Tags » Cyber Crime

Members' Update

Atmabodh organised the final round Adyopant Legal Rights Awareness Street Play Competition on 14.04.2015 at Palika Bazar Rooftop Park. Sh. Dharmesh Sharma, Member Secretary, Delhi State Legal Services Authority was the Chief Guest and Prof. 33 more words

Tips for staying safer on Facebook

I wouldn’t touch Facebook with a bargeman’s pole, but for those who do.. (and please, direct your Facebooking friends and family to this tutorial also.) 236 more words


My Identity stolen a third time ??? Yep ... Friday

As a financial advisor we drink the EXACT same cool aid we have for clients   … Same investments, same conservative philosophy, long-term thinking, tax strategies, generally optimistic, but skeptical when necessary  … … 170 more words

Investing/Financial Planning

RSA Conference 2015: Cyber-Security Experts Point to Cyber-Criminals as Biggest Threat

In a finding that comes as a surprise, the majority of threat actors attacking organisations are cyber criminals. This is the view of hundreds of cybersecurity professionals and experts who completed a wide-ranging survey for ISACA (Information Systems Audit and Control Association) and RSA Conference. 534 more words


The war over Zero Rating: All you need to know about net neutrality

A telco offering users free access to one website, while charging for other websites is discriminatory, opponents to zero rating argue.

The crescendo of shrill cries outside forced the top management of Flipkart into quiet introspection within. 2,994 more words

Why India Inc needs to wake up to cyber crime ?

The email said very little. Dated January 29, 2015, it was from Graham Lawton of Leeds district police, Yorkshire. Somewhere in Lower Parel, inside an office in Mumbai’s congested mill area, the person to whom the email was addressed to glanced through it. 1,673 more words


MitM Attacks Pick Up Speed – A Russian Coder Launches a New Web Injection Coding Service

In a successful MitM attack, the hacker infiltrates a web session between a bank and a bank customer, intercepts the messages they are exchanging, including credentials and classified information, and injects new messages, all without arousing the suspicion of either party. 407 more words

Cyber Intelligence