span style="text-decoration:none;text-underline: nonecolor:#003399;">cyber-security strategy<span class="apple-converted-space"> </span></span></b></a>as providing much-needed clarity about who companies should talk to in government about investment in research and development.<o:p></o:p></span></p> <p style="margin-top:0in;margin-right:0in;margin-bottom:15.6pt;margin-left: 0in"><span style="font-family:Arial;font-size:10.0pt;color:black;">However, there was disappointment at defence and security companies that the broader national security strategy, also published on Thursday, did not promise similar engagement in other critical areas of homeland security, such as counter-terror and protecting critical infrastructure.<o:p></o:p></span></p> <p style="margin-top:0in;margin-right:0in;margin-bottom:15.6pt;margin-left: 0in"><span class="Apple-style-span" style="font-family:Arial;font-size:7;"><span class="Apple-style-span" style="font-size: 48px;"><br /></span></span></p> <p class="MsoNormal">Published in <a href="http://www.ft.com/cms/s/0/b544b600-61bd-11de-9e03-00144feabdc0.html?nclick_check=1">www.ft.com</a></p> <p class="MsoNormal"><o:p> </o:p></p> <p class="MsoNormal"><o:p> </o:p></p><script type="text/javascript"><br />var pageTracker = _gat._getTracker("UA-4887885-2");<br />pageTracker._trackPageview();<br /></script><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com2tag:blogger.com,1999:blog-3188575481562822422.post-71414171067271299172009-06-30T15:52:00.001+05:302009-06-30T15:55:54.706+05:30Cyber Cold War: U.S. Vs. Russia<script type="text/javascript"><br />var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");<br />document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));<br /></script><h1 style="line-height:19.5pt"><span class="Apple-style-span" style=" font-weight: normal; line-height: 20px; font-size:16px;"><st1:date year="2009" day="28" month="6"><span style="Trebuchet MS";font-family:";font-size:11.5pt;color:black;">June 28, 2009</span></st1:date><span style="Trebuchet MS"; font-family:";font-size:11.5pt;color:black;"> - Eric Chabrow</span></span></h1> <p class="MsoNormal" style="line-height:12.0pt"><span class="apple-style-span"><span style="font-family:Verdana;font-size:9.0pt;"><o:p> <span class="Apple-style-span" style=" ;font-family:Georgia;font-size:16px;">A new Cold War, of sorts, is emerging in cyberspace between the <st1:country-region><st1:place><span style="font-family:Verdana;font-size:9.0pt;color:black;">United States</span></st1:place></st1:country-region><span style="font-family:Verdana;font-size:9.0pt;color:black;"> and </span><st1:country-region><st1:place><span style="font-family:Verdana;font-size:9.0pt;color:black;">Russia</span></st1:place></st1:country-region><span style="font-family:Verdana;font-size:9.0pt;color:black;"> over the best way to respond to the mounting assaults on information systems and the Internet.<span class="apple-converted-space"> </span></span></span></o:p></span></span></p><span style="float:left"> <div align="center"> <table class="MsoNormalTable" border="0" cellspacing="0" cellpadding="0" style="mso-cellspacing:0in;mso-padding-alt:0in 0in 0in 0in"> <tbody><tr style="mso-yfti-irow:0;mso-yfti-lastrow:yes"> <td valign="top" style="padding:0in 6.0pt 0in 0in"> <p class="MsoNormal" align="right" style="text-align:right;line-height:12.0pt"><span class="Apple-style-span" style="font-family:Verdana;font-size:100%;"><span class="Apple-style-span" style="font-size:12px;"><br /></span></span></p> </td> <td valign="top" style="padding:0in 0in 0in 0in"> <h2 style="line-height:15.0pt"><span style="font-family:Verdana;font-size:13.5pt;color:#990000;">Whether the American or Russian approach prevails ... major governments are reaching a point of no return in heading off a cyberwar arms<span class="apple-converted-space"> </span><nobr>race. <!--[if gte vml 1]><v:shape id="_x0000_i1026" type="#_x0000_t75" alt="" style="'width:28.5pt;height:24pt'"> <v:imagedata src="file:///C:\DOCUME~1\user1\LOCALS~1\Temp\msohtml1\01\clip_image002.gif" href="http://blogs.govinfosecurity.com/images/icon-pullquote-right.png"> </v:shape><![endif]--><img width="38" height="32" src="file:///C:/DOCUME~1/user1/LOCALS~1/Temp/msohtml1/01/clip_image002.gif" style="border-bottom-style:none;border-left-style:none;border-right-style: none;border-top-style:none" border="0" align="top" shapes="_x0000_i1026" /><o:p></o:p></nobr></span></h2><nobr> </nobr></td> </tr> </tbody></table> </div> <p class="MsoNormal" style="line-height:15.0pt"><span style=" Trebuchet MS";font-family:";font-size:11.5pt;color:black;">Though both nations' governments recognize the mayhem virtual assaults pose, they are at odds on how the international community should ban together to limit cyber attacks, according to an<span class="apple-converted-space"> </span><b><a href="http://www.nytimes.com/2009/06/28/world/28cyber.html"><span style="font-weight:normal;text-decoration:none;text-underline: nonecolor:#1A559B;">article</span></a></b><span class="apple-converted-space"> </span>Sunday in<span class="apple-converted-space"> </span><i>The New York Times</i>:<o:p></o:p></span></p> <p class="MsoNormal" style="line-height:15.0pt"><st1:country-region><st1:place><span style="Trebuchet MS";font-family:";font-size:11.5pt;color:black;">Russia</span></st1:place></st1:country-region><span style="Trebuchet MS";font-family:";font-size:11.5pt;color:black;"> favors an international treaty along the lines of those negotiated for chemical weapons and has pushed for that approach at a series of meetings this year and in public statements by a high-ranking official.<o:p></o:p></span></p> <p style="margin-top:11.25pt;line-height:12.0pt"><span style=" ;font-family:Verdana;font-size:9.0pt;color:black;">The </span><st1:country-region><st1:place><span style="font-family:Verdana;font-size:9.0pt;color:black;">United States</span></st1:place></st1:country-region><span style="font-family:Verdana;font-size:9.0pt;color:black;"> argues that a treaty is unnecessary. It instead advocates improved cooperation among international law enforcement groups. If these groups cooperate to make cyberspace more secure against criminal intrusions, their work will also make cyberspace more secure against military campaigns, American officials say.<o:p></o:p></span></p> <p style="margin-top:11.25pt;line-height:12.0pt"><span style=" ;font-family:Verdana;font-size:9.0pt;color:black;">Other points the article makes:<o:p></o:p></span></p> <p class="MsoNormal" style="text-indent:7.5pt;line-height:15.0pt"><span style="Trebuchet MS";font-family:";font-size:11.5pt;color:black;">Russia would ban a country from secretly embedding malicious codes or circuitry that could be later activated from afar in the event of war, apply humanitarian laws banning attacks on noncombatants and a ban on deception in operations in cyberspace - an attempt to deal with the challenge of anonymous attacks, and call for broader international government oversight of the Internet.<o:p></o:p></span></p> <p class="MsoNormal" style="text-indent:7.5pt;line-height:15.0pt"><span style="Trebuchet MS";font-family:";font-size:11.5pt;color:black;">The </span><st1:country-region><st1:place><span style="Trebuchet MS";font-family:";font-size:11.5pt;color:black;">U.S.</span></st1:place></st1:country-region><span style="Trebuchet MS";font-family:";font-size:11.5pt;color:black;"> would resist agreements to allow governments to censor the Internet, saying they would provide cover for totalitarian regimes. American officials worry that a treaty would be ineffective because it can be almost impossible to determine if an Internet attack originated from a government, a hacker loyal to that government, or a rogue acting independently.<o:p></o:p></span></p> <p style="margin-top:11.25pt;line-height:12.0pt"><span style=" ;font-family:Verdana;font-size:9.0pt;color:black;">The article concludes:<o:p></o:p></span></p> <p style="margin-top:11.25pt;line-height:12.0pt"><span style=" ;font-family:Verdana;font-size:9.0pt;color:black;">"Whether the American or Russian approach prevails ... major governments are reaching a point of no return in heading off a cyberwar arms race."<o:p></o:p></span></p> <p style="margin-top:11.25pt;line-height:12.0pt"><span style=" ;font-family:Verdana;font-size:9.0pt;color:black;"><o:p> </o:p></span></p> <p style="margin-top:11.25pt;line-height:12.0pt"><span style=" ;font-family:Verdana;font-size:9.0pt;color:black;">Published in <a href="http://blogs.govinfosecurity.com/posts.php?postID=227">blogs.govinfosecurity.com</a><o:p></o:p></span></p> <span class="Apple-style-span" style="font-family:'Times New Roman';"><br /></span></span><script type="text/javascript"><br />var pageTracker = _gat._getTracker("UA-4887885-2");<br />pageTracker._trackPageview();<br /></script><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com0tag:blogger.com,1999:blog-3188575481562822422.post-14444412573138691212009-06-23T10:40:00.001+05:302009-06-23T10:41:56.222+05:30Update on Defamtion suit filed against Google in Bombay High Court, IndiaGoogle India Faces Defamation Suit<br /><br />19-08-2008<br />Bombay High Court has ordered Google to disclose the identity of a blogger who allegedly had criticized a Mumbai based construction company. The judgment has come in pursuance of a suit filed by Mumbai-based Gremach Infrastructure Equipments & Projects Ltd. Appellant in the plea had demanded for Google’s discloser of the name of the person who had criticized them using Google's blogging service.<br /><br />Now, if Google does not disclose the name, it could face the charge of defamation. Incidentally, blogger.com offers a facility to a blogger to blog without disclosing real identity. And, in the given case the blogger had used the name ‘Toxic Writer’ and had criticized the said company. Now, the Bombay High Court has asked Google to present the blog written on February 26.<br /><br />The court observed that there is merit in the contention, and on the basis of the article put up by the defendant on the blog site defamation is apparent. The court further ordered to defendant to reveal the identity of the blogger within four weeks of the order. However, Google India has not yet revealed the name of the concerned blogger.<br /><br />Published in <a href="http://www.india-server.com/news/google-india-faces-defamation-suit-3084.html">www.india-server.com</a><br /><br /><br />Google India says it has no control over blog content<br />23 Jun 2009<br /><br />MUMBAI: Google India said on Monday (22 Jun 2009) that it will not be able to control the publication of content on its blogging website. The company has moved the Bombay High Court over an order restraining the website from allowing the publication of defamatory blogs.<br /><br /><br />Google India’s lawyer Srikant Doijode said that it had no control over the blogging site and the same was managed by Google Inc, USA. Even if there was an order restraining such blogs, it could not do anything, Google India submitted in court.<br /><br />“The blogger service is provided by Google Inc. We (Google India) are not a party to the agreement between Google Inc and those who use the blog. We have no liability or responsibility for the content of the blog,” the company argued.<br /><br />Earlier, city-based cardiologist Dr Ashwin Mehta had approached the court after finding that over 20 blogs on the website were defaming him.<br /><br />A single judge of the high court had ordered Google to remove those blogs and prevent such incidents in the future.<br /><br />“Google only provides a platform,” argued Google India’s counsel, adding that on account of the earlier order, it (Google) will be held in contempt if there was any fresh offensive blog about Dr Mehta. Mr Doijode pointed out that if the content was defamatory and the court wanted its removal from the website, the same could be done.<br /><br />Chief Justice Swatanter Kumar and justice SC Dharmadhikari have posted the case for final hearing on July 7.<br /><br /><a href="http://economictimes.indiatimes.com/Infotech/Internet-/Google-India-says-it-has-no-control-over-blog-content/articleshow/4689601.cms">Published in Economic Times</a><br /><script type="text/javascript"><br />var pageTracker = _gat._getTracker("UA-4887885-2");<br />pageTracker._trackPageview();<br /></script><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com1tag:blogger.com,1999:blog-3188575481562822422.post-7539684795091690942009-03-11T19:03:00.002+05:302009-03-11T19:08:12.951+05:30Cyber Law Update February 2009 - Issue no. 2~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /><strong>CYBER LAW NEWS
<br /></strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />
<br /><strong>Russia engaged in cyber war with neighboring countries
<br /></strong>
<br />This January marked “the third successful cyberattack against a country” — when suspected Russian attackers distributed a denial of service attack that overwhelmed three of the four Internet service providers in Kyrgyzstan, disrupting Internet access, reports DefenseTech. <a href="http://blogs.zdnet.com/gadgetreviews/?p=1110">Published in Blogs.zdnet.com</a>
<br />
<br /><strong>Chinese Hackers Attack U.S. Computers, Thompson Says
<br /></strong>
<br />Chinese government and freelance hackers are the primary culprits behind as many as several hundred daily attacks against U.S. government, electric-utility and financial computer networks, a senior congressman said.
<br />
<br />“Sophisticated hackers could really wreak havoc on our financial systems if they were successful,” House Homeland Security Committee Chairman Bennie Thompson said in an interview. The threat is “primarily from China.”
<br />
<br /><em><strong>China’s Denial
<br /></strong></em>
<br />Wang Baodong, a spokesman for the Chinese Embassy in the U.S., denied that the Chinese government was attacking U.S. computer systems. <a href="http://www.bloomberg.com/apps/news?pid=20601087&sid=aP7TPl_IQwFQ&refer=home">Published in Bloomberg</a>
<br />
<br /><strong>Cyber-crime cases hit record high in Japan in 2008
<br /></strong>
<br />The police across Japan uncovered 6,321 cases of Internet-related or cyber crime in 2008, up 15.5% from the previous year and the highest number since comparable data became available in 2000, a National Police Agency survey showed Thursday. The figure represented a threefold jump from 2,081 cases recorded in 2004. <a href="http://www.japantoday.com/category/crime/view/cyber-crime-cases-hit-record-high-in-japan-in-2008">Published in Japan Today</a>
<br />
<br /><strong>Cyber terrorists learn how to take advantage of cyberspace
<br /></strong>
<br />The U.S. government and armed forces need to develop the knowledge, skills and attributes required for cyber-strategic leaders. And that next generation of leaders needs to understand the cyber environment.
<br />
<br />Beginning in 1988 with the infamous "Morris Worm" attack, cybersecurity has grown in importance along with the degree of reliability the United States and other nations have placed on the cyber domain. <a href="http://www.upi.com/Security_Industry/2009/02/23/Cyber_terrorists_learn_how_to_take_advantage_of_cyberspace/UPI-72261235423923/">Published in UPI</a>
<br />
<br /><strong>Obama orders review of cyber security
<br /></strong>
<br />WASHINGTON (AP) — President Barack Obama on Monday ordered a 60-day review of the nation's cybersecurity to examine how federal agencies use technology to protect secrets and data. <a href="http://www.google.com/hostednews/ap/article/ALeqM5glOgXmCdE_7a3TXEvOK1CIiJIJDwD968CGTO0">Published in Google</a>
<br />
<br /><strong>Nigeria: That Delay on Cyber Crime Law is Dangerous
<br /></strong>
<br />Internet-based attacks and crimes are increasing in Nigeria as 'greedy' criminals continue to steal data from businesses and individuals.
<br />
<br />The sad story however is government's attitude to curb the menace. IT World's Zakariyya Adaramola, wrote on the implications of the delay to act fast on the criminals. <a href="http://allafrica.com/stories/200902231107.html">Published in All Africa</a>
<br />
<br /><strong>IBM Report: Threat Scores Should Give Weight to the Economics of Cyber-crime
<br /></strong>
<br />With the number of Web-based threats and vulnerabilities growing, IBM X-Force is recommending that the security industry rethink how it ranks vulnerability threats--how easily an attack can be monetized and to what degree should be components of vulnerability scoring.
<br />
<br />IBM’s X-Force is pushing for a reprioritization of security threats. <a href="http://www.eweek.com/c/a/Security/IBM-Report-Threat-Scores-Should-Give-Weight-to-the-Economics-of-Cybercrime/">Published in eWeek</a>
<br />
<br /><strong>Data Breaches Costing Customers, Not Just Money
<br /></strong>
<br />A study by the Ponemon Institute found the average cost of data breaches - from detection to notification to lost business - is rising. The No. 1 cost to companies is lost business, which now accounts for 69 percent of total costs.
<br />
<br />
<br />Data breaches are costly, and they are not getting any cheaper – particularly breaches due to third parties. <a href="http://www.eweek.com/c/a/Security/Data-Breaches-Costing-Customers-Not-Just-Money/">Published in eWeek</a>
<br />
<br /><strong>Browsing child porn will land you in jail
<br /></strong>
<br />The newly passed Information Technology Bill is set to make it illegal to not only create and transmit child pornography in any electronic form, but even to browse it. The punishment for a first offence of publishing, creating, exchanging, downloading or browsing any electronic depiction of children in "obscene or indecent or sexually explicit manner" can attract five years in jail and a fine of Rs 10 lakh. <a href="http://timesofindia.indiatimes.com/India/Browsing-child-porn-will-land-you-in-jail/articleshow/4134097.cms">Published in Times of India</a>
<br />
<br /><strong>Cyber Crime can Kill </strong>
<br />
<br />"It's dangerous in 'Cyberville,'" Banks said.Peter Banks, 17 year veteran of the National Center for Missing and Exploited Children, was a presenter at DMACC's Cyber Crime Awareness Conference last Saturday. Banks said that "Cyberville," as he calls it is a place where anyone with malintent has access to 30 million sites where children are exploited. Banks said that there are 600,000 registered sex offenders in America. He said that the center receives about 2000 calls a week on suspicions of the usage of child pornography, the luring of children, and child exploitation. <a href="http://media.www.campuschronicle.net/media/storage/paper1001/news/2009/02/25/News/Cyber.Crime.Can.Kill-3645663.shtml">Published in Campus Chronicle</a>
<br />
<br /><strong>Cracking down on cyber crime tough for experts: IGP
<br /></strong>
<br />MANGALORE: "It is too technical! I bet half your police constables there did not understand a word of what you said", these words by a law degree student to M K Nagaraj, inspector general of police (Anti- Terrorist Cell) put the focus of a one-day workshop on cyber law for police personnel in its right perspective. Cracking down on cyber crime, Nagaraj admitted is sometimes difficult even for experts in this new area of white-collar crime. <a href="http://timesofindia.indiatimes.com/Mangalore/Cracking_down_on_cyber_crime_tough_for_experts_IGP/articleshow/4066450.cms">Published in Times of India</a>
<br />
<br /><strong>Don't Fall Victim To Cyber Crime
<br /></strong>
<br />Cyber crime is on the attack, and it can happen to anyone.
<br />
<br />That was the message at a day-long exercise addressing cyber-security. <a href="http://www.kfoxtv.com/news/18608921/detail.html">Published in Kfox TV</a>
<br />
<br /><strong>3 men charged with 'cyber flashing'
<br /></strong>
<br />DETROIT (AP) — Authorities say three Saginaw-area men have been arrested after exposing themselves online to Wayne County sheriff's deputies posing as teenage girls.
