Category Archives: Law

Can Criminal cases be revisited if Sec 65B certificate is absent? .. NAAVI

Can Criminal cases be revisited if Sec 65B certificate is absent? .. NAAVI

Posted by Vijayashankar Na on July 21, 2017 on his blog LINK : http://www.naavi.org/wp/criminal-cases-may-be-revisited-if-sec-65b-certificate-is-absent/ In what can be considered as a serious concern to criminal cases where decisions have already been taken based on electronic evidence without Sec 65B certificate, Supreme Court has debated the issue of challenge of Electronic Evidence at the appeal stage if

Introduction to Cyber Crime

Introduction to Cyber Crime

We live in the ‘Information Age’. There is an abundance of information freely flowing and easily available for access. Computers, mobile phones, digital cameras and other electronic gadgets have become an inseparable part of our daily lives. On the other hand, anonymity, lack of defined boundaries and restrictions of information access, and a growing dependency

Malware Attacks

Malware Attacks

What is Malware? Malware or Virus is another term for a malicious programme. It performs unwanted actions on the computer which include Intentional programme crashes Unwanted pop-ups Stealing user confidential data Destruction of data or hardware Based on their characteristics, we can classify them into categories such as Worm Trojan Keylogger What is a Worm?

Internet Time & Bandwidth Theft

What is Internet time/Bandwidth theft? Internet time/ bandwidth theft is a crime where the internet connection of one person (the victim) is used by an unauthorised person (the criminal). This is usually done by getting access to the user’s internet account details, such as user name and password, provided by the service provider. This access

Salami Attack

What is a Salami Attack? A salami is a slice of meat. An attack is made on the computer system or network where a cybercriminal successfully transfers a small amount of money (a very negligible amount) from the victims file or bank account to his account. The transferred amount is a small slice of a

Use of Encryption in Cyber Crimes

What is Encryption? Encryption is the process of converting readable text (data) into an unreadable form (code or cipher text) using a mathematical algorithm. The reverse of this process, i.e. converting cipher text or encrypted data back into its original form is called Decryption. There are 2 types of encryption: Symmetric Asymmetric Both types of

Web Defacement

What is Web Defacement? Web Defacement is an attack on the website where the attacker damages the visual appearance of the website by either altering or replacing the originally present content, images or designs on the website. The common objective of this attack is to damage the credibility of the entity/ individual owning the website.

Online Gambling

What is Online Gambling? The act of betting money via the internet is known as Online Gambling. In India, gambling is illegal but it is permitted in many other countries. The availability of websites facilitating gambling and readily available internet access has made gambling easily accessible. What are the threats? Online Gambling is accessible online