LATEST VIRUS NAME..

    1.     Virus Name:     Virus:W32/Sality
   A malicious program that secretly integrates itself into program or datafiles.It spreads by integrating itself into more files each time the host program is run.
              
    2.     Virus Name:           Trojan-Downloader:W32/Hiloti
                   This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
              
    3.     Virus Name:  Trojan-Downloader:W32/Fakerean.gen!A
This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
              
    4.     Virus Name:  Trojan-Downloader:W32/Wimad.gen!A
     A trojan that secretly downloads malicious files from a remote server, then installs and executes the files.
              
    5.     Virus Name:           Trojan-Downloader:W32/Oficla
This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
              
    6.     Virus Name:           Trojan:AndroidOS/Tapsnake
 Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.
              
    7.     Virus Name:           Email-Worm:W32/Bagle.GE
  This type of worm is embedded in an e-mail attachment, and spreads using the infected computer's e-mailing networks.
              
    8.     Virus Name:           Virus:W32/Bursted
A malicious program that secretly integrates itself into program or data files. It spreads by integrating itself into  more files each time the host program is run.
              
    9.     Virus Name:           Trojan:W32/Qhost
Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.
              
    10.     Virus Name:           Trojan:W32/Agent.DKJC
Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.  

Email Security...some Basic point

In today’s electronic world, email is critical to any business being competitive. In most cases it now forms the backbone of most organisations’ day-to-day activities, and its use will continue to grow. According to the The Radicati Group’s study, “Microsoft Exchange and Outlook Analysis, 2005-2009,” the worldwide email market will grow from 1.2 billion mailboxes in 2005 to 1.8 billion mailboxes in 2009.[sintuhack]
As email becomes more prevalent in the market, the importance of email security becomes more significant. In particular, the security implications associated with the management of email storage, policy enforcement, auditing, archiving and data recovery. Managing large, active stores of information takes time and effort in order to avoid failures – failures that will impact the users and therefore the business, undoubtedly leading to lost productivity. For secure and effective storage management, organisations must take a proactive approach and invest wisely in a comprehensive solution.When considering a secure email storage management solution, a layered approach, combining both business processes and applications makes sense. By considering the service email provides to the business, email management can be broken down into a number of components: mail flow, storage, and user access – both at the server and user levels. Whilst each one of these components should be addressed separately, they must be viewed as part of a total security agenda.[sintuhack]
Mail flow can encompass many aspects of an email system. However, the security of mail flow is for the large part focused around the auditing and tracking of mails into and out of the organisation. Monitoring the content and ensuring that any email that has been sent and received complies with business policy is fundamental.
[sintuhack].Proving who has sent or received email is a lawful requirement for many industries and email can often be used as evidence in fraud and human resource court cases.[sintuhack],Another key aspect of the management of mail flow security is the protection of the business from malicious or unlawful attacks. It is at the gateway into the mail system where a business must protect itself via a variety of methods including hardware and software protection systems, such as spam filters and virus scanner[sintuhack].

Secure Sockets Layer(SSL) versus Transport Layer Security(TLS)

               SSL AND TLS -What’s the difference and which one is more secure...
BEFORE WE DECIDE WHICH ONE IS MORE SECURE ,WE MUST KNOW WHAT IS THESE?---Simply these are protocols that provide data encryption and authentication between applications in scenarios where that data is being sent across an insecure network, such as checking your email.[sintuhack]
Now which one is more secure?[sintuhack]
While SSL and TLS differ in ways that make them inoperable with each other, they are generally considered equal in terms of security. The main difference is that, while SSL connections begin with security and proceed directly to secured communications, TLS connections first begin with an insecure “hello” to the server and only switch to secured communications after the handshake between the client and the server is successful. If the TLS handshake fails for any reason, the connection is never created.[sintuhack]
Both Internet security protocols ensure that your data is encrypted as it is transmitted across the Internet.  They also both enable you to be sure that the server that you are communication with is the server you intend to contact and not some “middle man eavesdropper”.  This is possible because servers that support SSL and TLS must have certificates issued to them by a trusted third party, like Verisign or Thawte.[sintuhack].  These certificates verify that the domain name they are issued for really belongs to the server. [sintuhack]. Your computer will issue warnings to you if you try to connect to a server and the certificate that it gets back is not trusted or doesn’t match the site you are trying to connect to.[sintuhack]
If you are mostly concerned about your level of security, you can’t really go wrong choosing either SSL or TLS.[sintuhack]
 The main benefit in opting for TLS over SSL is that TLS was incepted as an open-community standard, meaning TLS is more extensible and will likely be more widely supported in the future with other Internet standards. TLS is even backwards compatible, possessing the ability to “scale down” to SSL if necessary to support secure client-side connections that only understand SSL.[sintuhack]
Another more immediate benefit, however, is that TLS allows both secure and insecure connections over the same port, whereas SSL requires a designated secure-only port. For users connecting to an email server via POP or IMAP, this means that using TLS will allow you to opt for secure connections but easily switch to insecure connections if necessary without needing to change ports. This is not possible with SSL.[sintuhack]