<br />
<br />Information from: The Saginaw News, http://www.mlive.com/saginaw and <a href="http://www.wsbt.com/news/regional/39292752.html">published in wsbt.com</a>
<br />
<br /><strong>Schools battle the bullies</strong>
<br /><strong>
<br /></strong>…."Cyber-bullying presents unique challenges to schools because once something is put out on the Internet, it has the power to become available to the entire school and more," said Martha Turner, a counselor at Robious Middle School. "Before the Internet, bullying took the form of gossip, verbal or physical harassment." <a href="http://www.timesdispatch.com/rtd/news/local/article/B4-BULL01_20090131-204840/194166/">Published in Times Dispatch</a>
<br />
<br />
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /></strong><strong>PRODUCTS AND SERVICES</strong>
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />
<br />
<br />iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.
<br />
<br />It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
<br />Salient Features of iPro:
<br /> New format of e-forms – as and when updated / revised
<br /> Efilling of Forms
<br /> Annual Return as per Schedule 5
<br /> All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
<br /> Minutes book with 500+ resolutions in-built plus user editing option
<br /> Compliance Certificate
<br /> Combined Company Registers
<br /> Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
<br /> Fixed Asset Registers & Reports
<br /> Charges and Notice
<br /> Certificate Printing
<br /> Director Details Entry
<br /> Attachment in PDF format.
<br />For more details of the above software email to <a href="mailto:digitialsigncert@gmail.com">mailto:digitialsigncert@gmail.com</a>
<br />
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />
<br />For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at <a href="mailto:digitialsigncert@gmail.com">digitialsigncert@gmail.com</a>
<br />
<br />
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />
<br />For posting your products and services, please email details to <a href="mailto:dipak00001@gmail.com">dipak00001@gmail.com</a> with subject line “Product”
<br />
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /><strong>JOBS/ FREELANCE MARKETS</strong>
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />
<br />Coming soon….
<br />
<br />For posting cyber law or IS related jobs or assignments, please email details to <a href="mailto:dipak00001@gmail.com">dipak00001@gmail.com</a> with subject line “Job”
<br />
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /><strong>CYBER LAW/IS EVENTS
<br /></strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />
<br />For posting cyber law or IS event, please email details to <a href="mailto:dipak@lawyer.com">mailto:dipak@lawyer.com</a>with subject line “Events”
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /><strong>BUSINESS STUFF</strong>
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />
<br />Advertise with Cyber Law Update!!!
<br />For more details email to <a href="mailto:dipak@lawyer.com">mailto:dipak@lawyer.com</a> with subject line “Advertise”
<br />
<br /><script type="text/javascript">
<br />var pageTracker = _gat._getTracker("UA-4887885-2");
<br />pageTracker._trackPageview();
<br /></script>
<br /><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com2tag:blogger.com,1999:blog-3188575481562822422.post-18949339526830727042009-01-20T11:04:00.002+05:302009-01-20T11:11:46.621+05:30Cyber Law Update January 2009 - Issue no. 1<strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />CYBER LAW NEWS
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />Cyber attacks are the greatest threat to the United States after nuclear war
<br /></strong>
<br />FBI exports stated cyber attacks created the greatest threat to the United States after nuclear war and weapons of mass destruction. US experts highlighted that the economy, where almost everything important is linked to or controlled by computers is especially under the risk of being hacked. <a href="http://ecommerce-journal.com/news/12285_cyber_attacks_are_the_greatest_threat_to_the_united_states_after_nuclear_war">Published in Ecommerce Journal</a>
<br />
<br /><strong>FBI calls for global cooperation on cyber crime</strong>
<br />
<br />The FBI has called for greater international coordination in anti-hacking laws at the first International Conference on Cyber Security. <a href="http://www.vnunet.com/vnunet/news/2234003/fbi-calls-global-cooperation">Published in VNUNet</a>
<br />
<br /><strong>Fordham/FBI Conference Draws Experts In Fight Against Cyber Crime
<br />
<br /></strong>Some 300 international experts on cyber security gathered at Fordham University Tuesday, Jan. 6 for a three-day conference on the emerging global threat of cyber crime and cyber terrorism.The conference, which attracted representatives from 37 nations, runs through Thursday and is sponsored jointly by the Federal Bureau of Investigation’s New York Division and Fordham’s Department of Computer and Information Sciences.“We live in a world of instant connectivity . . . where we have no geographic boundaries, are not limited by time zones nor foreign languages,” said John Tognino, chairman of Fordham’s Board of Trustees, who joined Joseph M. McShane, S.J., president of Fordham, in welcoming conference participants to the Lincoln Center campus. “It is also true that almost anyone today has the ability, despite increasingly sophisticated firewalls, to bring down an entire computer operation.”“How then, do we protect our nation, or local communities and even our very own identities?” <a href="http://www.fordham.edu/Campus_Resources/eNewsroom/topstories_1439.asp">Published in Fordham</a>
<br />
<br /><strong>Cyber attack has Pentagon worried</strong>
<br />
<br />Senior military leaders took the exceptional step of briefing President George W. Bush last week on a severe and widespread electronic attack on Defense Department computers that may have originated in Russia, posing unusual concern among commanders and potential implications for national security. <a href="http://archives.chicagotribune.com/2008/nov/30/nation/chi-cyberattack_bdnov30">Published in Chicago Tribune</a>
<br />
<br /><strong>Its not just war; its cyber war! Israel and Gaza engaged in cyber war
<br />
<br /></strong>News of cyber war fare is reported from the warzone! News bases sites, telecommunication etc are the initial targets on both sides. Israel and the Arab world are showing mastery of cyber war fare and hacking of enemy sites on the rise due to the recent escalation of tension.<a href="http://www.hackedinfo.com/2009/01/07/its-not-just-war-its-cyber-war-israel-and-gaza-engaged-cyber-war/">Published in Hacked Info</a>
<br />
<br /><strong>Iran cyber attacking Israel
<br /></strong>
<br />Iranian hackers have launched a massive campaign against Israeli web sites and have managed to bring many of them to a standstill. <a href="http://www.presstv.ir/detail.aspx?id=81408&sectionid=351020101">Published in Press IT</a>
<br />
<br /><strong>Kosovo, Serb Hackers Fight Cyber War</strong>
<br />
<br />A group of hackers from Kosovo defaced the website of Serbia’s ministry of energy on Thursday in a payback strike for a similar intervention on the website of Kosovo’s energy ministry by Serb hackers earlier this week.
<br />"United States of Albania" and “Don’t play if you don’t know the game”, were the messages displayed in red and black colours on the page of the <a href="http://www.mem.sr.gov.yu/">Serbian energy ministry</a>, hacked by the self-proclaimed Albanian and Kosova Hackers Group. "Oops!! you got owned , This is our revenge." <a href="http://www.balkaninsight.com/en/main/news/15905/">Publihsed in Balkanin Sight</a>
<br />
<br /><strong>New initiative in Omaha: Cyber crime put on notice</strong>
<br /><strong>
<br /></strong>From the outside, the central Omaha office building doesn't look as if it would house FBI agents in dark suits searching for cyber predators. But on the second floor, investigators are tracking down criminals who exploit children, scam adults and steal identities via computer.<a href="javascript:enlargePhoto(360378)"></a><a href="http://www.omaha.com/index.php?u_page=2798&u_sid=10533919">Published in Omaha</a>
<br />
<br /><strong>Cyber security vital to prevent corporate espionage</strong>
<br />
<br />"Business organisations need to induct integrated security technologies to safeguard their operations as hacking' for corporate espionage now constitutes a real threat," Naveen Agrawal, executive director for advisory services in KPMG said here on Saturday. <a href="http://timesofindia.indiatimes.com/Ahmedabad/Cyber_security_vital_to_prevent_corporate_espionage/articleshow/3932239.cms">Published in Times of India</a>
<br />
<br /><strong>Cyber hunters in China in for crash landing
<br /></strong>
<br />BEIJING, Jan 3 — The cyber hunters who roam China's online space could soon become the hunted themselves. The Chinese legislature is deliberating a new law ...<a href="http://www.themalaysianinsider.com/index.php/world/15152-cyber-hunters-in-china-in-for-crash-landing">Published in The Malaysian Insider</a>
<br />
<br /><strong>Cyber court to help net online criminals
<br /></strong>
<br />Malaysia may need a cyber court to deal with cyber crimes in view of the increasing number of such cases, says Energy, Water and Communications Minister Datuk Shaziman Abu Mansor.
<br />He said the ministry had submitted more than 30 cases to the Attorney-General’s Chambers in three years.
<br />“If in future we cannot cope any more, we may need to have a cyber court,” he told reporters after launching a community broadband centre in Kampung Merchang here yesterday.<a href="http://thestar.com.my/news/story.asp?file=/2009/1/6/courts/2949312&sec=courts">Published in the Star</a>
<br /></strong>
<br /><strong>Avoiding the Most Common Programming Errors
<br /></strong>
<br />These mistakes show that the bad guys aren't necessarily skilled as they are simply exploiting your errors.<a href="http://www.internetnews.com/dev-news/article.php/3795796/Top+25+Most+Dangerous+Programmer+Security+Errors.htm">Published in Internetnews</a>
<br />
<br /><strong>Spam e-mails pose many risks
<br /></strong>
<br />For many, receiving one special e-mail can brighten a bad day. But opening the wrong e-mail can ruin a day, or worse, a computer’s operating system.
<br />
<br />As spam e-mail gets more sophisticated, including spam posing as coming from familiar e-mail addresses, or even your own, it’s increasingly difficult for people to determine safe messages from detrimental ones.
<br /><a href="http://www.carrollcountytimes.com/articles/2009/01/12/news/local_news/newsstory4.txt">Published in Carroll Country Times</a>
<br />
<br /><strong>'Cyber stalker' denied bail
<br /></strong>
<br />A 30-year-old man asked a police officer posing as a child in an internet chat room to wear a miniskirt with no knickers when they met, a court in Perth has heard.<a href="http://www.smh.com.au/news/national/cyber-stalker-denied-bail/2009/01/02/1230681729609.html">Published in SMH</a>
<br />
<br /><strong>Hong Kong businessman guilty of spam to influence stocks
<br />
<br /></strong>A Hong Kong businessman has recently pleaded guilty for his part in dispatching tens of millions of spam messages to pump up the prices of Chinese stocks between 2004 and 2006. <a href="http://www.networkworld.com/news/2009/010709-hong-kong-businessman-guilty-of.html?hpg1=bn">Published in Network World</a>
<br />
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong>
<br /><strong>PRODUCTS AND SERVICES ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /></strong>
<br />Cyber Law College has been the pioneer in Cyber Law education in India. It provides various courses and trainings on Cyber Law for E-Commerce Professionals, Law Students, Business Management Students, Engineers, Company Secretaries and Chartered Accountants and Legal professionals who would like to specialize in Cyber Laws. For more details email to dipak@lawyer.com
<br />
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />
<br />iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.
<br />
<br />It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
<br />Salient Features of iPro:
<br /> New format of e-forms – as and when updated / revised
<br /> Efilling of Forms
<br /> Annual Return as per Schedule 5
<br /> All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
<br /> Minutes book with 500+ resolutions in-built plus user editing option
<br /> Compliance Certificate
<br /> Combined Company Registers
<br /> Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
<br /> Fixed Asset Registers & Reports
<br /> Charges and Notice
<br /> Certificate Printing
<br /> Director Details Entry
<br /> Attachment in PDF format.
<br />For more details of the above software email to <a href="mailto:digitialsigncert@gmail.com">mailto:digitialsigncert@gmail.com</a>
<br />
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />
<br />For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at <a href="mailto:digitialsigncert@gmail.com">digitialsigncert@gmail.com</a>
<br />
<br />
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />
<br />For posting your products and services, please email details to <a href="mailto:dipak00001@gmail.com">dipak00001@gmail.com</a> with subject line “Product”
<br />
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong>
<br /><strong>JOBS/ FREELANCE MARKETS</strong>
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /></strong>
<br />Coming soon….
<br />
<br />For posting cyber law or IS related jobs or assignments, please email details to <a href="mailto:dipak00001@gmail.com">dipak00001@gmail.com</a> with subject line “Job”
<br />
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong>
<br /><strong>CYBER LAW/IS EVENTS </strong>
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /></strong>
<br />For posting cyber law or IS event, please email details to <a href="mailto:dipak@lawyer.com">mailto:dipak@lawyer.com</a>with subject line “Events”
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong>
<br /><strong>BUSINESS STUFF</strong>
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /></strong>
<br />Advertise with Cyber Law Update!!!
<br />For more details email to <a href="mailto:dipak@lawyer.com">mailto:dipak@lawyer.com</a> with subject line “Advertise”
<br /><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com1tag:blogger.com,1999:blog-3188575481562822422.post-77178208323695147912008-11-09T14:55:00.001+05:302008-11-09T15:00:40.238+05:30Cyber Law Update October 2008 - Issue no. 11<strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />CYBER LAW NEWS
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /></strong>
<br /><strong>THE CYBER THREAT TODAY
<br /></strong>Major Attacks on the Rise
<br />
<br />Crooks and spies using the Internet to commit crimes against U.S. businesses and to attack government networks are getting more sophisticated, and the increasing number of such crimes not only impacts the economy but threatens national security. <a href="http://www.fbi.gov/page2/oct08/cyberthreat101708.html">Published in FBI</a>
<br />
<br /><strong>FBI warns of increased cyber crimes
<br /></strong>
<br />The FBI (Federal Bureau of Investigation) has warned that citizens and nations alike have increasingly become victim to cyber crime in the past year, costing tens of millions of dollars and threatening US security.
<br />According to a report in New Scientist, FBI assistant director Shawn Henry said that as many as two dozen countries have taken an aggressive interest in penetrating the networks of US companies and government agencies. <a href="http://www.thaindian.com/newsportal/entertainment/fbi-warns-of-increased-cyber-crimes_100108422.html">Published in ThaiIndia</a>
<br />
<br /><strong>Cyber Crime Rates on the Rise in the UK </strong>
<br /><strong>
<br /></strong>Britain had witnessed soaring cyber crime rates in 2007, reveals an online identity firm.
<br />
<br />The report has shown that cyber crime in the UK rose by more than 9 percent in 2007. <a href="http://www.medindia.net/news/Cyber-Crime-Rates-on-the-Rise-in-the-UK-43599-1.htm">Published in MedIndia</a>
<br />
<br /><strong>Stark warning over cyber attacks on UK businesses
<br /></strong>
<br /></strong>Sustained cyber espionage attacks are being waged on companies that play a key role in the U.K. national infrastructure, a U.K. cyber defense chief has warned.
<br />
<br />The computer systems of critical businesses in the United Kingdom, such as power companies and large financial institutions, are being repeatedly probed to steal information or uncover weaknesses that could take them down. <a href="http://www.zdnetasia.com/news/security/0,39044215,62047756,00.htm">Published in ZDnetAsia</a>
<br />
<br /><strong>Cyber Security and the “financial meltdown”
<br /></strong>
<br />“We are experiencing a financial meltdown due to a fundamental misunderstanding and mismanagement of modern financial systems, which is generating a crisis of confidence in our core institutions. Today, all our critical infrastructures are reliant on cyber systems that are also misunderstood and mismanaged. These vulnerabilities place both our financial and physical security in jeopardy unless we update the method we use to control our cyber systems,” said Larry Clinton, president of the Internet Security Alliance (ISA). <a href="http://talkradionews.com/2008/10/cyber-security-and-the-%E2%80%9Cfinancial-meltdown%E2%80%9D/">Published in TalkRadioNews</a>
<br />
<br /><strong>Cyber security threats grow in sophistication, subtlety
<br /></strong>
<br />The annual report from Georgia Tech Information Security Center identifies five evolving cyber security threats, and the news is not good.
<br />
<br />GTISC interviewed a range of industry security experts to explore the threats and the available countermeasures. The five are malware, botnets, cyber warfare, threats to VoIP and mobile devices, and the "evolving cyber crime economy."
<br />
<br />In all five areas, attackers are becoming increasingly sophisticated, increasingly subtle, and increasingly adept at exploiting new Web developments, such as the rise of social network sites. Industry and government need to become equally concerted and sophisticated to contain these threats if the Internet is to be a trusted communications medium. <a href="http://www.computerworld.com.au/index.php/id;802178965;fp;2;fpid;2">Published in ComputerWorld</a>
<br />
<br /><strong>IT security guide: Understanding cyber-risks means knowing what questions to ask
<br />New guide gives CFOs 50 questions about cyberthreats to ask various department heads
<br /></strong>
<br />A good place for senior executives to start in trying to understand their companies' financial exposure to cyberthreats is by getting an overall assessment — not just from IT, but also from business units and corporate operations such as the human resources, legal and public relations departments.
<br />
<br />That piece of advice is contained in an information guide that the <a title="American National Standards Institute" href="http://www.computerworld.com/action/inform.do?command=search&searchTerms=American+National+Standards+Institute">American National Standards Institute</a> (ANSI) and the Internet Security Alliance (ISA) jointly released today in an effort to help high-level execs prepare for the financial implications of possible cyberattacks. <a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9117546&intsrc=hm_list">Published in Computer World</a>
<br />
<br /><strong>To curb cyber crimes, software to be certified
<br /></strong>
<br />To curb the growing menace of cyber crimes in the country, Union Ministry of Communications and Information Technology will set up the first ever Indian accreditation facility for software in Kolkata. B J Srinath, senior director of Indian Computer Emergency Response Team under the IT ministry, said: “The accreditation facility will be the first-of-its-kind in India and will accredit the security aspects of software developed by companies.” <a href="http://www.expressindia.com/latest-news/to-curb-cyber-crimes-software-to-be-certified/375923/">Published in Indian Express</a>
<br />
<br /><strong>Corporates should gear up for cyber security audit: Debesh Das
<br /></strong>
<br />Corporate entities should gear up for cyber security audit by independent agencies in line with financial audit in order to rein in cyber crime.
<br />
<br />"We should never neglect the cyber security issue. This should be top priority. Corporates should brace themselves for cyber security audit in line with financial audit," West Bengal Information Technology Minister Debesh Das said today. <a href="http://economictimes.indiatimes.com/Infotech/ITeS/Corporates_should_gear_up_for_cyber_security_audit_Debesh_Das/articleshow/3612683.cms">Published in Economic Times</a>
<br />
<br /><strong>Computer Monitoring Software and Data Recovery Tools Provide Cyber Security
<br /></strong>
<br />Pandora (<a href="http://www.tmcnet.com/snapshots/snapshots.aspx?Company=Pandora">News</a> - <a href="http://www.tmcnet.com/enews/subs.aspx?k1=%22Pandora%22&k2=+%22Pandora+Radio%22">Alert</a>) Corp, a manufacturer of personal computer (PC) monitoring software and recovery tools, recently announced that data recovery tools and computer monitoring software will be two good resources for the cyber security awareness month.
