Author Archives: Web_Tanmay

Web Jacking

What is Web Jacking ? Illegally seeking control of a website by taking over a domain is known as Web Jacking. It is similar to hijacking. In this kind of attack, the actual website is never touched. Instead, the system (DNS) that resolves website URL to IP address is compromised. The internet works on the

Digital Forgery

What is Digital Forgery ? Creating a fake copy or imitation of a document or an object with the intention to deceive is called forgery. It can involve everything from forging a signature, faking a masterpiece, creating a cheap replica of an expensive original device to faking government documents like a licence, birth certificate etc.

Cyber Pornography

What is Cyber Pornography ? Cyber pornography can be defined as pornographic material designed, published or distributed using cyber space as a medium. In India, viewing digital pornography is not a crime, but creating and distributing such material is. It is legal in most other countries. However, child pornography is illegal in all forms and

War Driving

What is War Driving ? War driving refers to the act of seeking out wi-fi networks by moving around with a computer or smart phone (or any equivalent device) to detect these networks. This in itself is not a crime. However, criminals usually hunt for open wi-fi networks or those with weak passwords that can

Source Code Theft

Source Code Theft

What is source code ? Source code is the blue-print of software. Source code is considered intellectual property. Computer programs or software cannot be created without source code. Source code is something that is generated by the programmer from his own skills and knowledge. Just as a cook is unwilling to share the recipe of

Identity Theft

What is Identity Theft? Impersonating someone without their knowledge by obtaining their personal and/or confidential information is called Identity Theft. What leads to identity theft? A lot of people are tricked into their confidential personal information to criminals by Phishing emails or Social engineering Malware discreetly installed onto your computer without your knowledge may steal

Data Alteration or Diddling

What is data diddling ? Data Diddling can be defined as illegal or unauthorized fraudulent alteration of data. It is the process of modifying data before or after it is entered into the system, generating a faulty output. What are the threats ? While processing large amounts of data, criminals either alter the input or

Cyber Terrorism & Cyber Warfare

Cyber Terrorism & Cyber Warfare What is cyber terrorism ? Cyber Terrorism can be defined as activities done with the intention to threaten unity, integrity, security or sovereignty of a country or terrorize people or sections of people by way of Unauthorized access Denying legitimate access/ service Disrupting services Damage critical information infrastructure etc. What

Cyber Bullying & Stalking

Cyber Bullying & Stalking What is Cyber Bullying? Cyber bullying may be defined as the use of online and digital technologies to hurt, ridicule, embarrass or inflict harm on others. Who are Cyber Bullies? Bullies are usually vocally abusive and persistent. They often gang up on their victims. Cyber bullies are those people who carry

Email Bombing

What is Email Bombing ? Email bombing is an attack which involves sending massive amount of emails to a particular system consuming the system, storage or network resources. What are the threats ? Email bombing can result in overloading the server with multiple requests which is beyond the server capacity to handle. It can fill