Category Archives: Security

IT Act still needs to be observed

IT Act still needs to be observed

The Information Technology Act, 2000 is so far, the most effective act which deals with cybercrime and electronics in India. The Act 2000 comprise of 94 section, divided among 13 chapters and 4 schedule. The very Act applies to whole India and also to the citizens of other countries who found guilty in cybercrime which

Use of Social Media by LEA

Use of Social Media by LEA

Use of Social Media by LEA Law enforcement agencies, like many other types of organizations, are finding ways to use social media to disseminate information to the public. In fact, police agencies in larger cities are finding that their communities expect them to have an online presence on platforms such as Twitter, Facebook, and YouTube.

Ancalog Document Silent Exploit Builder – Cyber-Criminal Tool

Ancalog Document Silent Exploit Builder – Cyber-Criminal Tool

According to the technical paper from SophosLabs. Document exploitation is a well-known method of distributing malware. SophosLabs explores why we’re seeing more document exploitation malware in the wild, and investigates the long-standing popularity of a document exploitation generator called Ancalog, which is widely commercially available. Ancalog builder supports several methods for malware distribution using different file formats. Features :

Festive Season of Ransomware

Festive Season of Ransomware

It’s the talk of the town, everyone is talking about it and even falling prey to it. All so called experts and information security enthusiasts have shifted their focus and resume highlight point to ransomware. It’s money for the creator and also for the publisizers in form of speakers and solutions provider. Every what’s app