<br />
<br />In order to remind PC owners about the importance of Internet protection, antivirus software, password and firewall strengths, October is celebrated as cyber security awareness month. This will help in reminding the PC owner about the active steps that need to be taken so as to prevent one from becoming a victim of phishing scams, cyber attacks and identity thefts. <a href="http://sip-trunking.tmcnet.com/topics/security/articles/43041-computer-monitoring-software-data-recovery-tools-provide-cyber.htm">Published in TMCnet</a>
<br />
<br /><strong>Report: Russian Hacker Forums Fueled Georgia Cyber Attacks
<br /></strong>
<br />An exhaustive inquiry into August's cyber attacks on the former Soviet bloc nation of Georgia finds no smoking gun in the hands of the Russian government. But experts say evidence suggests that Russian officials did little to discourage the online assault, which was coordinated through a Russian online forum that appeared to have been prepped with target lists and details about Georgian Web site vulnerabilities well before the two countries engaged in a brief but deadly ground, sea and air war. <a href="http://voices.washingtonpost.com/securityfix/2008/10/report_russian_hacker_forums_f.html?nav=rss_blog">Published in Washingtonpost</a>
<br />
<br /><strong>Teenage hacker admits Scientology cyber-attack
<br /></strong>
<br />A teenager hacker has admitted carrying out a cyber attack that crashed Church of Scientology websites as part of a campaign by a mysterious underground group, justice officials said Friday. <a href="http://afp.google.com/article/ALeqM5id8oJGeZ6UAxWY_Ql1ZNy5MTr2dQ">Published in AFP</a>
<br />
<br /><strong>Cyber Police Bust 'Fraudsters'
<br /></strong>An alleged internet fraud ring is busted as police shut down a website which apparently shared stolen credit card information.
<br />
<br />Cyber crime is on the rise as more people shop online
<br />Sixty people across the globe have been arrested in connection with the "Darkmarket" website, including Britons from Leicester, Manchester, Humberside, South Yorkshire and London. <a href="http://news.sky.com/skynews/Home/Technology/Online-Fraud-Ring-Shut-Down-By-Soca-Police-60-Identity-Thieves-Arrested/Article/200810315123000?lpos=Technology_First_Home_Article_Teaser_Region_2&lid=ARTICLE_15123000_Online_Fraud_Ring_Shut_Down_By_Soca_Police%25">Published in Sky News</a>
<br />
<br /><strong>Cyber crime flourishes in the absence of law </strong>
<br />
<br />Darakhshan Police are investigating a cyber crime, but interestingly without any technical expertise or experience. The case was lodged by a female complainant and pertained to obnoxious phone calls, SMS’s and emails received on her cell-phone as well as private and office email IDs. <a href="http://www.thenews.com.pk/print1.asp?id=142769">Published in TheNews.com.pk</a>
<br />
<br /><strong>Nigeria: Senate Considers Bill Against Cyber Crime
<br /></strong>
<br />The Senate yesterday referred a Bill for an Act to outlaw perpetration of financial crimes through such electronic devices as mobile phones, internet and the Automatic Teller Machines (ATM) to its Committee on Judiciary, Human Rights and Legal Matters. <a href="http://allafrica.com/stories/200810300861.html">Published in All Africa</a>
<br />
<br /><strong>Feds indict international cyber crook accused of $1.7m ATM spree
<br /></strong>
<br />Hack resume lists Pentagon, NASA, Hamas
<br />An international cyber criminal with a resume that includes breaking into computers maintained by NASA, the Pentagon, the Israeli parliament, and Hamas has been indicted in New York for conspiracy and fraud involving access devices. <a href="http://www.theregister.co.uk/2008/10/30/analyzer_hacker_indictment/">Publihsed in The Register</a>
<br />
<br /><strong>Spurned woman ‘kills’ cyber hubby </strong>
<br /><strong>
<br /></strong>A JAPANESE woman has been arrested for the cold- blooded murder of her husband – in cyberspace.
<br />The 43-year-old woman, identified as Mayumi Tomari, from the Miyazaki prefecture in southern Japan, was outraged that her virtual husband divorced her character in an online game, Maple Story. <a href="http://www.dispatch.co.za/article.aspx?id=263890">Published in Dispatch</a>
<br />
<br /><strong>Cyber Thieves
<br /></strong>
<br /></strong>Thieves in today´s society aren´t coming in through the windows or doors anymore, now they keep their selves at a distance and are attacking their prey by using the technology that so many of us depend on in today´s society. The internet not only provides us with the comfort of performing our every day tasks but it has become a way of life. <a href="http://www.americanchronicle.com/articles/78738">Published in American Chronicle</a>
<br />
<br /><strong>WA schoolchildren tell of poisonous cyber bullying
<br /></strong>
<br />Edith Cowan University researchers found that 10 per cent of Year Nine and 10 students had been bullied using digital technology. <a href="http://www.news.com.au/perthnow/story/0,21598,24536721-2761,00.html">Published in News.com.au</a>
<br />
<br /><strong>Dutch cyber-bullies punished
<br /></strong>
<br />TWO TEENAGE toughs have been convicted of theft for stealing virtual goods in an online computer game world and punished by a Netherlands court.
<br />
<br />The Dutch yoofs, 14 and 15 years old, apparently bullied a 13-year-old boy into giving them a virtual amulet and a virtual mask within the online adventure game Runescape. <a href="http://www.theinquirer.net/gb/inquirer/news/2008/10/22/dutch-cyber-bullies-punished">Published in The Inquirer</a>
<br />
<br /><strong>Man caught viewing child porn in cyber cafe has sentence adjourned
<br /></strong>
<br />A POLISH man who was caught looking at child pornography in an internet cafe, leading to the discovery of more than 1,000 images in his home, has had his sentence adjourned for six months to allow further interaction with the Probation Services. <a href="http://www.irishtimes.com/newspaper/ireland/2008/1018/1224279406453.html">Published in Irish Times</a>
<br />
<br /><strong>Andover couple cuffed on cyber attack charges
<br /></strong>
<br />An Andover couple arrested while jogging today is accused of launching a cyber attack against their neighbors – from reportedly signing them up for a nudist group to filing false reports to child welfare workers about their kids, prosecutors charged today. <a href="http://news.bostonherald.com/news/regional/view.bg?articleid=1126200">Published in Boston Herald</a>
<br />
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong>
<br /><strong>PRODUCTS AND SERVICES </strong>
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /></strong>
<br />Cyber Law College has been the pioneer in Cyber Law education in India. It provides various courses and trainings on Cyber Law for E-Commerce Professionals, Law Students, Business Management Students, Engineers, Company Secretaries and Chartered Accountants and Legal professionals who would like to specialize in Cyber Laws. For more details email at cyberlawcollege@gmail.com
<br />
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />
<br />iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.
<br />
<br />It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
<br />Salient Features of iPro:
<br /> New format of e-forms – as and when updated / revised
<br /> Efilling of Forms
<br /> Annual Return as per Schedule 5
<br /> All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
<br /> Minutes book with 500+ resolutions in-built plus user editing option
<br /> Compliance Certificate
<br /> Combined Company Registers
<br /> Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
<br /> Fixed Asset Registers & Reports
<br /> Charges and Notice
<br /> Certificate Printing
<br /> Director Details Entry
<br /> Attachment in PDF format.
<br />For more details of the above software email at <a href="mailto:digitialsigncert@gmail.com">mailto:digitialsigncert@gmail.com</a>
<br />
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />
<br />For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at <a href="mailto:digitialsigncert@gmail.com">digitialsigncert@gmail.com</a>
<br />
<br />
<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br />
<br />For posting your products and services, please email details at <a href="mailto:dipak00001@gmail.com">dipak00001@gmail.com</a> with subject line “Product”
<br />
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong>
<br /><strong>JOBS/ FREELANCE MARKETS</strong>
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /></strong>
<br />Coming soon….
<br />
<br />For posting cyber law or IS related jobs or assignments, please email details at <a href="mailto:dipak00001@gmail.com">dipak00001@gmail.com</a> with subject line “Job”
<br />
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong>
<br /><strong>CYBER LAW/IS EVENTS </strong>
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /></strong>
<br />International Conference on Cyber Security 29-30 Nov 2008, New Delhi, India
<br />To address & debate Internet Security issues the World Council for Corporate Governance of UK (WCFCG) together with its associate the International Academy of Law, India (IAL), and in partnership with Cyber Law College are organizing an International Conference on Cyber Security in New Delhi on 29-30 Nov, 2008. Its theme is “Legislation, Monitoring & Enforcement of Cyber Laws”.
<br />Law makers, Governmental policy makers, Legislators, Business leaders, IT experts, eminent jurists, enforcement organizations, academics, bankers & reputation agents are expected to participate. The conference aims to tap the rich tapestry of global experience to enrich thinking on cyber laws, internet security and governance issues for public good. For Participation details, visit <a href="http://www.wcfcg.net/">http://www.wcfcg.net/</a> or contact <a href="mailto:naavi@vsnl.com">naavi@vsnl.com</a>. (source: naavi.com)
<br />For posting cyber law or IS event, please email details at <a href="mailto:dipak@lawyer.com">mailto:dipak@lawyer.com</a>with subject line “Events”
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong>
<br /><strong>BUSINESS STUFF</strong>
<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<br /></strong>
<br />Advertise with Cyber Law Update!!!
<br />For more details email at <a href="mailto:dipak@lawyer.com">mailto:dipak@lawyer.com</a> with subject line “Advertise”
<br />
<br /><script type="text/javascript">
<br />var pageTracker = _gat._getTracker("UA-4887885-2");
<br />pageTracker._trackPageview();
<br /></script><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com3tag:blogger.com,1999:blog-3188575481562822422.post-48059011082899775732008-10-17T14:11:00.004+05:302008-10-20T21:43:50.227+05:30Cyber Law Update October 2008 - Issue no. 10Cyber Law Update October 2008 - Issue no. 10<br /><br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br />CYBER LAW NEWS<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><strong>Estonia’s Cyber Security Policy<br /></strong><br />A year-and-a-half after the coordinated denial-of-service attacks against its government and commercial computer systems, Estonia has released a national cyber security strategy that includes details about the attacks and offers recommendations for preventing attacks in the future and for a global stance toward cyber security. The report identifies four “policy fronts”:<br />1) application of a graduated system of security measures in Estonia;<br />2) development of Estonia’s expertise in and high awareness of information security to the highest standard of excellence;<br />3) development of an appropriate regulatory and legal framework to support the secure and seamless operability of information systems;<br />4) and promoting international cooperation aimed at strengthening global cyber security.<br />If you are interested in reading the detail then Estonia’s cyber security policy can be found at the following URL<br /><a href="http://www.mod.gov.ee/static/sisu/files/Estonian_Cyber_Security_Strategy.pdf">http://www.mod.gov.ee/static/sisu/files/Estonian_Cyber_Security_Strategy.pdf</a><br /><a href="http://osrin.net/2008/10/estonias-cyber-security-policy/">Published in Oliver</a><br /><br /><strong>How to prevent cyber terrorism? </strong><br /><strong></strong><br />Polish law needs changes to accommodate prevention of new threats such as cyber terrorism, say MPs belonging to a parliamentary commission following their talks with heads of special services in Poland. <a href="http://www.polskieradio.pl/zagranica/news/artykul93227_How_to_prevent_cyber_terrorism.html">Published in Polish Radio</a><br /><br /><br /><strong>World Bank Under Cyber Siege in 'Unprecedented Crisis'<br /></strong><br />The World Bank Group's computer network — one of the largest repositories of sensitive data about the economies of every nation — has been raided repeatedly by outsiders for more than a year, FOX News has learned.<br /><br />It is still not known how much information was stolen. But sources inside the bank confirm that servers in the institution's highly-restricted treasury unit were deeply penetrated with spy software last April. Invaders also had full access to the rest of the bank's network for nearly a month in June and July.<br /><br />In total, at least six major intrusions — two of them using the same group of IP addresses originating from China — have been detected at the World Bank since the summer of 2007, with the most recent breach occurring just last month. <a href="http://www.foxnews.com/story/0,2933,435681,00.html">Published in FoxNews</a><br /><br /><strong>'Satyam banned from World Bank'<br /></strong><br /><br />NEW YORK: Software major Satyam Computer Services has reportedly been banned from doing any off-shore work with the World Bank after forensic experts and bank investigators discovered that spy software was covertly installed on workstations inside the bank's Washington headquarters, allegedly by one or more contractors from Satyam Computer Services.<br />According to a FOX News report, apart from Satyam, two IP intrusions have been reported from China, and there have been six intrusions in all.<br />Investigators say that the software, which operates through a method known as keystroke logging, enabled every character typed on a keyboard to be transmitted to a still-unknown location via the Internet. <a href="http://infotech.indiatimes.com/News/Satyam_banned_from_World_Bank/articleshow/3583701.cms">Published in Indiatimes</a><br /><br /><strong>Satyam refutes reports on World Bank bar<br /></strong><br /><br />Hyderabad, Oct. 11 Satyam Computer Services has refuted reports in the international media that World Bank has barred it from doing offshore work. The reports said the bank had taken this decision after noticing reported intrusions into systems. “The story has no validity,” a Satyam spokesperson said.<br /><br />Incidentally, a five-year contract between the bank and Satyam lapsed in September. The fourth largest IT services provider from India had bagged the contract in 2003 to implement Enterprise Resource Planning solution, extend document management and integrated messaging system.<br /><br />Quoting from a World Bank statement that was issued to the agencies that ran the story, the spokesperson said here on Saturday that the story was wrong and was riddled with falsehoods and errors. “The story cites misinformation from unattributed sources and leaked e-mails that are taken out of context,” the statement said. <a href="http://www.thehindubusinessline.com/2008/10/12/stories/2008101251290200.htm">Reported in Hindu</a><br /><br /><strong>Electoral Rolls in Delhi Hacked!<br /></strong><br /><br />It is reported that the Delhi Electoral rolls have been found to have been deliberately tampered with by the officials of an IT Company Webel Technology Limited. This would amount to Section 66 offence under ITA 2000 and the Company and its officials are in serious danger of being hauled up to the Courts and probably to the jails as well. Again this boils down to what "Due Diligence" the Company's top management had taken to ensure against any of its lower rank employees playing mischief. Reported in Naavi.org<br /><br /><strong>Men indicted over cyber attacks<br /></strong><br /><br />Two Europeans were indicted for allegedly launching internet attacks to shut down two retail websites in the US. <a href="http://ukpress.google.com/article/ALeqM5gv08ym99UvmiwtEdkn01k4TTSeOw">Published in the Press Association</a><br /><br /><strong>US patent office’s notice floors legal outsourcing<br /></strong><br />NEW DELHI: The US slowdown has kicked off a heated debate in the US legal circles. At the heart of debate is a recent notice by the United States Patent and Trademark Office (USPTO) barring companies who send information overseas regarding inventions and <a href="http://economictimes.indiatimes.com/News/International_Business/US_patent_offices_notice_floors_legal_outsourcing/articleshow/3575519.cms" target="_new">patents</a> without government clearance. While some believe offshoring is good as it cut costs for legal firms, lawyer groups in the US are against it. <a href="http://economictimes.indiatimes.com/News/International_Business/US_patent_offices_notice_floors_legal_outsourcing/articleshow/3575519.cms">Published in Economic Times</a><br /><br /><strong>Cyber Intelligence-led Security - Reshaping the Role of Today’s CIO<br /></strong><br />Today, an increasing number of CIOs are embracing a new paradigm in the way they approach enterprise security. Previously, a significant amount of security resources were focused on protecting the perimeter. Now, however, a new, more dynamic and proactive approach is emerging as traditional reactive measures are no longer sufficient. <a href="http://advice.cio.com/panos/cyber_intelligence_led_security_reshaping_the_role_of_today_s_cio">Published in CIO</a><br /><br /><br /><strong>Cyber threats on the rise, FBI official says<br /></strong><br />Malicious cyber activity has grown more prevalent and sophisticated during the past year and threats come from organized crime groups, terrorist organizations and foreign governments, according to a senior FBI official. <a href="http://www.fcw.com/online/news/154083-1.html">Published in FCW</a><br /><br /><strong>Straightening the Tangle<br /></strong><br /><br />The growing broadband adoption in India is encouraging, however, it has also opened a plethora of security concerns among enterprises<br /><br />As the call for high-speed Internet and broadband is making waves among enterprises, hackers and fraudsters are having a ball of a time finding exciting opportunities to access vital documents in bandwidth-intensive unprotected networks of organizations. The network, according to experts is no longer delineating a physical network perimeter, people using the system-employees, customers, and partners constitute the new boundaries. … Experts also believe that India's unsafe security environment could be costing its BPO industry an estimated $500 mn annually. <a href="http://voicendata.ciol.com/content/NetworkingPlus/108101001.asp">Published in VoiceNData</a><br /><br /><strong>Outsourced--And Out Of Control<br /></strong><br /><br />As the economy sinks and budgets are squeezed, outsourcing looks more and more like a thrifty necessity. But when it comes to the data security of those far-flung offices, businesses may find they get what they pay for.<br />A study released Tuesday, compiled from surveys of information technology managers and users in 10 countries, reveals an alarming gap between the information-security practices of developed countries and those of emerging markets like China, Brazil and, to a lesser degree, India. <a href="http://www.forbes.com/technology/2008/09/29/outsourcing-data-breaches-security-tech-cx_ag_0930outsource.html">Published in Forbes</a><br /><br /><strong>U.S. IT Security Better Than Rest of the World?<br /></strong><br /><br />While there are some problems with IT security in the U.S., Americans in general have better security behavior to prevent data loss than other parts of the world. That's a general finding in a new report sponsored by Cisco that asked 2,000 globally dispersed professionals about their views on behaviors that could lead to data leakage.<br />….So what are some of the better IT behaviors?<br />One of them is using corporate-owned assets to communicate with personal e-mail. In the U.S., 39 percent of respondents admitted to using their company owned computer for personal e-mail while in Germany the figure was 47 percent, India 58 percent and in China a whopping 61 percent. <a href="http://www.internetnews.com/security/article.php/3774716/US+IT+Security+Better+Than+Rest+of+the+World.htm">Published in Internet news.com</a><br /><br /><strong>Cyber Security Study: Many consumers less secure than they think<br /></strong><br /><br />In our latest report on staying safe in cyberspace, <a href="http://www.consumerreports.org/cro/electronics-computers/computers/internet-and-other-services/7-online-blunders/overview/7-online-blunders-ov.htm">7 online blunders</a>, the top mistake we warn about is assuming your <a href="http://www.consumerreports.org/cro/electronics-computers/computers/software/security-software/overview/security-software-ov.htm">security software</a> is protecting you.