Cyber Crime

Tue
19
Jul

ATM Skimmers - The problem and its solution

ATM Skimmers - The problem and its solution

About the ATM Skimmers and its business problem:

Skimmers are card readers that grabs the data from magnetic card stripe attached to the real payment terminals so that criminals can create cloned cards to steal money from the bank account. A successful skimming requires both a card skimmers (readers) and camera (to capture PIN) in order to steal card data. Criminal can easily capture your credit/debit card information with ATM skimmers. It is a device that fits inside or top of the ATM card acceptance slot to extracts the information stored in ATM magnetic stripe and additionally, uses hidden camera to capture PIN details while typing on keypad and then gains full access of your bank account. The card details would be sent to the criminal through Bluetooth/Wireless or physically to clone the cards as a next steps. The electronics data is encoded onto fraudulent cards and PINs are used to withdraw money from the customer’s bank account.

Fri
24
Jun

Cyber Crime and Cyber Law

Cyber Crime and Cyber Law

“Technology... is a queer thing. It brings you great gifts on one side and it stabs you in the back on the other. As the technology advances, risk too advances.”

In short and simple words every coin has two sides, and importantly both faces are opposite to each other. No doubt that our technological power increase but multiple side effects and hazards also escalate.

Someone has withdrew 1000 rupees from his PNB ATM card today, but balance deducted was 6000 buck, how is this possible? On enquiry, it was informed that he is a victim of a cyber crime.

Fri
12
Feb

Cyber Mafia - A major threat to your business

Cyber Mafia - A major threat to your business

We all have witnessed cybercrimes growing exponentially in recent years, started initially from social engineering to recent sophisticated APT and Malware attacks. These cyber-attacks were initially performed only for Self-admiration or individual gain perspective but later the trend changed and attacks are targeted and intended for monetary benefits.  Crypto locker Ransomware malware is one of the examples of such threats in the recent past, where all the documents of the target were encrypted and ransom was asked for providing the decryption key. Spear Phishing is another example where the confidential information like credit card details is stolen by appearing as your familiar website but, in fact, leading to the false site to steal user credentials.

Mon
04
Jan

Email - A Favourite Weapon for Cyber Criminals

Email - A Favourite Weapon for Cyber Criminals
Social engineering is a non-technical method of tricking people into splintering security process. It can be defined as  'A person taking a step on any act made by intrusion hackers which may or may not be in their interest'.
A common example - hacker calls an individual and by conversation tries to gain trust and then uses it to get access to sensitive information like bank account details(card no. , expiry date of ATM card). In this modern era,with increasing use of email, cyber criminals has started exploiting it for malicious purposes to take advantage of users.
There are various ways, few have been listed down:
 

1. Spam

Mon
28
Sep

Future Proofing Against Cyber Crime 2015 - Conference Briefing

On 23rd September, 2015 I attended a conference on 'Future Proofing Against Cyber Crime” conducted by EY Fraud Investigation & Dispute Services team in association with Achromic Point at Hotel Hilton, Mumbai. Main objective of this conference were:

 - Improve on investigation techniques to fight cybercrime more efficiently.

 - Be proactive and avoid cyber-attacks - prepare for the next cyber-attack and learn more about strategies to protect from cyber-crime

 - Discover innovative tools and new approaches in preventing cyber crimes

Sun
19
Jul

Deep Dark Web - The Internet Underworld

Deep Dark Web - The Internet Underworld

Ordinary web users like me will be shocked when they get to know more about Dark web. When I first heard about the existence of the Deep Web, I was really shocked. The size of Dark web is hundreds of times larger than the current web. As per reports, 96 percent of the internet is beyond search engines such as google and bing.

Before going to Dark web we shall go through the differences between Deep web and Dark web. We all know this is something related to internet.

Pages

Subscribe to RSS - Cyber Crime