Internet Surfing Security

 we people cant leave without internet,our life is completely depend on GOOGLE.This is not bad thing,but we must know some important security tips.how to keep save your data,as well as PC.Yesterday my friends PC is hacked during net surfing,and he lost all data.I am adding some security solution hope you people will adopt it  during net surfing and during downloading.
                            Internet Surfing Security calls for surfing the global net in a secured manner so as to avoid any undesirable circumstance. Internet Surfing Security is an important requirement of secured Internet Surfing.
   Necessity of Internet Surfing Security
The importance of Internet Surfing Security cannot be underestimated. It is a well known fact that in today's fast life where Internet plays a dominant role, the possibility of falling prey to Phishing or any other type of Cyber crimes is high, if proper precautious measures are not taken while accessing the net. All these dreadful possibilities make one realize the essence of Internet Surfing Security .
Important Steps to be Taken
There are several important measures which can surely ensure Internet Surfing Security . Most importantly, it is important to install to anti-virus soft wares in the computer systems because it safeguards the computer systems against harmful viruses, worms, and spy wares. It is also necessary to check the security systems regularly. You should also be aware about the sites you are surfing through. Accessing any undesirable site can leave viruses in the computer set thereby affecting surfing speed and ability. Firewall is another important way of protecting the personal computer systems. It is also necessary to have a clear idea about an e-mail before opening it. Sometimes just clicking on an e-mail can affect a computer system with virus and worms. You should also avoid disclosing any personal information through a mail or message even. For this may lead to identity theft.

Shopping Safely Online

Why do online shoppers have to take special precautions?

The Internet offers a convenience that is not available from any other shopping outlet. From the comfort of your home, you can search for items from countless vendors, compare prices with a few simple mouse clicks, and make purchases without waiting in line. However, the Internet is also convenient for attackers, giving them multiple ways to access the personal and financial information of unsuspecting shoppers. Attackers who are able to obtain this information may use it for their own financial gain, either by making purchases themselves or by selling the information to someone else.

How do attackers target online shoppers?

There are three common ways that attackers can take advantage of online shoppers:
  • Targeting vulnerable computers - If you do not take steps to protect your computer from viruses or other malicious code, an attacker may be able to gain access to your computer and all of the information on it. It is also important for vendors to protect their computers to prevent attackers from accessing customer databases.
  • Creating fraudulent sites and email messages - Unlike traditional shopping, where you know that a store is actually the store it claims to be, attackers can create malicious web sites that mimic legitimate ones or create email messages that appear to have been sent from a legitimate source. Charities may also be misrepresented in this way, especially after natural disasters or during holiday seasons. Attackers create these malicious sites and email messages to try to convince you to supply personal and financial information.
  • Intercepting insecure transactions - If a vendor does not use encryption, an attacker may be able to intercept your information as it is being transmitted.

Understanding Your Computer: Web Browsers

How do web browsers work?

A web browser is an application that finds and displays web pages. It coordinates communication between your computer and the web server where a particular website "lives."
When you open your browser and type in a web address (URL) for a website, the browser submits a request to the server, or servers, that provide the content for that page. The browser then processes the code from the server (written in a language such as HTML, JavaScript, or XML) and loads any other elements (such as Flash, Java, or ActiveX) that are necessary to generate content for the page. After the browser has gathered and processed all of the components, it displays the complete, formatted web page. Every time you perform an action on the page, such as clicking buttons and following links, the browser continues the process of requesting, processing, and presenting content.