<br />Now, a <a href="http://staysafeonline.mediaroom.com/index.php?s=43&item=33">study</a> just released by the <a href="http://www.staysafeonline.org/">National Cyber Security Alliance</a>, underscores our advice by suggesting that many online consumers think their computers are more secure than they really are. <a href="http://blogs.consumerreports.org/electronics/2008/10/cyber-security.html">Published in Consumer Report Electronics</a><br /><br /><strong>Americans Still Somewhat Befuddled by Cyber Security<br /></strong><br /><br />Users continue not to install antivirus software, believe they have protections they don't.<br /><br />Every year there's a kickoff for a campaign on cyber-security awareness in the form of National Cyber Security Awareness Month. The campaign looks to better inform people on the hazards that may await them online. Each year, Symantec and the National Cyber Security Alliance perform some basic assessments of users' internet behaviors and each year they get a disappointing confirmation that many Americans still <a title="Study Shows Average User Is Pretty Stupid When It Comes to Popups" href="http://www.dailytech.com/Study+Shows+Average+User+Is+Pretty+Stupid+When+It+Comes+to+Popups/article13046.htm">just don't get some important concepts cyber security</a>. <a href="http://www.dailytech.com/Americans+Still+Somewhat+Befuddled+by+Cyber+Security/article13128.htm">Published in DailyTech</a><br /><br /><a name="end"></a><strong>Warning! You Might Be Fooled Into Clicking This Pop-Up<br /></strong><br /><br />Have you ever been clicking your way through cyberspace, when suddenly, a very important-looking window pops up? It usually looks like it’s part of Microsoft Windows, and it says something like, “Warning! Your computer is at risk! Click ‘OK’!” Do you click on it? Is your computer really at risk? Is Windows trying to tell you something?<br />By now, you’ve probably figured out where this is going: that pop-up is a scam, something known as “scareware.” <a href="http://privacycouncil.org/">Published in Privacy Council</a><br /><br />Uganda cyber laws going to Parliament<br />Uganda's draft electronic laws have been approved by Cabinet and are set to be debated before they are passed into law by Parliament.<br />The Ministry of ICT hopes to enact the draft laws -- the Computer Misuse Bill, Electronic Signatures Bill and Electronic Transactions Bill -- during this financial year, according to ICT Minister Ham Mukasa Mulira. <a href="http://www.networkworld.com/news/2008/100608-uganda-cyber-laws-going-to.html">Published in Network World</a><br /><br /><strong>Copyright (New Technologies) Amendment comes into force in New Zeeland</strong><br /><p><br />Associate Commerce Minister Judith Tizard has announced that recent amendments to copyright legislation will soon come into force. The amendments update New Zealand's copyright law to reflect current advances in digital technology.<br />"The Copyright (New Technologies) Amendment Act 2008 will ensure our copyright laws keep up to speed with the dynamic nature of digital technology," Judith Tizard said. <a href="http://feeds.beehive.govt.nz/release/copyright+new+technologies+amendment+comes+force">Reported in Behive.govt.nz</a><br /><br /><strong>Spies Launch 'Cyber-Behavior' Investigation<br /></strong><br />A while back, the Office of the Director of National Intelligence (ODNI) said it wanted to start reviewing wannabe spies' "<a href="http://blog.wired.com/defense/2008/06/do-you-trade-mu.html">cyber behavior</a>," before they handed the spooks security clearances. Suspect activities might include "social network usage," "compulsive internet use," "distribution of pirated materials," and "online contact with foreign nationals," the ODNI said. <a href="http://blog.wired.com/defense/2008/10/spies-launch-cy.html">Published in Wired News</a><br /></p><p><strong>Scrabulous makers score a mixed ruling<br /></strong></p><p>Rajat and Jayant Agarwalla, the Indian brothers who came up with the Scrabble-style word game for Facebook called Scrabulous, told fans that their country's courts ruled that their game did not violate Mattel Inc.'s copyrights.It did, however, consider the name Scrabulous a trademark violation and ordered the Agarwallas to stop using the word, the brothers said. <a href="http://www.latimes.com/technology/la-fi-techblog27-2008sep27,0,5973004.story">Published in LA Times</a><br /><br /><strong>Banks Team Up for Cyber Security Awareness Month to Help Canadians Avoid Online Threats From Social Networking and File Sharing Sites<br /></strong></p><p>The Internet has made it easier than ever to bank, shop, communicate with others and find information about almost anything at any time. But as Internet use among Canadians continues to rise, so too does the number of criminals who commit identity theft and fraud using information they've found online. <a href="http://www.marketwatch.com/news/story/banks-team-up-cyber-security/story.aspx?guid=%7b613F1467-2293-4D44-9CB4-866ACAE07E89%7d&dist=hppr">Published in Market Watch</a><br /><br /><strong>Corporate, Government and Academic Leaders Unite to Fight Cyber Crime, Identity Theft and other Identity Management Challenges</strong></p><strong><p><br /></strong></p>An unprecedented coalition of leading corporate, government and academic institutions today announced the formation of the Center for Applied Identity Management Research (CAIMR). CAIMR is focused on developing research and solutions for society's most daunting identity management challenges such as cyber crime, terrorism, financial crimes, identity theft and fraud, weapons of mass destruction, and narcotics and human trafficking. The Center is the first of its kind to bring cross-disciplinary experts in criminal justice, financial crime, biometrics, cyber crime and cyber defense, data protection, homeland security and national defense to address identity management challenges that impact individuals, public safety, commerce, government programs and national security. <a href="http://www.marketwatch.com/news/story/corporate-government-academic-leaders-unite/story.aspx?guid=%7b737DF9D0-EC35-478E-BEAC-73DFFD15A10D%7d&dist=hppr">Published in Market Watch</a><br /><p><strong>Cyber Crime Cell arrest one for extortion over web<br /></strong><br />Chandigarh, October 12 Cyber Crime Investigation Cell of the Chandigarh Police today arrested one Puja Negi, for involvement in an “extortion through the Web” racket. <a href="http://www.expressindia.com/latest-news/cyber-crime-cell-arrest-one-for-extortion-over-web/372659/">Published in Newsline</a><br /><br /><strong>IB to go hi-tech, get more manpower to fight terror<br /></strong></p><p>NEW DELHI: Intelligence Bureau — which has come under flak for its failure to keep tabs on tech savvy jihadis — is set for major revamp with the government recruiting 6,000 more spies to strengthen its existing cadre of nearly 25,000 personnel. The IB will also get modern gadgets to monitor cyber communication. <a href="http://timesofindia.indiatimes.com/India/IB_to_go_hi-tech_get_more_manpower_to_fight_terror/articleshow/3564039.cms">Published in Times of India </a><br /></p><p><strong>Fed Blotter: New Charges Filed Against Alleged Cyber Peeping Tom<br /></strong><br />Federal prosecutors are going after a Florida college student who allegedly installed spyware on a woman's laptop to covertly snap nude photos of her through her webcam.<br /><a href="http://blog.wired.com/27bstroke6/2008/10/fed-blotter-cha.html">Published in Wired News</a><br /><br /><strong>Compulsory registration for cyber cafes in MP town<br /></strong><br />In view of spiralling cyber crimes in the financial capital of Madhya Pradesh, it was made mandatory for the cyber cafe owners to register themselves at the Indore Police's web portal. <a href="http://www.centralchronicle.com/20081015/1510102.htm">Published in Central Chronicle</a><br /><br /><strong>Average privacy policy takes 10 minutes to read, research finds<br /></strong><br /><br />Website privacy policies take on average 10 minutes to read and sometimes run into thousands of words, researchers have found. While some are short, others would take over half an hour to read, researchers said.<br /><a href="http://www.out-law.com/page-9490">Published in out-law.com</a><br /><br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</p><p>PRODUCTS AND SERVICES </p><p>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><br /><strong>Cyber Law College</strong> has been the pioneer in Cyber Law education in India. It provides various <strong>courses and trainings on Cyber Law</strong> for E-Commerce Professionals, Law Students, Business Management Students, Engineers, Company Secretaries and Chartered Accountants and Legal professionals who would like to specialize in Cyber Laws. For more details email at cyberlawcollege@gmail.com<br /><br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><br /><strong>iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.</strong><br /><br />It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.<br />Salient Features of iPro:<br /> New format of e-forms – as and when updated / revised<br /> Efilling of Forms<br /> Annual Return as per Schedule 5<br /> All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.<br /> Minutes book with 500+ resolutions in-built plus user editing option<br /> Compliance Certificate<br /> Combined Company Registers<br /> Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares<br /> Fixed Asset Registers & Reports<br /> Charges and Notice<br /> Certificate Printing<br /> Director Details Entry<br /> Attachment in PDF format.<br />For more details of the above software email at <a href="mailto:digitialsigncert@gmail.com">digitalsigncert@gmail.com</a><br /><br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><br />For TCS Class 2 <strong>Digital Signature</strong> with Cryptographic FIPS Certified USB Token email at <a href="mailto:digitalsigncert@gmail.com">digitalsigncert@gmail.com</a><br /><br /><br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><br />For posting your products and services, please email details at <a href="mailto:dipak00001@gmail.com">dipak00001@gmail.com</a> with subject line “Product”<br /><br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</p><p>JOBS/ FREELANCE MARKETS</p><p>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><br />Coming soon….<br /><br />For posting cyber law or IS related jobs or assignments, please email details at <a href="mailto:dipak00001@gmail.com">dipak00001@gmail.com</a> with subject line “Job”<br /><br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</p><p>CYBER LAW/IS EVENTS </p><p>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><br />Coming soon….<br /><br />For posting cyber law or IS event, please email details at <a href="mailto:dipak@lawyer.com">mailto:dipak@lawyer.com</a>with subject line “Events”<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</p><p>BUSINESS STUFF</p><p>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><br />Advertise with Cyber Law Update!!!<br />For more details email at <a href="mailto:dipak@lawyer.com">mailto:dipak@lawyer.com</a> with subject line “Advertise”<br /></p><script type="text/javascript"><br />var pageTracker = _gat._getTracker("UA-4887885-2");<br />pageTracker._trackPageview();<br /></script><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com3tag:blogger.com,1999:blog-3188575481562822422.post-39468102160206840762008-09-29T18:41:00.007+05:302008-10-01T08:43:13.255+05:30Cyber Law Update September 2008 - Issue no. 9<p><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br />CYBER LAW NEWS<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong><br /><strong>Perils of wireless Internet<br /><br /></strong>Recent blasts expose the safety gaps in cyberspace and underscore the need for smart vigilance.<br /><br />R.K.Raghavan<br /><br />It is the same old story again. As in the case of a few past blasts, such as the series of UP explosions (November 2007) and Ahmedabad (August 2008), terrorists involved in the five explosions of Delhi on September 13 sent e-mails to the media just a few minutes before the bombs took off, warning the authorities of their action. There are, however, several unexplained issues here. <a href="http://www.thehindubusinessline.com/ew/2008/09/22/stories/2008092250050200.htm">Published in The Hindu Businessline</a><br /><br /><strong>Centre to issue guidelines to internet service providers (</strong><a href="http://www.hindu.com/thehindu/holnus/001200809161616.htm"><strong>Article published in Hindu</strong></a><strong>)<br /></strong><br /><strong>The Winds of Cyber War</strong></p><strong><p><br /></strong>The computer attacks Russia allegedly orchestrated against Georgia in August have raised the cyber warfare bar to a new threat level. The cyber assault that accompanied Russia's armed maneuver into its former territory of Georgia escalated to an international event.<br />The concept of hurting a nation's technological infrastructure as part of a wider conflict is not new. The extent to which the digital warfare was waged, however, clearly added to a growing concern that has already led U.S. officials to prepare for the next wave of computer warfare. <a href="http://www.technewsworld.com/story/The-Winds-of-Cyber-War-64494.html">Published in TechNewWorld</a><br /></p><p><strong>Homeland Security found to be unprepared for 'cyber' threats </strong></p><p>WASHINGTON--When politicians got together six years ago and decided to glue together a medley of federal agencies to create the U.S. Department of Homeland Security, one of the justifications was a better focus on cybersecurity.<br /><br />….Now, Homeland Security is weathering a deluge of criticism of its lackluster cybersecurity efforts on grounds that they have proven to be inefficient, bureaucratic, and not even able to do a decent job of monitoring federal computer networks. <a href="http://news.cnet.com/8301-13578_3-10043665-38.html">Published in CNET News</a><br /><br /><strong>Experts call for united global action against cyber attacks</strong> </p><p><br />The world has to unite against the growing menace of cyber terrorism, IT experts said Thursday, evoking a recent "cyber war" against Georgia as the latest example of the threat.<br />"The world has finally woken up and understood that cyber security needs a global approach and is a very serious matter," Estonian politician Mart Laar told a cyber security forum in the Estonian capital Tallinn. <a href="http://www.paktribune.com/news/index.php?id=205888">Published in Pak Tribune</a><br /><br /><strong>Cyber-crooks sting South Africa for A$26m<br /></strong><br />A cyber-crime syndicate is believed to have defrauded the South African government of more than £12.8m (A$26m) in a series of spyware frauds. <a href="http://securecomputing.net.au/News/113885,cybercrooks-sting-south-africa-for-a26m.aspx">Published in Secure Computing </a><br /><br /><strong>Cyber-Ark Highlights the Seriousness of Data Security</strong><br /><br />Security firm Cyber-Ark has slammed a data breach in the UK that has seen the personal details of 5,000 Ministry of Justice staff go missing, saying that the situation highlights the need for EU controls on data security. <a href="http://www.idm.net.au/story.asp?id=16181">Published in IDM</a><br /><br /><strong>Cyber attack launched on Shiite websites: Iran report</strong></p><strong><p><br /></strong>Sunni Muslim computer hackers have attacked hundreds of Shiite websites including Shia Islam's most popular site linked to the community's leader in Iraq, Iran's Fars news agency reported on Friday (19 September 2008). <a href="http://afp.google.com/article/ALeqM5jq0wM0OGcL03IyiouWqsF-GiAQCQ">Published in AFP</a><br /><br /><strong>Anti cyber crime measures are 'a threat to privacy'</strong></p><strong><p><br /></strong>The world's leading international telecommunications organisation thas been slammed by privacy advocates for trying to stem the number of DoS attacks by limiting the amount of anonymity on the web. <a href="http://www.computerworlduk.com/management/security/cybercrime/news/index.cfm?newsid=11002">Published in ComputerWorldUK</a></p><p><br /><strong>Cyber attacks cripple opposition Myanmar media<br /></strong></p><p>The Internet sites of three Myanmar opposition media groups in exile suffered widespread cyber attacks, the anniversary of last year's failed uprising against the Southeast Asia country's military dictatorship. <a href="http://www.rediffmail.com/cgi-bin/red.cgi?red=http%3A%2F%2Fnews%2Egoogle%2Ecom%2Fnews%3Fhl%3Den%26amp%3Bncl%3Dhttp%3A%2F%2Fwww%2Eetaiwannews%2Ecom%2Fetn%2Fnews%5Fcontent%2Ephp%253Fid%253D742784&isImage=0&BlockImage=0" target="_new"></a><a href="http://www.etaiwannews.com/etn/news_content.php?id=742784">Published in eTaiwan</a><br /><br /><strong>Cyber Attack Data Sharing Is Lacking, Congress Told </strong></p><p>U.S. intelligence agencies are unable to share information about foreign cyber attacks against companies for fear of jeopardizing intelligence-gathering sources and methods, cyber security expert Paul B. Kurtz told lawmakers yesterday. <a href="http://www.washingtonpost.com/wp-dyn/content/article/2008/09/18/AR2008091803730.html">Published in Washington Post</a><br /><br /><strong>The Generals Go Cyber?</strong></p><strong><p><br /></strong>Burma's military junta has so successfully suppressed the media that Internet sites based outside the country are one of the few remaining sources of reliable news for Burmese people. Now it appears not even those sites are safe. Shortly before yesterday's anniversary of the 1988 pro-democracy uprising and last year's Buddhist-monk-led Saffron Revolution, the Web sites of my newspaper, The Irrawaddy, and other Burmese news portals came under cyber attack. I am not alone in believing that the junta is behind the attack, just as it was behind the shutdown of Internet access in Burma during last year's uprising. <a href="http://www.rediffmail.com/cgi-bin/red.cgi?red=http%3A%2F%2Fnews%2Egoogle%2Ecom%2Fnews%3Fhl%3Den%26amp%3Bncl%3Dhttp%3A%2F%2Fonline%2Ewsj%2Ecom%2Farticle%2FSB122175981847653071%2Ehtml%253Fmod%253Dgooglenews%5Fwsj&isImage=0&BlockImage=0" target="_new"></a><a href="http://online.wsj.com/article/SB122175981847653071.html?mod=googlenews_wsj">Published in Wall Street Journal</a><br /><br /><strong>Hacker tool can watch you through webcam<br /></strong><br />Cover your webcams and unplug your microphones, because the latest freely-available hacker tools could use your own hardware against you without your knowledge.<br />Security specialist Prevx showed us some of the latest scary techniques being used to take unsuspecting web users' credit card details, passwords and personal information, as well as turn on your webcam and watch you. <a href="http://www.techradar.com/news/internet/hacker-tool-can-watch-you-through-webcam-468792">Published in TechRadar.com</a><br /><br /><strong>Cops identify cyber cafe from where email threat to Advani was sent</strong></p><strong><p><br /></strong>Police have claimed to have identified the cyber cafe from which the email, purportedly sent by Indian Mujahideen terrorists, to eliminate BJP leader L K Advani during his Shillong visit on September 29, was sent. <a href="http://timesofindia.indiatimes.com/India/Cops_identify_cyber_cafe_from_where_email_threat_to_Advani_was_sent/articleshow/3527221.cms">Published in Times of India</a></p><p><br /><strong>Teenage cyber terrorist sent to jail</strong></p><strong><p><br /></strong><a title="Hammaad Munshi" href="http://www.independent.ie/topics/Hammaad+Munshi">Hammaad Munshi</a>, from <a title="Dewsbury" href="http://www.independent.ie/topics/Dewsbury">Dewsbury</a>, West <a title="Yorkshire (England)" href="http://www.independent.ie/topics/Yorkshire+(England)">Yorkshire, England</a>, was 15 when he was recruited into a worldwide plot to wipe out non-Muslims.