What is data diddling ? Data Diddling can be defined as illegal or unauthorized fraudulent alteration of data. It is the process of modifying data before or after it is entered into the system, generating a faulty output. What are the threats ? While processing large amounts of data, criminals either alter the input or
Blog
Cyber Terrorism & Cyber Warfare What is cyber terrorism ? Cyber Terrorism can be defined as activities done with the intention to threaten unity, integrity, security or sovereignty of a country or terrorize people or sections of people by way of Unauthorized access Denying legitimate access/ service Disrupting services Damage critical information infrastructure etc. What
In Section 61 to 65 Indian Evidence Act, the word “Document or content of documents” have not been replaced by the word “Electronic documents or content of electronic documents”. Thus, the omission of the word, “Electronic Records” in the scheme of Section 61 to 65 signifies the clear and explicit legislative intention, i.e. not to
According to the technical paper from SophosLabs. Document exploitation is a well-known method of distributing malware. SophosLabs explores why we’re seeing more document exploitation malware in the wild, and investigates the long-standing popularity of a document exploitation generator called Ancalog, which is widely commercially available. Ancalog builder supports several methods for malware distribution using different file formats. Features :
Back in Christmas of 2015, while I was home with my sister, we got addicted to this great word-game from Microsoft — Wordament. It was pretty addictive a game and got us gripped for most of our time back then. Besides all the good things about the game, the only sore point was — I could never beat her.
Cyber Bullying & Stalking What is Cyber Bullying? Cyber bullying may be defined as the use of online and digital technologies to hurt, ridicule, embarrass or inflict harm on others. Who are Cyber Bullies? Bullies are usually vocally abusive and persistent. They often gang up on their victims. Cyber bullies are those people who carry
17 Oct 2016…IT Act turned sweet 16 ..a age considered by few as entry to freedom while by some as turning mature and responsible. Digital India, Skill India, IT Act, Smart cities….are words of the day.Everyone uses them as at their will.Few serious infosec enthusiasts ( Triveni Singh , Naavi and few more of them)
It’s the talk of the town, everyone is talking about it and even falling prey to it. All so called experts and information security enthusiasts have shifted their focus and resume highlight point to ransomware. It’s money for the creator and also for the publisizers in form of speakers and solutions provider. Every what’s app
Cybercrime-as-a-Service (CaaS) has been a emerging move throughout Dark Web forums for several years. Now a days cyber criminal no longer need to rely on their own abilities and exploits resources because in deep web many sites / forum offer a wide range of services for cybercriminals to leverage. Cybercriminals can purchase CaaS services and launch their own
When I power on the mobile (Samsung SM-A800F) to connect it to UFED this screen is shown. Mobile starts in ODIN Mode. Unless it doesn’t start I can’t connect it to UFED and carry out analysis. Few questions -Why is it starting in this mode. Is it been wiped? -Why is the solution? -Should the