cyber

New Zeus Variant for Sale on the Black Market

The 0Day marketplace was a busy beaver this weekend. I’ve been waiting and watching Sphinx for the past 10 days to see if the 0Day admin would verify this new threat: sphinx New Zeus Variant On Sunday evening, Sphinx, a new variant of the Zeus banking trojan was admin-verified. Sphinx is coded in...

Read more...

Computer Ethics

Definition Computer Ethics is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. Computer ethics deals with the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and...

Read more...

What is Digital Evidence and the Nature of Digital Evidence

Digital evidence or electronic evidence is “any probative information stored or transmitted in digital form that a party to a court case may use at trial”. Section 79A of IT (Amendment) Act, 2008 defines electronic form evidence as “any information of probative value that is either stored or transmitted in...

Read more...

Crimes in which computer systems are used as tools/instruments

a.Financial fraud (Several sections under IPC, ITAA 2008 and other applicable laws) Financial frauds include business frauds, investment frauds, mass marketing frauds, offering jobs overseas, Nigerian Frauds, business opportunity frauds, etc., where unsuspecting people are lured in trap by the promise of such opportunities and deceived of their money and other valuables. b.Data...

Read more...

Crimes targeting computer systems

a. Hacking (Under Section 66 ITAA 2008) Hacking is a broader term and can be defined as gaining entry into a computer system without the permission, with an intention to cause loss, steal, or destroy the data contained in it. It is often done by people who are well versed with...

Read more...

Types of Cyber Crimes

Cyber crimes cover a wide range of illegal activities, which are either done solely using computer resources (as defined under Section 2 of ITAA, 2008) or, done in conjunction with traditional means using the computer resources and communication devices as tools to commit conventional crimes. The Information Technology (Amendment) Act,...

Read more...

Tools and Techniques used to Commit Cyber Crimes

Cyber Crimes make use of various tools and techniques and many of these tools are used for the commission of the cyber crimes and are installed on the victim’s systems through - exploitation of the vulnerabilities in the systems / networks or by surreptitiously gaining access to the victim’s systems...

Read more...

Cyber Crimes

There are various definitions of Cyber Crimes and couple of them are discussed below: Any violations of criminal law that involve knowledge of computer technology for their perpetration, investigation, or prosecution. — U.S. Department of Justice (DOJ) The communication addresses computer crime in its broadest sense as any crime involving the use...

Read more...

Overview of Cyber Crimes

Information Technology and the Internet have led to innovation and economic growth, but have also created new avenues for malicious actors to perpetrate crimes. The perpetrators range from sophisticated hackers to common criminals to foreign intelligence agencies and international terrorists. Cyber threats are increasing for governments, commercial enterprises and industry...

Read more...