<br />He was arrested in 2006 after police found material promoting "murder and destruction", including a guide to making napalm, on his computer and under his bed. Now 18, he has been convicted of making a record of information likely to be used for terrorist purposes. <a href="http://www.independent.ie/world-news/teenage-cyber-terrorist-sent-to-jail-1479069.html">Published in Irish Independent</a><br /><br /><strong>Senate moves to criminalise ATM, mobile phone, cyber offences</strong></p><strong></strong><p><br />A bill for an Act to provide for the prohibition of electronic fraud in all electronic transactions in Nigeria and for other related matters <a href="http://www.rediffmail.com/cgi-bin/red.cgi?red=http%3A%2F%2Fnews%2Egoogle%2Ecom%2Fnews%3Fhl%3Den%26amp%3Bncl%3Dhttp%3A%2F%2Fwww%2Epunchng%2Ecom%2FArticl%2Easpx%253Ftheartic%253DArt200809222344045&isImage=0&BlockImage=0" target="_new"></a><br /><br />The bill, which is being sponsored by Senator Ayo Arise (PDP, Ekiti), has passed through first reading.<br />Violators of provisions of the law are liable on conviction, to jail terms ranging from five to 14 years. <a href="http://www.punchng.com/Articl.aspx?theartic=Art200809222344045">Published in The Punch</a><br /><br /><strong>Cyber security top priority for UAE government<br /></strong></p><p>Dubai: Cyber security of the UAE government's information and ensuring that its own citizens protect it has become a priority, said Dubai eGovernment eServices Director Salem Al Shair…<a href="http://www.gulfnews.com/nation/Technology/10245447.html">Published in Gulf News</a><br /><br /><strong>Nigeria: EFCC Develops Software to Combat Cyber Crime<br /></strong><br />The Economic and Financial Crimes (EFCC) says it is developing computer softwares that would monitor internet services in the country as a way to combat cyber crimes.<br />Spokesman of the Commission, Mr. Femi Babafemi, who disclosed this to IT World, said the Commission is partnering with Information and Communication experts to develop the software. He said already, the report of the technical committee on the development of the software has been submitted to the chairman, adding that so far, over 136 cyber crime suspects have been arrested since Mrs. Farida Waziri took over as chairman of the Commission. <a href="http://allafrica.com/stories/200809161127.html">Published in All Africa</a><br /></p><p><strong>Improved OnGuardOnline.gov Site Teaches Cyber-Safety to the Average Person<br /></strong><br />One of the better places for the average person to learn about the sometimes murky waters of the Internet is free and sponsored by the Federal Trade Commission. Although <a href="http://www.onguardonline.gov/" target="_blank">OnGuardOnline.gov</a> and <a href="http://www.alertaenlinea.gov/" target="_blank">AlertaEnLinea.gov</a>, its Spanish-language counterpart, have been around for awhile, some new and exciting improvements have been made to the site with a just released Web 2.0 redesign. <a href="http://blogcritics.org/archives/2008/09/17/025758.php">Published in Blogcritics</a><br /></p><p><strong>Banking crisis: Cyber squatters cash in<br /></strong><br />It is not just hedge funds and short-sellers that are looking to cash-in on the global financial meltdown. Cyber-speculators have got in on the act too, snapping up online domain names in a game of guess the brand and the hope of selling their piece of internet property to the highest bidder.<br />Yesterday (September 16 2008) the rather long-winded domain name www.bankofamericamerrilllynch.com went up for sale on auction site eBay with an asking price of $1500 (£832). <a href="http://www.guardian.co.uk/business/2008/sep/17/wallstreet.technology">Published in Guardian</a><br /></p><p><strong>Cyber sleaze hits city’s top business family<br /></strong></p><p>A well-known builder’s family was hounded out of its wits recently when all its members, including four women, started receiving phone calls from unknown persons propositioning them to provide ‘female escorts’ as advertised in an internet-based agency. The ‘escort agency’ advertised Punjabi women available as escorts in Nagpur and listed the phone numbers of all the members of the family. Shocked by the flurry of calls, the angry and embarrassed family approached the cyber crime cell of crime branch in July. The cyber cell team, cracking the case, exposed the role of a disgruntled relative who wanted to avenge the fact that he was distanced from the family business as a sub-contractor around a year ago over a dispute. <a href="http://timesofindia.indiatimes.com/Nagpur/Cyber_sleaze_hits_citys_top_business_family/articleshow/3501190.cms">Published in Times of India</a><br /><br />Comments: Disgruntled employees, friends and even lovers had restored to e-revenge in past. Hence, you are advise not to sharing your personal details and photo online.<br /><br /><strong>OPINION: Cyber-Bullying - A Dark Side of the Internet<br /></strong><br />The Internet places a profound and staggering degree of information and knowledge at our fingertips. The Internet is the ultimate library and encyclopedia. It enables an army of telecommuting working men and women to work at home. It facilitates instant back and forth communication by e-mail. Online, we read newspapers and listen to music. The Internet is where we can advertise goods for sale on e-bay and purchase all sorts of items at retail stores. However, there is a dark aspect to the Internet. <a href="http://somd.com/news/headlines/2008/8387.shtml">Published in Southern Maryland Online </a><br /><br /><strong>Cyber sex can cause depression<br /></strong></p><p>People who frequently indulge in online sex, fetish and swinging sites have “alarmingly high” rates of depression, anxiety and stress, says a shocking new research. What’s more, people who seek out cyber sex typically devote hours a day to the covert activity, the study found. The Australian research also revealed that overwhelmingly male, well-educated, and aged anywhere from 18 to 80 indulge in such kind of ‘pleasure’. <a href="http://timesofindia.indiatimes.com/Health/Cyber_sex_can_cause_depression/articleshow/3530587.cms">Published in Times of India</a><br /><br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong></p><p><strong>JOBS/ FREELANCE MARKETS</strong></p><p><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /></strong><br />Coming soon….<br /><br />For posting cyber law or IS related jobs or assignments, please email details at <a href="mailto:dipak00001@gmail.com">dipak00001@gmail.com</a> with subject line “Job”<br /><br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong></p><p><strong>CYBER LAW OR IS EVENTS </strong></p><p><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /></strong>DIGITAL SOCIETY DAY 2008<br />Event in Bangalore on October 17, 2008<br />Sept 26: As in the previous years, Digital Society Foundation (Trust promoted by Naavi and others) will celebrate October 17, 2008 as the Digital Society Day of India in recognition of the fact that on October 17, 2000, ITA 2000 was given effect to bringing in the legal recognition for electronic documents for the first time in India. The theme for the current year is "Privacy and Data Protection in Cyber Space". The event will consist of a day long programme to be held at KLE Law College, Rajaji Nagar, Bangalore in association with KILPAR (Karnataka Institute of Legislative and Parliamentary Affairs) and KLE Society's Law College. The seminar will discuss the issues in balancing the demand for Privacy Rights Protection by Human Rights Activists with the Law Enforcement needs in the light of Cyber Terrorism and Cyber Wars. It is intended to collect the views of Legal Experts on the "Essential Features of a Suggested Data Protection Act of India" to be consolidated and presented to Nasscom and Ministry of Communications and Information Technology for further action.<br />(Law Students wishing to present a paper on the occasion may kindly submit the paper before October 10th to naavi , through e-mail (<a href="mailto:naavi@vsnl.com">naavi@vsnl.com</a>) and print copy. The best paper presenter may be invited to briefly present his views during the seminar)<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br />For posting cyber law or IS event, please email details at <a href="mailto:dipak@lawyer.com">mailto:dipak@lawyer.com</a>with subject line “Events”<br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong></p><p><strong>BUSINESS STUFF</strong></p><p><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /></strong><br />Advertise with us!!!<br />For more details email at <a href="mailto:dipak@lawyer.com">mailto:dipak@lawyer.com</a> with subject line “Advertise”<br /></p><p><span></span> </p><p><span><script type="text/javascript">var gaJsHost = (("https:" == document.location.protocol) ? "<a href="https://ssl/">https://ssl</a>." : "<a href="http://www/">http://www</a>.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type="text/javascript">var pageTracker = _gat._getTracker("UA-4887885-2");pageTracker._trackPageview();</script></span></p><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com2tag:blogger.com,1999:blog-3188575481562822422.post-7980437544476271892008-09-24T11:20:00.001+05:302008-09-24T11:33:08.277+05:30Domain name fraud: Hoax email to solicit business from .com ownersIf you recieve an email information you that someone had made application for registration of domain name similar to your .com domain name.<br /><br />It is a hoax email to solicit more business for the owner of .com domain name. They want you to register under different domains such as .asia .in .org net. and so on.<br /><br /><strong>Sample of hoax email </strong><br /><br />From: Dr. ABC<br />Date: 9/23/2008 9:29:19 AM<br />To:<br />Subject: XXX Enquiry<br /><br />Dear XXX,<br /><br />We are one of the Domain Name Dispute Resolution (DNDR) Committee members authorized by ANIC(Asia Internet Network Information Center).<br /><br />Now we have something urgent on intellectual property need to confirm with your company.<br /><br />On the Sep 22, 2008, we received an application from one person from China Intellectual Property Protection Agency (Taiwan) Corporation named “Roger L. Forbes” who wants to register the “XXX” as Internet Brand,TradeMark Domain and Asia Pacific domains. Considering these domains and internet brand would involve the intellectual property of your company’s name,patents,trademarks,and copyright, and in order to avoid confusion between them, so we inform you urgently. If you considered these domains and internet brand are important to you and there was necessary to protect them by registering them first, please let someone who is responsible for trademark or domain name contact me as soon as possible.<br /><br />Thank you for you cooperation.<br /><br />I am waiting for your urgent reply,<br />Kind Regards,<br />Dr. ABC<br />Chief Law Officer,Senior Consulting Director<br /><br />Internet Brand Justice & Safety Dept.<br />ABC xxx xxx Ltd (Branch Office)<br />Help Dispute Tel: ..........(Mon–Fri,9am to 6:30pm,GMT+8)<div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com1tag:blogger.com,1999:blog-3188575481562822422.post-35767965908395488252008-09-17T21:49:00.004+05:302008-09-29T18:53:02.451+05:30Misuse of wireless network to send terror emailTerrorists had allegedly used unsecured wi-fi networks to send terror emails to media and remained anonymous till date. Earlier terrorists were using cyber cafes to send terror emails but now they are exploiting wi-fi and tomorrow some other technology. Similar trend is being witnessed in other areas of information security. As the world catches on to the dangers of opening unknown e-mail attachments and better spam filters are created, the focus of attacks is turning to the web itself.<a title="" style="mso-footnote-id: ftn1" href="http://www.blogger.com/post-edit.g?blogID=3188575481562822422&postID=3576796590839548825#_ftn1" name="_ftnref1">[1]</a> Trend Micro Incorporated, a global leader in Internet content security, reported that cybercriminals are not only leveraging new technologies to propagate cybercrime, but are also reinventing forms of social engineering to cleverly ensnare both consumers and businesses, according to the "Trend Micro Threat Roundup and Forecast 1H 2008" report.<a title="" style="mso-footnote-id: ftn2" href="http://www.blogger.com/post-edit.g?blogID=3188575481562822422&postID=3576796590839548825#_ftn2" name="_ftnref2">[2]</a><br /><br /><em>Is wi-fi technology is safe?</em><br /><br />“The vulnerability is more in the negligence of the users of wi-fi rather than the technology itself” says Na.Vijayashankar, better known as Naavi, the well known Cyber Law Consultant in India. He was the author of the first book on Cyber Laws in India and a pioneer in the spreading of Cyber Law Education in the country.<br /><br />The users are not taking sufficient measures to secure their wi-fi nor the service providers are take necessary steps to educate them on same. It is easier for users to secure its wired network because it is visible to them. This advantage is not available to wi-fi users. Naavi says, “The invisibility of the network users induces complacency. Psychologically, it is difficult for ordinary users to visualize that a person from out of our physical boundary may also have access to the device.” If this vulnerability of wi-fi is not plugged then the same can be misused by terrorists to send terror emails and remain anonymous as reported in the above mentioned two incidences.<br /><br /><em>How wi-fi works?<br /></em><br />Wi-fi uses radio signals to connect and communicate with a hotspot and a PC or a laptop situated in a short distance of 100 to 200 feet in an office building, a university or even at homes. You can move around in a campus of university or an office without losing net connectivity.<br /><br />When the hotspot is in open mode, it sends broadcast a message “I am available” in a vicinity of 100 to 200 feet and a laptop or a PC equipped with a wireless network receiver in this vicinity able to connected to the particular wi-fi and connect to net. One can access wi-fi network even from 800 feet by using an antenna. So if your wi-fi network is not secured then it can be misused by not only by your neighbours residing in your and nearby buildings but also by a stranger few streets away from your office or home.<br /><br />Whereas in closed mode, the user sends a message “I want to connect with XYZ wi-fi hotspot”, which is responded by the hotspot “I am XYZ”. You can have additional security login id and password for connecting to wi-fi.<br /><br />Wi-fi software faults make interception easier. Security Consultant Chris O’Ferrell has been able to connect to wireless networks in Washington D. C. from outside a Senate office building, as reported in “High Wireless Acts” by Noguchi. Y in Washington Post dated 28 April, 2002. Back home. Asian School of Cyber Laws recently conducted experiments near several software parks. The finding of the same was very shocking and reveals lack of cyber security. “The wireless networks of a whopping 90% of the software companies were leaking out sensitive information. A malicious hacker could easily sit in a parked car with a laptop; run some sniffing software and access huge mounts of sensitive data including source codes!” For more details refer Cyber Crimes Hit List – 2006 issued by Asian School of Cyber Laws and available on their website www.asianlaws.org.<br /><br /><em>Precautions to be taken by users to secure their wi-fi:<br /></em><br />Keep wi-fi in closed mode rather than open mode.<br />Use a log-in id and password to access wi-fi and periodically change your password.<br />Use wi-fi protected access2 (WPA2), which more secured than wired equivalent privacy (WEP)<br />When you are not using wi-fi, switch off the same.<br />Check the audit trails of net sessions to ensure that all logs are properly recorded and not misused by unauthorized user.<br /><br />Naavi warns all wi-fi users, including potential users, to avoid wi-fi if you cannot adopt the requisite security.<br /><br /><br />Footnotes<br /><br /><a title="" style="mso-footnote-id: ftn1" href="http://www.blogger.com/post-edit.g?blogID=3188575481562822422&postID=3576796590839548825#_ftnref1" name="_ftn1">[1]</a> For more details read article on “The new multiple face of Internet threats” available at <a href="http://www.canada.com/calgaryherald/news/story.html?id=1e082603-ec50-4b79-af5d-9996d1d39732">http://www.canada.com/calgaryherald/news/story.html?id=1e082603-ec50-4b79-af5d-9996d1d39732</a><br /><a title="" style="mso-footnote-id: ftn2" href="http://www.blogger.com/post-edit.g?blogID=3188575481562822422&postID=3576796590839548825#_ftnref2" name="_ftn2">[2]</a> Source: Trend Micro Incorporated<br /><br /><br />*********<br /><br />Today(17-09-2008), I had secured a wi-fi network of my business associate…I feel great…although it is a drop in the ocean (an initiative to secure wi-fi networks in Mumbai)<br />Perils of wireless Internet<br /><br />Recent blasts expose the safety gaps in cyberspace and underscore the need for smart vigilance.<br /><br />R.K.Raghavan<br /><br />It is the same old story again. As in the case of a few past blasts, such as the series of UP explosions (November 2007) and Ahmedabad (August 2008), terrorists involved in the five explosions of Delhi on September 13 sent e-mails to the media just a few minutes before the bombs took off, warning the authorities of their action. There are, however, several unexplained issues here. <a href="http://www.thehindubusinessline.com/ew/2008/09/22/stories/2008092250050200.htm">Published in The Hindu Businessline</a><br /><br />Centre to issue guidelines to internet service providers (<a href="http://www.hindu.com/thehindu/holnus/001200809161616.htm">Article published in Hindu</a>)<br /><br /><script type="text/javascript">var gaJsHost = (("https:" == document.location.protocol) ? "<a href="https://ssl/">https://ssl</a>." : "<a href="http://www/">http://www</a>.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><br /><script type="text/javascript">var pageTracker = _gat._getTracker("UA-4887885-2");pageTracker._trackPageview();</script><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com0tag:blogger.com,1999:blog-3188575481562822422.post-39850508143160615522008-09-15T18:13:00.005+05:302008-09-20T10:24:15.995+05:30Cyber Law Update September 2008 - Issue no. 8<strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong><br /><strong>CYBER LAW NEWS</strong><br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /></strong><br /><strong>LHC Web site defaced – was the particle detector really at risk?</strong><br /><br />The Telegraph is reporting that attackers have defaced a Web page on the Compact Muon Solenoid Experiment Monitoring (CMSMON) system that monitors the fallout from the big bang experiment presently taking place beneath CERN.<br />The question that should stand out is why this system was public faced. CERN scientists said the attackers were “one step” away from the control system that operates one of the huge magnets used in the gargantuan machine. <a href="http://www.thetechherald.com/article.php/200837/2020/LHC-Web-site-defaced-–-was-the-particle-detector-really-at-risk">Published in the Tech Herald</a><br /><br /><strong>Cyber Crime: An Economic Problem</strong><br /><br />During ISOI 4 (hosted by Yahoo! in Sunnyvale, California) whenever someone made mention of RBN (the notoriously malicious and illegal bulletproof hosting operation, the Russian Business Network) folks would immediately point out that an operation just as bad was just "next door" (40 miles down the road?), working undisturbed for years. They spoke of Atrivo (also known as Intercage). The American RBN, if you like.<br /><br />In fact, while many spam operations use botnets and operate all around the world, a lot of the big players own their own network space and operate hosting farms, which are constant and "legitimate", right in the US—for years now. <a href="http://www.circleid.com/posts/89610_cyber_crime_an_economic_problem/">Published in CircleID</a><br /><br /><strong>U.S. takes a look at arming itself for cyber-warfare</strong><br /><br />Never let it be said that the U.S. government makes snappy decisions about arming itself for cyber-warfare. Julian Barnes at the Los Angeles Times reports that the military is currently debating whether or not to develop the ability for the U.S. government to go on the offensive during a potential cyber-attack rather than simply defend U.S. computer systems in case of cyber-warfare. Barnes' article points out that the recent cyber-attacks associated with the conflict in Georgia have escalated the debate, which "reflects a newfound uncertainty over the state of global cyber-warfare capabilities." <a href="http://www.thestandard.com/news/2008/09/08/u-s-takes-longer-arm-itself-cyber-warfare-traditional-war-fare&isImage=0&BlockImage=0">Published in The Standard</a><br /><br /><strong>Defense Ministry’s Cyber Network Is Hacker-Proof</strong><br /><br />A Defense Ministry spokesman assured Tuesday that the department's cyber-security system is ``hacker-proof," adding that its intra-net computer data network is detached from the external Internet.<br />Source: koreatimes.co.kr <a href="http://www.crime-research.org/news/03.09.2008/3556/">Published in Crime Research</a><br /><br /><strong>Is the cyber terrorism threat exaggerated?