The National Critical Information Infrastructure Centre (NCIIPC) was created on Jan 16 2014, under the NTRO, and celebrated it’s third foundation day with a conference at India Habitat Center in New Delhi. The author had the privilege to attend the event and listen to the leaders of national cyber security. This blog will be in
The Information Technology Act, 2000 is so far, the most effective act which deals with cybercrime and electronics in India. The Act 2000 comprise of 94 section, divided among 13 chapters and 4 schedule. The very Act applies to whole India and also to the citizens of other countries who found guilty in cybercrime which
Use of Social Media by LEA Law enforcement agencies, like many other types of organizations, are finding ways to use social media to disseminate information to the public. In fact, police agencies in larger cities are finding that their communities expect them to have an online presence on platforms such as Twitter, Facebook, and YouTube.
According to the technical paper from SophosLabs. Document exploitation is a well-known method of distributing malware. SophosLabs explores why we’re seeing more document exploitation malware in the wild, and investigates the long-standing popularity of a document exploitation generator called Ancalog, which is widely commercially available. Ancalog builder supports several methods for malware distribution using different file formats. Features :
Back in Christmas of 2015, while I was home with my sister, we got addicted to this great word-game from Microsoft — Wordament. It was pretty addictive a game and got us gripped for most of our time back then. Besides all the good things about the game, the only sore point was — I could never beat her.
It’s the talk of the town, everyone is talking about it and even falling prey to it. All so called experts and information security enthusiasts have shifted their focus and resume highlight point to ransomware. It’s money for the creator and also for the publisizers in form of speakers and solutions provider. Every what’s app
Cybercrime-as-a-Service (CaaS) has been a emerging move throughout Dark Web forums for several years. Now a days cyber criminal no longer need to rely on their own abilities and exploits resources because in deep web many sites / forum offer a wide range of services for cybercriminals to leverage. Cybercriminals can purchase CaaS services and launch their own