</strong><br /><br />Cyber terrorism, a term coined by the media rather than security agencies, is one of the apocalyptic scenarios portrayed by fiction writers and movie producers on a regular basis. The story of a teenager bringing an entire nation to its knees with a computer and internet connection not only inflicts terror and awe in general public, it also fuels a lot of misapprehension feeding on the natural fear of unknown technology.<br /><br />While it would not be advisable for any national security outlook to discount cyber terrorism completely, the threat must be kept in perspective. As communications technology becomes more pervasive and integrated into the national economy and infrastructure, providing security to it and preventing its abuse obviously becomes a national security concern. <a href="http://indiapost.com/article/perspective/3725/">Published in India Post</a><br /><br /><strong>‘Lack of Cyber laws makes it impossible to fight Net crimes’</strong><br /><br />KUWAIT CITY : Internet-related crimes are on the rise in Kuwait and the lack of Cyber laws makes it impossible to tackle such fraudulent practices, says a Kuwaiti lawyer. Speaking to the Arab Times on Wednesday, Labeed Abdal added that hackers are increasingly targeting Kuwait and many other countries, knowing full well that they can get away with their crimes. He went on to explain that some people send abusive emails to settle personal scores and that the law enforcement agencies are unable to act on such matters due to non-existence of Cyber laws, “which must be in tune with the latest changes in the Internet domain.” <a href="http://www.arabtimesonline.com/client/pagesdetails.asp?nid=21784&ccid=9">Published in Arab Times Online</a><br /><br /><strong>Braga pushes passage of cyber crime bill</strong><br /><br />THE Davao City Council, through a resolution proposed by Councilor Pilar Braga, urged the House of Representatives to fast track the formulation of the final draft of the cyber crime bill.<br />"We push for a its speedy endorsement to the Senate because we urgently need of legislation. The longer it takes for the bill to become a law, the more daring cyber crimes are being committed," Braga said Wednesday. <a href="http://www.sunstar.com.ph/static/dav/2008/09/02/bus/braga.pushes.passage.of.cyber.crime.bill..html">Published in Sun Star</a><br /><br /><strong>Experts call for united global action against cyber attacks<br /><br /></strong>TALLINN (AFP) — The world has to unite against the growing menace of cyber terrorism, IT experts said Thursday, evoking a recent "cyber war" against Georgia as the latest example of the threat.<br />"The world has finally woken up and understood that cyber security needs a global approach and is a very serious matter," Estonian politician Mart Laar told a cyber security forum in the Estonian capital Tallinn. <a href="http://afp.google.com/article/ALeqM5j4gPohj-QP9LWAUkf08o0VhvpgAQ">Published in AFP </a><br /><br /><strong>NASS, EFCC, ICPC, CBN to partner against cyber crime</strong><br /><br />National Assembly, the Economic and Financial Crimes Commission (EFCC), the Independent Corrupt Practices and Other Related Offences Commission (ICPC) and the Central Bank of Nigeria (CBN) have resolved to partner themselves in the fight against cyber crime and money laundering. <a href="http://www.tribune.com.ng/02092008/news/news21.html">Published in Tribune</a><br /><br /><a name="Cyber_Crime"></a><a name="IS_Development"></a><strong>NHRC asks for speedy inquiry in cyber fraud</strong><br /><br />KENDRAPARA: National Human Rights Commission (NHRC) has directed police here to speed up the inquiry and submit report on an alleged cyber fraud in which an Oriya engineer working in a Dubai company was cheated. <a name="_Hlk209257201"></a><a href="http://economictimes.indiatimes.com/Infotech/Internet_/NHRC_asks_for_speedy_inquiry_in_cyber_fraud/articleshow/3455195.cms">Published in Economic Times</a><br /><br /><strong>Cyber experts to help make WiFi networks more secure<br /></strong><br />In light of the recent controversy over wireless fidelity (WiFi) network connection, Maharashtra police have joined hands with the Federation of Indian Chambers of Commerce and Industry (FICCI) to secure the WiFi network across the state. <a href="http://www.dnaindia.com/report.asp?newsid=1187058">Published in DNA India</a><br /><br /><strong>‘Cyber Safe Thane’ Organised by Thane Police & NASSCOM<br /></strong><br />NASSCOM, the premier trade body and ‘voice’ of the Indian IT-BPO industry, today announced that it would be organising ‘Cyber Safe Thane’, a three day awareness campaign on Cyber safety and security issues for customers, industry, academia, and other stakeholders in Thane from September 18-20th, 2008. <a href="http://www.prdomain.com/companies/N/NASSCOM/newsreleases/20089261408.htm">Prdomain Business Register (press release)</a><br /><br /><strong>Stop taking Net for granted!<br /></strong><br />NEW DELHI: We live in an exciting world of technology which is changing every day. There's YouTube, Second Life, MySpace, iPhone.<br /><br />You probably hadn't even heard of these a year ago, but today they dominate the discussions about societal trends and the future of communications and the Internet.<br /><br />Once upon a time, e-commerce drove the Internet debate, but now it's clear we have entered a new era.<br /><br />Today, consumers have ushered in the 'Any Era' demanding access to any information, from any device, any time and anywhere they want it. And they not only want access; they want the ability to contribute, personalise and socialise. <a href="http://infotech.indiatimes.com/articleshow/3448505.cms">Published in Indiatimes</a><br /><br /><strong>House panel to banks: devise systems to thwart cyber crimes<br /></strong><br />The parliamentary standing committee on personnel, public grievances, law and justice on Wednesday asked public sector banks to devise a special monitoring system to check cyber crimes and strengthen the present vigilance system to curtail corruption. The committee observed that the present banking set up was not equipped to tackle cyber crimes, which are quite familiar at the international level. The committee was concerned about effects of cyber crimes on the Indian banking system. <a href="http://www.financialexpress.com/news/House-panel-to-banks--devise-systems-to-thwart-cyber-crimes/359782/">Published in Financial Express</a><br /><br /><strong>Chennaiites lose Rs 1 cr to phishing this year<br /><br /></strong>CHENNAI: Chennaiites have lost over Rs 1 crore to phishers in 2008 alone, thanks to fraudsters taking advantage of the increase in the number of people switching to net-banking. Complaints of phishing have been flooding the bank fraud wing of the central crime branch of city police. In spite of warnings by banks, educated customers are falling prey to online robbers. Police have identified as many as 21 types of phishing mails, most of them involving spoofing of the web pages of mainstream banks. Some other phishing mails exploit the tendency of people to fall for free money or gifts. <a href="http://timesofindia.indiatimes.com/Chennai/Chennaiites_lose_Rs_1_cr_to_phishing_this_year/articleshow/3473792.cms">Published in Times of India</a><br /><br /><strong>Case registered against eight for cyber fraud<br /><br /></strong>Acting on the directive of the National Human Rights Commission, the police have registered a criminal case against a 25-year-old net-savvy married woman and seven others on alleged cyber fraud charge. <a href="http://www.kalingatimes.com/odisha_news/news/20080911-Cases-booked-against-eight-for-cyber-fraud.htm">Published in Kalinga Times</a><br /><br /><strong>Cyber cheat lived it up after Rs 20 lakh heist<br /><br /></strong>AHMEDABAD: Ellisbridge police officials are now trying to connect the dots in the sensational Rs 20-lakh online heist of Sanjay Koliya, 20, of Rajkot.<br /><br />As Ellisbridge police grilled him, Sanjay gave details of his life after he became rich overnight. The investigating officers are now probing how exactly and in what manner the young cyber cheat spent his ill-gotten wealth. <a href="http://timesofindia.indiatimes.com/Ahmedabad/Cyber_cheat_lived_it_up_after_Rs_20_lakh_heist_/articleshow/3430040.cms">Published in Times of India</a><br /><br /><strong>Cyber Crimes: You Could Be the Next Victim<br /></strong><br />Welcome to the world of cyber crimes, welcome to the den of cyber-criminals.<br />Experts are of the opinion that cyber crime, which commonly refers to any illegal activity committed on the Internet, dates back to the 1980s. Because of declining economic standards in most developing countries, numerous jobless youths found earning a living increasingly difficult despite having relevant degrees and certifications. They decided to devise a means of survival. The result of their "ingenuity" is this pest threatening to inconvenience Internet users. <a href="http://www.thestandard.com/news/2008/09/08/u-s-takes-longer-arm-itself-cyber-warfare-traditional-war-fare&isImage=0&BlockImage=0">Published in The Industry Standard</a><br /><br /><strong>Teacher arrested in cyber-sex sting<br /><br /></strong>A 46-year-old Paradise man, Butte County substitute teacher and father of two Paradise High School students was arrested Wednesday for soliciting sex over the Internet with someone he allegedly believed was a 13-year-old girl.<br /><br />According to a Butte County Sheriff's Office press release, Gerald William Lemay was arrested for arranging a meeting with a minor for sexual purposes. <a href="http://www.paradisepost.com/ci_10449347">Published in Paradise Post</a><br /><br /><strong>Cyber Bullying: Responsibilities and Solutions<br /><br /></strong>A Missouri woman is indicted on federal charges of causing the suicide death of a teenage girl who frequented the social networking site MySpace. An eighth grade student from Pelham Middle School, N.Y. is the recipient of insulting remarks posted on her MySpace page by a classmate. Another eighth grader receives embarrassing comments as she instant messages with friends. A 13-year-old Vermont boy was bullied for months online. He eventually committed suicide. These are but four examples of a problem known as cyber bullying. <a href="http://www.techlearning.com/showArticle.php?articleID=196605394">Published in Tech Learning</a><br /><br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong><br /><strong>Jobs/ Freelance Market</strong><br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong><br /><br />Coming soon….<br /><br />For posting cyber law or IS related jobs or assignments, please email details at <a href="mailto:dipak00001@gmail.com">dipak00001@gmail.com</a> with subject line “Job”<br /><br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong><br /><strong>Cyber Law or IS events</strong><br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /></strong>Coming soon….<br /><br />For posting cyber law or IS event, please email details at <a href="mailto:dipak00001@gmail.com">dipak00001</a><a href="mailto:CyberLawCollege@gmail.com">@gmail.com</a> with subject line “Events”<br /><br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong><br /><strong>BUSINESS STUFF</strong><br /><strong>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</strong><br /><br />Advertise with us!!!<br />For more details email at <a href="mailto:dipak00001@gmail.com">dipak00001@gmail.com</a> with subject line “Advertise”<br /><br /><script type="text/javascript">var gaJsHost = (("https:" == document.location.protocol) ? "<a href="https://ssl/">https://ssl</a>." : "<a href="http://www/">http://www</a>.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><br /><script type="text/javascript">var gaJsHost = (("https:" == document.location.protocol) ? "<a href="https://ssl/">https://ssl</a>." : "<a href="http://www/">http://www</a>.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type="text/javascript">var pageTracker = _gat._getTracker("UA-4887885-2");pageTracker._trackPageview();</script><script type="text/javascript">var pageTracker = _gat._getTracker("UA-4887885-2");pageTracker._trackPageview();</script><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com1tag:blogger.com,1999:blog-3188575481562822422.post-86289604615181147312008-09-02T17:41:00.003+05:302008-09-18T10:32:48.094+05:30Cyber Law Update August 2008 - Issue no. 7<strong>A classic cyber war? </strong><br /><br />It is again eventful times in cyberspace. It all started earlier this month with the entry of Russian troops into neighbouring Georgia’s South Ossetia, a region not reconciled to its present political status within Georgia, and with strong affinity for North Ossetia that is part of Russia. <a href="http://www.thehindubusinessline.com/ew/2008/08/25/stories/2008082550050200.htm">Reported in The Hindu Businessline</a><br /><br /><strong>Public, private sectors at odds over cyber security<br /><br /></strong><strong></strong>The government has largely argued that the private sector is better suited to tackle the problem. But big corporations say it's too big for them to handle.<br />By Joseph Menn, Los Angeles Times Staff Writer<br />Three very big and very different computer security breaches that have dominated recent headlines did more than show how badly the Internet needs major repairs. They also exposed the huge rift between corporate America and the federal government over who should fix it, cyber-security experts say. <a href="http://www.latimes.com/business/la-fi-security26-2008aug26,0,2021258.story">Reported in La Times</a><br /><br /><strong>Thousands of cyber attacks each day on key utilities Jonathan Richards<br /></strong><br />Computer networks controlling electricity supplies, telecommunications and banking are being attacked thousands of times a day in a new cyberwar against Britain waged by criminals and terrorists — some of them backed by foreign states — the Government has said. <a href="http://www.timesonline.co.uk/tol/news/uk/crime/article4592677.ece">Reported in Times Online</a><br /><br /><strong>Hacker gets into Federal Emergency Management Agency's phone system<br /></strong><br />The FBI is investigating more than $12,000 in calls made when a hacker broke into the Federal Emergency Management Agency's phone system.<br />Source: newschannel5 <a href="http://www.crime-research.org/news/29.08.2008/3544/">Reported in Crime-Research</a><br /><br /><strong>Hackers attack Iraq's vulnerable computers<br /></strong><br />Ahmed Khathem, the head of Iraq's newly formed cybercrimes division, sits in a borrowed office, at a borrowed desk, working on a laptop borrowed from one of his subordinates.<br />It is his unit's lone computer, highlighting the country's vulnerability to a community of Iraqi hackers defacing websites and attempting to hack into sensitive internal networks.<br />Source: USAtoday.com <a href="http://www.crime-research.org/news/29.08.2008/3543/">Reported in Crime Research</a><br /><br /><strong>Indian hacker alleged brain behind biggest cyber-heist<br /></strong><br />LONDON: An unknown Indian hacker is being charged with the greatest cyber-heist in history for allegedly helping a criminal gang steal identities of an estimated eight million people in a hacking raid that could ultimately net more than 2.8 billion pounds in illegal funds. <a href="http://economictimes.indiatimes.com/Infotech/Indian_hacker_alleged_brain_behind_biggest_cyber-heist/articleshow/3400493.cms">Reported in Economic Times</a><br /><br /><strong>Survey: IT staff would steal secrets if laid off<br /></strong><br />Computerworld UK — Most IT staff would steal sensitive company information, including CEO's passwords and customer details, if they were laid off, according to a new survey from Cyber-Ark.<br />A staggering 88 percent of IT administrators admitted they would take corporate secrets, if they were suddenly made redundant. The target information included CEO passwords, customer database, research and development plans, financial reports, M&A plans and the company's list of privileged passwords. <a href="http://www.itworld.com/security/54579/survey-it-staff-would-steal-secrets-if-laid">Reported in IT World</a><br /><br /><strong>Cyber-threat environment becoming increasingly severe<br /></strong><br />Today's cyber-threat environment is increasingly severe, compounded by the emergence of new types of attacks.<br />This is according to TippingPoint, an intrusion prevention company which also provides IPS-secured (intrusion prevention system) network. They say the situation is worsened by the shrinking time between the discovery of vulnerabilities and the development of ways to exploit them, plus the dissolving network perimeter. <a href="http://www.networkworld.com/news/2008/082608-cyber-threat-environment-becoming-increasingly.html?hpg1=bn">Reported in Network World</a><br /><br /><strong>The new multiple face of Internet threats<br /></strong><br />E-mail viruses are so yesterday. These days, it's your browser that has online criminals salivating.<br />Network worms and viruses spread by mass e-mails are unlikely to ever become extinct, but they are no longer the primary weapon used by the bad guys of the virtual world to steal your identity or life's savings. <a href="http://www.canada.com/calgaryherald/news/story.html?id=1e082603-ec50-4b79-af5d-9996d1d39732">Reported in Canada.com</a><br /><br /><strong>Hard disks seized from 3 cyber cafes<br /></strong><br />21 Aug 2008, Ahmedabad/Vadodara: Three cyber cafes in Vadodara's old city area were searched by the Ahmedabad Crime Branch and local Special Operation Group (SOG) officials in connection with Ahmedabad blasts late on Wednesday after information that those behind the blasts, including computer expert Abdul Subhan alias Taufique Bilal from Mumbai, visited these cafes. The investigating team seized 28 hard disks from all three cafes and sent it to Forensic Science Laboratory (FSL) tests. <a href="http://timesofindia.indiatimes.com/Ahmedabad/Hard_disks_seized_from_3_cyber_cafes_/articleshow/3387271.cms">Reported in Times of India</a><br /><br /><strong>Dalhousie to help U.S. catch cyber terrorists<br /></strong><br />A major software project is underway by the U.S. Department of Homeland Security to monitor levels of Internet traffic and detect possible security breaches — and Dalhousie University is going to help build it. <a href="http://thechronicleherald.ca/Metro/1074666.html">Reported in The Chronicle Herald</a><br /><br /><strong>More tools developed to crack cyber crimes<br /></strong><br />THIRUVANANTHAPURAM: Law enforcing agencies are now armed with more software tools to fight cyber crimes with a premier centre claiming to have developed them.<br />Emailtracer, CyberCheck, Siman and Calltrack are some of the softwares (sic) developed indigenously by the Resource Centre for Cyber Forensic (RCCF) here. <a href="http://economictimes.indiatimes.com/News_by_Industry/Tools_developed_to_crack_cyber_crimes/articleshow/3399828.cms">Reported in Economic Times</a><br /><br /><strong>Cyber forensic tools will soon be considered as evidence<br /></strong><br />THIRUVANANTHAPURAM: Evidence gathered using various cyber forensics tools developed by the Centre for Development of Advanced Computing (CDAC) would soon be considered as evidence in cyber crimes.<br />Necessary amendments in this regard would be made in the IT Act, said Communication and Information Technology Minister A Raja. He was speaking at a function organised in connection with the dedication of the Resource Centre for Cyber Forensics (RCCF) at CDAC here to the nation on Saturday. <a href="http://www.newindpress.com/NewsItems.asp?ID=IEO20080824004625&Page=O&Title=Thiruvananthapuram&Topic=0">Reported in NewIndPress</a><br /><br /><strong>City turning a hackers' den<br /></strong><br />HYDERABAD: The source code theft involving a senior techie could be a highend cyber crime but the city's netizens have been witness to a range of cyber concerns from hacked email accounts, credit card frauds to the most common crime of posting pornographic material on the profiles of social networking site members.<br />And this has made internet security experts brand Hyderabad as a hackers' den. They say the city has become a haven for cyber crimes, and that among the southern Indian cities Hyderabad perhaps also ranks the highest on the cyber crime radar with city internet security firms receiving cases of corporate data theft, email frauds and impersonations and mobile phone related crimes. <a href="http://timesofindia.indiatimes.com/Hyderabad/City_turning_a_hackers_den_/articleshow/3424319.cms">Reported in Times of India</a><br /><br /><strong>Covering Cyber Threats<br /></strong><br />Companies spent more than $6.3 million on data breaches in 2007<br />By Greg Bordonaro<br />As companies face a host of new risks associated with their digital data, insurers are scrambling to create a whole new field of coverage: cyber liability.<br />Costly and legally troublesome problems ranging from data breaches to infringement cases are on the rise, and 43 states, including Connecticut, have passed laws spelling out rules for companies that experience them. <a href="http://www.hartfordbusiness.com/news6450.html">Reported in Hartford Business</a><br /><a href="http://technorati.com/claim/6i6mi7ubss" rel="me">Technorati Profile</a><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com1tag:blogger.com,1999:blog-3188575481562822422.post-24967776867156732542008-08-21T17:05:00.003+05:302008-09-18T10:33:13.337+05:30Cyber Law Update August 2008 - Issue no. 6<strong>Cyber warfare is a military twilight zone<br /></strong><br />Before Georgia and Russia started shooting at each other, they were already fighting on the Internet. Georgian government and media websites had been almost paralysed by hackers following the so-called 'Distributed Denial of Service' attacks that began weeks before. Such cyber war techniques constitute an increasing threat, one that's now being taken seriously by the military. <a href="http://www.radionetherlands.nl/currentaffairs/globaldevelopment/080815-cyyberwar-russia-georgia">Reported in Radio Netherlands</a><br /><br /><strong>Tracking a Cyber Attack<br /></strong><br />The conflict between Russia and the former Soviet Republic of Georgia has underscored the relative anonymity of cyberattackers. During the conflict, attacks were launched against Georgia’s Internet infrastructure, and a debate continues over who might be responsible.<br /><br />With that debate likely to continue indefinitely, policy-makers are realizing that in cyberspace, ascribing blame might be nearly impossible.<br /><br />Although the Russian government has denied involvement, it is still under suspicion, along with organized crime groups and garden-variety hackers. <a href="http://www.fcw.com/online/news/153529-1.html">Reported in FCW</a><br /><br /><strong>Malaysia Should Be Ready To Face Cyber Threats<br /></strong><br />SHAH ALAM, Aug 15 (Bernama) -- Malaysia, which appears safe from cyber attacks like those experienced in other parts of the world, should brace itself for such a threat.<br /><br />Energy, Water and Communications Minister Datuk Shaziman Abu Mansor wants the country to prepare itself for the threat which could affect individuals, corporation and the government. <a href="http://www.bernama.com.my/bernama/v3/news.php?id=353041">Reported in Bernama</a><br /><br /><strong>Black Ice: Cyber-terrorism and the Private Sector<br /></strong><br />Corporate America is still in denial about the threat of cyber-terrorist attacks against critical facilities in the energy, telecommunications and financial industries. <a name="END"></a><a href="http://computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=spam,_malware_and_vulnerabilities&articleId=83841&taxonomyId=85&intsrc=kc_top">Reported in Computer World</a><br /><br /><strong>Terrorism cyber-recruiter jailed</strong><br /><br />LONDON (Reuters) - A man described by prosecutors as a terrorism "Mr Fix-it" who recruited young people to al Qaeda's ideology over the Internet, was jailed for 12 years on Tuesday while one of his accomplices received a 10 year term. <a href="http://uk.reuters.com/article/topNews/idUKLJ48901120080819">Reported in Reuters</a><br /><br /><strong>NCC Wants Checks on Cyber Criminals<br /></strong><br />The Nigerian Computer Society (NCS) has called on the Federal Government to pay particular attention to the devastating impact of cyber criminality and terrorism in the e-commerce and electronic fund transfer landscape. <a href="http://www.thisdayonline.com/nview.php?id=119630">Reported in This Day Online</a><br /><br /><strong>Microsoft, Google and Yahoo sued by the Indian Government<br /></strong><br />Microsoft, Google and Yahoo were issued notices by India's Supreme Court on Wednesday, following a complaint that they were promoting techniques and products for the selection of an unborn child's sex through advertising and links on their search engines. <a href="http://blogging-madeeasy.blogspot.com/2008/08/microsoft-google-and-yahoo-sued-by.html">Posted on Blogging Madeeasy</a><br /><br /><strong>Chandigarh police get hi-tech gadgets to combat cyber crime<br /></strong><br />Chandigarh, Aug 17 (IANS) A machine to recover deleted SMSes and another to scan through any suspected hard disk, these are among the latest gadgets acquired by the Chandigarh police to tackle cyber crime. <a href="http://www.sindhtoday.net/south-asia/12786.htm">Reported in Sindh Today</a><br /><br /><strong>Start of school means kids need to be cyber-savvy<br />Tech group gives tips for back to school<br /></strong><br />WASHINGTON — Americans for Technology Leadership, a coalition of technology and consumer groups, recently launched its monthlong campaign to help educate parents on ways to make sure their kids stay safe online when they head back to school.<br /><br />Children face an enormous number of possible roadblocks to their Internet safety, including cyber-bullying threats, cyber security issues such as spam, computer viruses, identity theft, spyware, phishing scams and Internet predators. <a href="http://www.seacoastonline.com/apps/pbcs.dll/article?AID=/20080818/BIZ/808180306&sfad=1">Reported in Sea Coast Online</a><br /><br /><strong>India figures in top 10 spammers' list<br /></strong><br />NEW DELHI: India figures among the top 10 spam sending countries, accounting for nearly 3% of spam sent globally in the second quarter of 2008, according to enterprise security firm Secure Computing’s Internet Threats report. Spam or unsolicited e-mails sent from emerging markets is expected to grow as internet infrastructure improves. <a href="http://economictimes.indiatimes.com/Infotech/Internet_/India_figures_in_top_10_spammers_list/articleshow/3382623.cms">Reported in Economic Times</a><br /><br /><strong>Hackers too playing games at Olympics<br /></strong><br />NEW DELHI: Olympic buffs, beware! Internet hackers are trying their best to steal data from your system and corrupt it. Hackers send mails related to Olympic events with interesting subject lines and then trap surfers in their net. Internet users in India have been found more vulnerable as people are overenthusiastic over the prospect of getting two individual medals for the first time in the history of the games. <a href="http://economictimes.indiatimes.com/Infotech/Internet_/Hackers_too_playing_games_at_Olympics/articleshow/3382595.cms">Reported in Economic Times</a><br /><br /><a href="http://technorati.com/claim/6i6mi7ubss" rel="me">Technorati Profile</a><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com1tag:blogger.com,1999:blog-3188575481562822422.post-51226865685794440302008-08-14T10:33:00.004+05:302008-08-18T10:17:59.688+05:30Cyber Law Update August 2008 - Issue no. 5<strong>Pakistan intensifies Cyber War propaganda against India</strong><br /><br />Washington, Aug.11 (ANI): Pakistan is taking steps to intensify its cyber war propaganda against India with the help of its intelligence outfit, the Inter-Services Intelligence (ISI) by carrying reports of alleged communal fissures taking place on the Indian side of Kashmir.<br /><br />Since the Amarnath land transfer controversy began, Pakistan Televisions (PTV) focus has been on the alleged human rights violations in Jammu and Kashmir.<br /><br />On an average, PTV is beaming two hours of daily anti-India propaganda as compared to an hour a day that was the norm earlier. It is apparent that PTV is heavily focusing on promoting the communal divide between Hindu-dominant Jammu and the Muslim-dominant Kashmir Valley with the objective of pushing forward the two-nation theory.<br />The ISI is also setting up a TV channel in Bangladesh as a part of its war over airwaves in the region, says the US based Global Geopolitics Network. <a href="http://www.thaindian.com/newsportal/india-news/pakistan-intensifies-cyber-war-propaganda-against-india-update_10082713.html">Reported in Thaindia</a><br /><br /><strong>New cell phone connection may be required two guarantors</strong><br /><br />NEW DELHI, AUG 10 (PTI): In its efforts to check the use of mobile phones in terror activities, the Ministry of Home Affairs is likely to advice the Department of Telecommunication to direct all mobile phone operators to get two existing cellular customers as guarantors before issuing SIM card to new customers. <a href="http://www.outlookindia.com/pti_news.asp?gid=110&id=597722">Reported in Outlook India</a><br /><br /><strong>Cyber Thugs March Through Georgia<br /></strong><br />August 13, 2008: Georgia is not just being invaded by Russian troops, it is also being hammered on the Internet, with the same Cyber War techniques Russia used against Estonia last year. Russia was accused of causing great financial harm to Estonia via Cyber War attacks, and Estonia wants this sort of thing declared terrorism, and dealt with. NATO agreed to discuss the issue, but never took any action against Russia. But as a result of that incident, NATO established a Cyber Defense Center in Estonia three months ago. <a href="http://www.strategypage.com/htmw/htiw/articles/20080813.aspx">Reported in Strategy Page</a><br /><br /><strong>Britain under attack from cyber foreign security terrorists, report warns<br /><br /></strong>"E-espionage" was identified by the Government as one of the two most likely risks facing the UK, the other being terror attacks on the transport network. <a href="http://www.marketwatch.com/news/story/protect-your-children-against-cyber-bullying/story.aspx?guid=%7b3E274545-C08F-4DAD-AB28-79918E0F3AC4%7d&dist=hppr">Reported in MarketWatch</a><br /><br /><strong>Feds crack largest U.S. identity theft</strong><br /><br />Federal authorities said yesterday that they had cracked the largest identity theft case in U.S. history, charging 11 people in the theft of more than 40 million credit and debit card account numbers from computer systems at major retailers such as T.J. Maxx and Barnes & Noble. <a href="http://www.thehindubusinessline.com/ew/2008/08/11/stories/2008081150070200.htm">Reported in Hindu</a><br /><br /><strong>U.S. Warns Of Chinese Cyber-Spies</strong><br /><br />Overseas Travelers Warned That Personal Information Can Be Stolen; No Device Safe<br />(CBS) U.S. intelligence officials issued a strong warning Thursday that Americans traveling overseas, particularly visitors to the Olympics in China, face a serious risk of having sensitive information stolen, reports CBS News correspondent Bob Orr. <a href="http://www.cbsnews.com/stories/2008/08/07/eveningnews/main4329769.shtml?source=mostpop_story">Reported in CBS News</a><br /><br /><strong>Cyber-security experts warn of Olympics spam</strong><br /><br />Singapore: Cyber-security experts warned Internet users of a deluge of viruses and spam during the Beijing Olympic Games, with those reading Chinese at a higher risk, news reports said Friday.<br />E-mail messages with headers such as "Beijing Olympics Cancelled" or "Beijing Olympics 2008 Lottery Promotion" should not be opened, the experts told The Straits Times. <a href="http://www.bangkokpost.com/sportsplus/sportsplus.php?id=129427">Reported in Bangkokpost</a><br /><br /><strong>Beckstrom on cybersecurity</strong><br /><br />LAS VEGAS — Cybersecurity is hampered by a lack of understanding about the physics and economics of the networks we are trying to defend, according to Rod Beckstrom, director of the Homeland Security Department’s National Cyber Security Center, said Thursday at the Black Hat Briefings.<br /><br />Risk management is a process of balancing security efforts against an acceptable level of risk because absolute security is not possible. But Beckstrom, speaking at the Black Hat Briefings yesterday, said we have no method for valuing our networks or measuring the effectiveness of our security. <a href="http://www.gcn.com/online/vol1_no1/46849-1.html">Reported in GCN</a><br /><br /><strong>Google in a legal spot over blog post</strong><br /><br />MUMBAI: Google India, the domestic subsidiary of the high-profile Silicon Valley web search company, is facing defamation charges from a Mumbai-based firm, Gremach Infrastructure Equipments & Projects.<br /><br />The company has filed a lawsuit against Google for hosting a series of articles on its blogging site, campaigning against its mines in Mozambique. In an interim order, the Bombay High Court has asked Google India to furnish information about the blogger. The case’s outcome will have far-reaching implications for the development of cyber law in India. <a href="http://economictimes.indiatimes.com/Infotech/Google_in_a_legal_spot_over_blog_post/articleshow/3362518.cms">Reported in Economic Times</a><br /><br /><strong>Egypt demanding data from cyber cafés users: NGO</strong><br /><br />CAIRO (AFP) — An Egyptian NGO on Saturday accused the Egyptian authorities of forcing cyber cafés to gather personal information on Internet users, saying the measure was a violation of privacy.<br /><br />"The Egyptian government imposed a new measure which increases the extent of censorship on Internet users and violates their right to privacy," the Arabic Network for Human Rights Information said in a statement. <a href="http://afp.google.com/article/ALeqM5hN_tktRSmeojLOOn65lVULB4lj8A">Reported in AFP.Google</a><br /><br /><strong>Funcom employee axed over cyber-sex</strong><br /><br />Age of Conan developer Funcom have sacked a moderator this week, after the employee was caught engaging in online naughtiness. <a href="http://play.tm/story/20268">Reported in Play.TM</a><br /><br /><strong>Ex-convict indicted in cyber stalking case against woman<br /><br /></strong>A former Des Plaines man has been indicted by a Cook County grand jury on charges he sent threatening e-mails to a woman whom he allegedly has pursued since 2000, prosecutors said Friday. <a href="http://www.chicagotribune.com/news/local/chi-stalker-indict-both-09-aug09,0,1492653.story">Reported in ChicagoTribune</a><br /><br /><strong>Man held for cyber crime; sells ex as call girl on website<br /><br /></strong>CHENNAI: The cyber crime cell of the Central Crime Branch picked up a database manager of a private firm for posting a girl's photograph and mobile number on a networking site and describing her as a call girl available for service. <a href="http://timesofindia.indiatimes.com/Chennai/Man_held_for_cyber_crime_sells_ex_as_call_girl_on_website/articleshow/3358844.cms">Reported in Time of India</a><br /><br /><strong>Cyber crime on rise; public warned on posting pics</strong><br /><br />CHENNAI: Do you share photographs with friends on social networking sites? Then beware, for chances are high that your morphed picture, obscene of course, will be doing the rounds in cyberspace. Worse, your cell will never stop ringing with calls from strangers who want sexual favours. <a href="http://timesofindia.indiatimes.com/Chennai/Cyber_crime_on_rise_public__warned_on_posting_pics/articleshow/3358846.cms">Reported in Times of India</a><br /><br /><strong>The Cyber Highway to Dubai</strong><br /><br />While Dubai is undergoing significant growth and business expansion, its Internet sophistication remains behind the curve, writes branding expert Naseem Javed. Companies in Dubai must harness the power of online resources to maximize their potential, he writes. <a href="http://www.ecommercetimes.com/story/The-Cyber-Highway-to-Dubai-64134.html">Reported in E-commerce Times</a><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com0tag:blogger.com,1999:blog-3188575481562822422.post-33069171595926018752008-08-08T10:30:00.003+05:302008-08-08T10:34:59.785+05:30Cyber Law Update August 2008 - Issue no. 4<p><strong>India</strong></p><p><strong>Tech-savvy cyber crooks could steal your Net identity<br /></strong>Technology exists to prove a malicious e-mail did not originate from your PC<br /></p><p>When several television channels received e-mails last week claiming credit for the bomb blasts in Ahmedabad on behalf of an outfit that called itself the Indian Mujahideen, the police traced the mail through an IP, or Internet Protocol, address to the e-mail account of a Navi Mumbai resident. Many of the same channels wasted no time to flash headlines that suggested that an American national was somehow involved in the “terror mail.” <a href="http://www.hindu.com/2008/07/31/stories/2008073157592000.htm">Reported in Hindu</a><br /><strong></strong></p><p><strong>Use of e-mails for cyber-crimes and terrorism<br /></strong><br />The technical aspects of cyber-law are a headache for the law enforcement agencies and judicial system in India. Very few law enforcement officers, public prosecutors and judges are aware about the technical aspects of ICT and its uses and abuses. <a href="http://www.merinews.com/catFull.jsp?title=Use%20of%20e-mails%20for%20cyber-crimes%20and%20terrorism&articleID=138448">Reported in MeriNews</a><br /></p><p><strong>Terror mail: BMC to take precaution for its WiFi project<br /></strong></p><p>The Ahmedabad terror e-mail, which was sent by hacking into the Internet Protocol address of a US national living in Navi Mumbai, has prompted the Brihanmumbai Municipal Corporation to take precautionary measures before it launches its ambitious WiFi project next year. The police cyber crime cell has also asked the civic body to take help from its experts and adequate measures before launching the project. <a href="http://www.expressindia.com/latest-news/Terror-mail-BMC-to-take-precaution-for-its-WiFi-project/344865/">Reported in Express India</a><br /></p><p><strong>Cyber cafe owner taken in police custody<br /></strong></p><p>A local court today remanded a cyber cafe owner in 14 days police custody for creating city-wide panic by sending an e-mail threatening bomb explosions.Kaushik Basu, the cyber cafe owner and a resident of Salt Lake, was arrested last night and charged with waging war against the country, threat to cause death or grievous hurt and criminal intimidation by anonymous communication which, according to the police, is serious offence. <a href="http://www.saharasamay.com/samayhtml/articles.aspx?newsid=103229">Reported in SaharaSamay</a><br /></p><p><strong>Police plans to check cyber cafes turning terror hubs<br /></strong></p><p>HYDERABAD: As terrorists are going hi-tech and giving advance information about their strike plan using the Internet, the Hyderabad police are seriously planning to formulate rules and regulations for cyber cafes. <a href="http://timesofindia.indiatimes.com/Hyderabad/Police_plans_to_check_cyber_cafes_turning_terror_hubs/articleshow/3304701.cms">Reported in Times of India</a><br /></p><p><strong>Delhi Police gets first batch of cyber experts<br /></strong></p><p>Cyber crime increasing at the rate of 100% annuallyNew Delhi: With a whopping 100 per cent increase in cyber crimes annually, the Cyber Cell of Delhi Police will require more trained personnel to fight white collar crimes. In a first-of-its-kind effort, the first batch of 100 investigating officers of Delhi Police and two officers of Central Bureau of Investigation (CBI) were handed certificates in ‘Cyber Crime Investigation and Computer Forensics’ on Tuesday. <a href="http://news.in.msn.com/national/article.aspx?cp-documentid=1598413">Reported in MSN</a><br /><br /><strong>International<br /></strong></p><p><strong>Beijing Braces for Olympic Cyber-War<br /></strong><br />With the world’s eyes firmly focused on Beijing, officials and IT staff are bracing themselves for a flood of cyber-attacks … <a href="http://www.byteandswitch.com/document.asp?doc_id=160638&WT.svl=news1_1">Reported in Byteandswitch</a><br /></p><p><strong>Max24.pl becomes the latest victim of cyber crime<br /></strong></p><p>A large Polish Internet store lost over zł.1 million in three days due to a hacker attack, and according to estimates, the European economy is losing euro 65 billion annually due to cyber-crime. <a href="http://www.wbj.pl/article-42043-max24pl-becomes-the-latest-victim-of-cyber-crime.html?typ=pam">Reported in WBJ</a><br />Source: Gazeta Wyborcza<br /></p><p><strong>International phishing gang busted<br /></strong><br />US authorities have charged 38 members of an international criminal gang that allegedly used spam e-mails to steal bank account details and passwords from thousands of customers. <a href="http://www.finextra.com/fullstory.asp?id=18507">Reported in FINEXTRA</a><br /></p><p><strong>IBM X-Force Report: Cyber Threats Accelerate, Browser Vulnerabilities Proliferate in First Half of 2008<br /></strong><br />Mid-Year Report From IBM Internet Security Systems X-Force(R) Finds 94 Percent of Browser-Related Exploits Occurred Within 24 Hours of Vulnerability Disclosure. <a href="http://money.cnn.com/news/newsfeeds/articles/marketwire/0419875.htm">Published in CNN</a><br /><br /><strong>US Senate polishes new teeth for cyber cops<br /></strong></p><p>The US Senate has passed a bill to strengthen the hands of federal prosecutors who fight computer crime by removing some of the more common hurdles in prosecuting online miscreants. <a href="http://www.theregister.co.uk/2008/08/01/senate_cyber_crime_bill/">Reported in the Register</a><br /><br /><strong>New Guidelines Aim to Reduce Fraud</strong></p><p>US: New guidelines for fighting fraud have been released jointly by three leading professional organizations. “Managing the Business Risk of Fraud: A Practical Guide” is sponsored by the Association of Certified Fraud Examiners (ACFE), the American Institute of Certified Public Accountants (AICPA), and The Institute of Internal Auditors (IIA). Principles for establishing effective fraud risk management, regardless of the type or size of an organization, are outlined in the guide.<br /><br />“Managing the Business Risk of Fraud: A Practical Guide” can be downloaded for free from the sponsoring organizations’ Web sites at <a href="http://www.acfe.com/" target="_blank">http://www.acfe.com/</a>, http//<a href="http://www.aicpa.org/" target="_blank">www.aicpa.org/</a>, and <a href="http://www.theiia.org/" target="_blank">http://www.theiia.org/</a>.<br /></p><p><strong>U.S. government cyber-security worse than previously thought<br /></strong></p><p>The latest report from ZATZ Publishing highlights a surprising lack of government record-keeping oversight, along with critical cyber-security gaps that without proper records management, America won't have critical records of the operation of their government. <a href="http://www.echannelline.com/usa/story.cfm?item=23559">Reported in EchannlLine</a><br /><br /><strong>Cyber-bully advice<br /></strong></p><p>In her new book 101 Facts about Bullying: What Everyone Should Know, author Meline Kevorkian offers suggestions for overcoming cyber-bullying. For tips for parents and kid read an article <a href="http://www.miamiherald.com/1060/story/617421.html">Published in Miami Herald</a></p><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com3tag:blogger.com,1999:blog-3188575481562822422.post-24326387035695906422008-07-26T19:36:00.004+05:302008-07-28T21:11:59.794+05:30Cyber Law Update July 2008 - Issue no. 3<p><strong>San Francisco cyber attack a wake up call for Canadian IT managers<br /></strong><strong>US:</strong> A disgruntled network administrator who locked up the multi-million dollar computer system for the city of San Francisco is now behind bars. But Canadian tech experts warn a cyber terrorist could do the same thing this side of the border if we don't take precautions. </p><p><br />A cyber attack that virtually hijacked the controls of more than 60 per cent of San Francisco's municipal network should serve as a wake up call for IT managers in Canadian government jurisdictions, say technology experts. </p><p><br />He was arrested for allegedly changing passwords to San Francisco's computer system and effectively "locking up" the city's multi-million dollar fibre WAN (wide area network) system that handles sensitive data, critical IT operations, and much of the municipality's network traffic. <a href="http://www.itbusiness.ca/it/client/en/home/news.asp?id=49188">Reported in ITBusiness.ca</a> </p><p>Once Henry Ford remarks “Failure is the opportunity to begin again more intelligently.” Why to wait for failure. Act now proactively for better tomorrow as suggested by Chanakya, Indian Politician, strategist and writer, 350-275 BC, “As soon as the fear (say fear of failure) approaches near, attack and destroy it.”<br /><em></p></em><strong></strong><p><strong>Lithuanian tax office website hit by cyber attack<br /></strong><strong>US:</strong> Lithuania said it suffered another foreign cyber attack over the weekend when the state tax office's website was swamped with requests, but no damage was sustained. <a href="http://www.guardian.co.uk/business/feedarticle/7666819">Reported in Guardian</a><br /><br /><em>Even website of Indian Income Tax needs to plug few vulnerablities as mentioned in my comments on “Are your online tax returns safe?” by Ashwin Mohan of CNBC-TV 18.<br /><br /></em><strong>SMBs in denial about cyber crime: McAfee<br /></strong>McAfee discovered that a third (32 percent) of North America's small- and medium-sized businesses (SMBs) have been attacked more than four times by cybercriminals in the last three years. The impact was that a quarter of those attacked (26 percent) took an entire week to recover. Canadian businesses were most affected with a third (36 percent) taking a week to recover. </p><p><br />"SMBs are truly exposed to the same cyber threats as their enterprise counterparts," said Darrell Rodenbaugh, senior vice-president of the mid-market segment at McAfee. "In fact there are some experts that would say they are greater targets because it is popularly known [SMBs] don't have the same protection in place that their enterprise counterparts do." </p><p><br />He added the reality is IT managers in SMBs face a paradox. They understand that are at risk but they are faced with limited resources and a lack of time. <a href="http://www.echannelline.com/usa/story.cfm?item=23520">Reported in eChannelLine</a><br /><br /><strong>Cyber thieves can easily take advantage<br />US:</strong> More than 75% of bank websites were flawed and could expose customers to cyber thieves eyeing their money or their identity, according to a survey by the University of Michigan. <a href="http://economictimes.indiatimes.com/quickiearticleshow/3277339.cms">Reported in EconomicTimes</a>. Similar article on FRAUD ALERT: Cyber-bank robbers hit online accounts <a href="http://www.courierpostonline.com/apps/pbcs.dll/article?AID=/20080722/BUSINESS01/807220326/1003/BUSINESS">published in CourierPostOnline</a></p><p><strong>Cyber crime looms large over Middle East netizens</strong></p><strong><p></strong><strong>Dubai:</strong> Internet users in the Middle East are under increasing threat from cyber crimes, prompting large spending on web security, WAM reported Thursday quoting experts. </p><p><br />Web threats peaked in March to 50 million incidents of hacking from approximately 15 million in December 2007, a study by Internet security firm Trend Micro said. </p><p><br />Source: Indo-Asian News Service <a href="http://computing.in.msn.com/articles/article.aspx?cp-documentid=1570623">Reported in Computing</a><br /></p><p><strong>Man gets 41 years in prison for cyber fraud<br />Pak: </strong>A court has sentenced a man to 41-year prison term for credit card fraud, the first time a person convicted for cyber crimes has been punished so severely in Pakistan. <a href="http://timesofindia.indiatimes.com/Heads_and_Tales/Man_gets_41_years_in_prison_for_cyber_fraud/articleshow/3249326.cms">Reported in Time of India</a><br /><br /><strong>Cyber relationships aren't 'harmless fun'</strong><br /><strong>US:</strong> Cyber relationship are "harmless fun" but harmless and commonly leads to serious relationship problems.<br /></p><p>It is actually dealing with a problem of an emotional cyber-affair. In these cases the spouse has found someone on the Internet with whom he or she has formed an emotional connection. Such a connection outside the marriage is always wrong and detrimental to that primary relationship. These "cyber-affairs" have become a source of marital problems and often lead to divorce. <a href="http://www.mywesttexas.com/articles/2008/07/20/news/opinion/columns/jim_may/family_matters_7-20.txt">Reported in MyWestTexas</a><br /></p><p><strong>Teen Claims She Was Bullied In School & Online<br /></strong><strong>US:</strong> A South Florida teenager has filed a lawsuit against her private, all-girls school in Miami after she became the victim of an alleged vicious bullying campaign that spread from the classroom to online social networks. <a href="http://cbs4.com/local/Cyber.Bullying.bullied.2.778992.html">Reported in CBS4</a></p><p><br /><strong>Parents must act now to control cyber culture among children </strong></p><p><strong>Kenya:</strong>The pendulum of opinion on the impact of computers and the Internet on children will always swing. Is the technology good or bad for our kids?<br /></p><p>Should the State control access or should it be left to parental guidance and “filter” software? <a href="http://www.nationmedia.com/dailynation/nmgcontententry.asp?category_id=25&newsid=127609">Reported in NationalMedia</a><br /><br /><strong>Strict action to be taken against fake mobile SMS and petrol smuggling<br /></strong><strong>Pak:</strong> FIA Cyber crime cell will take strict action against the elements involved in spreading the fake information through Mobile SMS regarding the down fall trend in Stalk Exchange. Such activity would be consider as cyber crime. <a href="http://www.onlinenews.com.pk/details.php?id=130807">Reported in OnlineNews.com</a><br /><br /><strong>Cyber Defamation<br /></strong><strong>Korea: </strong>Justice Minister Kim Kyung-han's plan to introduce a ``Cyber Defamation Law'' has sparked controversy over how to guarantee freedom of expression on the Internet. The plan is part of a series of government measures to crack down on distributors of fraudulent and slanderous information in cyberspace.<a href="http://www.koreatimes.co.kr/www/news/opinon/2008/07/202_28066.html"> Reported in KoreaTimes</a><br /></p><strong></strong><p><strong>Cyber cafes asked to maintain record of customers<br /></strong><strong>India: </strong>In a bid to track cyber crimes, the District Magistrate ordered cyber cafes and mobile phone shops to maintain records of their customers. <a href="http://www.saharasamay.com/samayhtml/articles.aspx?newsid=102816">Reported in SaharaSamay</a></p><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com1tag:blogger.com,1999:blog-3188575481562822422.post-71577548528713575912008-07-19T09:18:00.002+05:302008-07-19T09:27:52.967+05:30Comments on “Are your online tax returns safe?” by Ashwin Mohan of CNBC-TV 18This has reference to the report “Are your online tax returns safe?” by Ashwin Mohan of CNBC-TV 18. <a href="http://moneycontrol.com/india/news/current-affairs/are-your-online-tax-returns-safe/23/30/347843">Article published and aired on CNBC 18</a><br /><br />Correction…<br /><br />“Three pieces of basic information ‑ name, date of birth, and pan number ‑ is all that an aspiring hacker requires.”<br /><br />No, only two information, name and date of birth (date of incorporate in case of company). Go to know your PAN page <a href="https://incometaxindiaefiling.gov.in/knowpan/knowpan.jsp">https://incometaxindiaefiling.gov.in/knowpan/knowpan.jsp</a><br />…you will get PAN details.<br /><br /><strong>Possible solution to minimize this problem:<br /></strong><br />“Uncertainty is the only certainty there is and knowing how to live with insecurity is the only security”<br /><br />- John Allen Paulos in his book A mathematician Plays the Sock Market<br /><br /><strong>Steps to be taken by PAN-holders:<br /></strong><br />1. Registered yourself before a hacker register on your behalf.<br />2. Check your registered email id regularly to ensure that your password has been not reset by unathorised person and report the same at ask@incometaxindia.gov.in<br /><br /><strong>Suggestions to Income-tax department:<br /></strong>1. Do not authorized PAN-holders (hackers) to select new password. Alternatively, email it to their registered email id. In the event, PAN-holders do not recollect or changed their registered email id then courier it to their registered address.<br />2. Incorporate additional security measures such as secret question, strong password etc.<br />3. Rather than sending an email confirming registration/change of password send an email with the link for conformation.<br /><br /><strong>Warning to budding hackers:<br /></strong><br />1. Tracking down your IP address and locating you will be not a tuff job for our IT savvy police.<br />2. You will be jailed for 3 years and/or liable for a fine upto 2 lakhs under section 66 of the Information Technology Act, 2000.<br /><br /><strong>Suggestions to CNBC 18:<br /></strong>1. Kindly share such information to the relevant authority before airing it. Interest of public is paramount. Please respect it.<br />2. You should have given possible solutions rather then just highlighting problem. Nobody is prefect.<div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com2tag:blogger.com,1999:blog-3188575481562822422.post-29096356597869702622008-07-11T18:27:00.003+05:302008-07-11T18:50:02.737+05:30Cyber Law Update July 2008 - Issue no. 2<p><strong>UK:</strong> The Swiss Institute of Technology, Google and IBM conducted the study and found 600 million users had not updated their browsers. "Failure to apply patches promptly or missing them entirely is a recipe for disaster," the report said. Cyber criminals are frequently using websites to attack users, it added. <a href="http://news.bbc.co.uk/1/hi/technology/7494988.stm">Reported in BBC</a><br /></p><p>A <strong>German </strong>court has ruled that banks are liable for phishing attacks on customers. <a href="http://www.computerweekly.com/Articles/2008/07/07/231385/banks-are-liable-for-phishing-attacks-on-customers-says-german.htm">Reported in ComputerWeekly.com</a><br /><strong></strong></p><p><strong>Brazil: </strong>Google signed an agreement with Brazilian public prosecutors to help combat child pornography on its social networking site Orkut. <a href="http://www.msnbc.msn.com/id/25514386/">Reported in MSNBC</a><br /><strong></strong></p><p><strong>Iran: </strong>The death penalty for those who promote corruption, prostitution and apostasy on the internet is being considered by Iran’s parliament. <a href="http://www.asianews.it/index.php?l=en&art=12671&size=A">Reported in AsianNews</a><br /><strong></strong></p><p><strong>US:</strong> Missouri Governor signed legislation that aims to fight cyber-bullying by updating the state's current harassment and stalking laws to include communication over the Internet and through other electronic means. <a href="http://www.senate.mo.gov/08info/BTS_Web/Bill.aspx?SessionType=R&BillID=147">More</a><br /><strong></strong></p><p><strong>Haryana: </strong>Sirsa District Magistrate has ordered all the cafes owners in the district to install close circuit TV cameras in their premises with immediate effect. <a href="http://economictimes.indiatimes.com/News/PoliticsNation/Cyber_cafes_ordered_to_install_CCTV_cameras/articleshow/3188761.cms">Reported in Economic Times</a><br /></p><p><strong>Security group fights back against cyber threats </strong></p><p><strong><br /></strong>Cisco, Intel, IBM, Microsoft and Juniper Networks will collaborate as part of the new Industry Consortium for Advancement of Security on the Internet (Icasi), which hopes to improve response times to online attacks that target multiple products.<br />The group asserted that industry cooperation is needed as hackers and other cyber criminals are employing ever more sophisticated techniques to breach security defences.Recent research conducted by Fortify shows that four in five (81 per cent) IT professionals believe that their applications are vulnerable to breaches, with nearly a third of of people working in the sector describing themselves as 'very worried' about the security situation. <a href="http://www.bcs.org/server.php?show=conWebDoc.20039">Reported in BCS</a><br /></p><p><strong>Police caution 13-year-old girl over sex pictures on MySpace </strong></p><p><strong><br />New Zealand: </strong>A 13-year-old girl has been cautioned by New Zealand police after sexually explicit pictures of another 13-year-old girl were posted on social networking site MySpace without her knowledge. <a href="http://www.stuff.co.nz/4605417a12.html">Reported in Stuff</a><br /></p><p><strong>Is cyber sex really cheating? </strong></p><p><strong><br />US:</strong> That's one question raised by Christie Brinkley's sensational courtroom allegations that estranged husband Peter Cook indulged in a secret $3,000-a-month Internet porn habit she claims contributed to the collapse of their seven-year marriage. <a href="http://www.nydailynews.com/lifestyle/2008/07/07/2008-07-07_christie_brinkley_case_raises_the_questi.html">Reported in NYDailyNews</a><br /></p><p>Who is Christie Brinkley?<br />Christie Brinkley is more than one of America’s most successful and recognizable models appearing on over 500 magazine covers worldwide. She also excels as an artist, writer, photographer, designer, actress, philanthropist environmentalist, and political activist. Combining her modeling experience with her artistic talents and diverse interests, Christie’s career over the years has been interesting and dynamic.</p><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com0tag:blogger.com,1999:blog-3188575481562822422.post-83987485164692121942008-07-07T17:00:00.003+05:302008-07-07T17:08:31.498+05:30Vulnerabilities in ATM NetworkHackers broke into Citibank's network of ATMs inside 7-Eleven stores and stole customers' PIN codes, according to recent court filings that revealed a disturbing security hole in the most sensitive part of a banking record . <a href="http://www.tech2.com/india/news/general/citibank-atm-breach-reveals-pin-security-problems/40051/0">More </a><br /><br />It is just the tip of the iceberg.<br /><br /><strong>List of vulnerabilities:</strong><br /><br />1. The bank associates with other banks to enable their customers to withdraw cash from ATM centers of the bank or its associates. But the bank has no control over network of its associates. Another problem, all of them are not using the same technologies and security measures.<br /><br />2. Most of the times, dedicated servers are not being used by the Bank. Why?? Must be commercial constrains.<br /><br />3. PINs are not always encrypted while it is transmitted from ATM center to the bank servers. It travels through many servers & networks before it reaches the Bank server and all of them are not secured enough to protect your PINs.<br /><br />4. ATM’s software are remotely diagnosed and repaired over Internet, which may provide opportunities for hackers to secure access onto the bank server.<div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com1tag:blogger.com,1999:blog-3188575481562822422.post-56941663796467505552008-07-03T11:35:00.001+05:302008-07-11T18:47:40.051+05:30Cyber Law Update June 2008 - Issue no. 1<p><strong>India</strong></p><p> Recently, the Delhi High Court allowed proceedings against Avinash Bajaj, managing director of Baazee.com, for allowing an auction of a pornographic video clip involving two students on his website. <a href="http://www.indlawnews.com/newsdisplay.aspx?eaa9c293-7c1a-43bf-9e92-209068c86b92">Reported in IndiaLawNews</a> </p><p><br />China's intensified cyber warfare against India is becoming a serious threat to national security. <a href="http://indiapost.com/article/perspective/3091/">Reported in Indiapost</a> </p><p><br />International Sri Lanka is working out effective ways of fighting cyber crime by strengthening awareness on Information Security. <a href="http://www.sundaytimes.lk/080629/FinancialTimes/ft314.html">Reported in Sunday Times</a> </p><p>A group or individual by the name "Anonymous" has hacked and taken over two of MTV music websites and defaced them with racial and offensive images. <a href="http://www.mtv.com/news/articles/1590117/20080627/id_0.jhtml">Posted on MTV website</a> </p><p>A Missouri woman accused of taking part in a MySpace hoax that ended with a 13-year-old girl's suicide has so far avoided state charges -- but not federal ones. <a href="http://www.mail.com/Article.aspx?articlepath=APNews\Top%20Headlines\20080616\Internet_Suicide_20080616.xml&cat=topheadlines&subcat=&pageid=1">Reported in Mail</a> </p><p>One in three IT professionals abuses administrative passwords to access confidential data such as colleagues' salary details, personal e-mails, or board-meeting minutes, according to a survey. <a href="http://www.informationweek.com/story/showArticle.jhtml?articleID=208700605">Reported in Information Week</a></p><p><strong>Career </strong></p><p>The role of information security managers is rapidly changing to focus on business needs instead of technology, according to a recent survey. <a href="http://www.newswiretoday.com/news/35710/">Reported in News Wire Today</a><script src="http://www.google-analytics.com/urchin.js" type="text/javascript"><br /></script><br /><br /></p><script type="text/javascript"><br />_uacct = "UA-4887885-1";<br />urchinTracker();<br /></script><div class="blogger-post-footer"><script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-4887885-2");
pageTracker._trackPageview();
</script></div>Dipak Parmarhttp://www.blogger.com/profile/06292665759395912858noreply@blogger.com3