How many browsers are there?

There are many different browsers. Most users are familiar with graphical browsers, which display both text and graphics and may also display multimedia elements such as sound or video clips. However, there are also text-based browsers. The following are some well-known browsers:
  • Internet Explorer
  • Firefox
  • AOL
  • Opera
  • Safari - a browser specifically designed for Macintosh computers
  • Lynx - a text-based browser desirable for vision-impaired users because of the availability of special devices that read the text

How do you choose a browser?

A browser is usually included with the installation of your operating system, but you are not restricted to that choice. Some of the factors to consider when deciding which browser best suits your needs include
  • compatibility - Does the browser work with your operating system?
  • security - Do you feel that your browser offers you the level of security you want?
  • ease of use - Are the menus and options easy to understand and use?
  • functionality - Does the browser interpret web content correctly? If you need to install other plug-ins or devices to translate certain types of content, do they work?
  • appeal - Do you find the interface and way the browser interprets web content visually appealing?

Can you have more than one browser installed at the same time?

If you decide to change your browser or add another one, you don't have to uninstall the browser that's currently on your computer—you can have more than one browser on your computer at once. However, you will be prompted to choose one as your default browser. Anytime you follow a link in an email message or document, or you double-click a shortcut to a web page on your desktop, the page will open using your default browser. You can manually open the page in another browser.
Most vendors give you the option to download their browsers directly from their websites. Make sure to verify the authenticity of the site before downloading any files. To further minimize risk, follow other good security practices, like using a firewall and keeping anti-virus software up to date

What risks are associated with free email services?

Although free email services have many benefits, you should not use them to send sensitive information. Because you are not paying for the account, the organization may not have a strong commitment to protecting you from various threats or to offering you the best service. Some of the elements you risk are

    * security - If your login, password, or messages are sent in plain text, they may easily be intercepted. If a service provider offers SSL encryption, you should use it. You can find out whether this is available by looking for a "secure mode" or by replacing the "http:" in the URL with "https:"

    * privacy - You aren't paying for your email account, but the service provider has to find some way to recover the costs of providing the service. One way of generating revenue is to sell advertising space, but another is to sell or trade information. Make sure to read the service provider's privacy policy or terms of use to see if your name, your email address, the email addresses in your address book, or any of the information in your profile has the potential of being given to other organizations. If you are considering forwarding your work email to a free email account, check with your employer first. You do not want to violate any established security policies.

    * reliability - Although you may be able to access your account from any computer, you need to make sure that the account is going to be available when you want to access it. Familiarize yourself with the service provider's terms of service so that you know exactly what they have committed to providing you. For example, if the service ends or your account disappears, can you retrieve your messages? Does the service provider give you the ability to download messages that you want to archive onto your machine? Also, if you happen to be in a different time zone than the provider, you may find that their server maintenance interferes with your normal email routine.

Understanding Hidden Threats: Rootkits and Botnets

What are rootkits and botnets?

A rootkit is a piece of software that can be installed and hidden on your computer without your knowledge. It may be included in a larger software package or installed by an attacker who has been able to take advantage of a vulnerability on your computer or has convinced you to download it . Rootkits are not necessarily malicious, but they may hide malicious activities. Attackers may be able to access information, monitor your actions, modify programs, or perform other functions on your computer without being detected.

Botnet is a term derived from the idea of bot networks. In its most basic form, a bot is simply an automated computer program, or robot. In the context of botnets, bots refer to computers that are able to be controlled by one, or many, outside sources. An attacker usually gains control by infecting the computers with a virus or other malicious code that gives the attacker access. Your computer may be part of a botnet even though it appears to be operating normally. Botnets are often used to conduct a range of activities, from distributing spam and viruses to conducting denial-of-service attacks .

Cyber Security Tip ST05-006

How do you know your computer is infected?

Unfortunately, there is no particular way to identify that your computer has been infected with malicious code. Some infections may completely destroy files and shut down your computer, while others may only subtly affect your computer's normal operations. Be aware of any unusual or unexpected behaviors. If you are running anti-virus software, it may alert you that it has found malicious code on your computer. The anti-virus software may be able to clean the malicious code automatically, but if it can't, you will need to take additional steps.
What can you do if you are infected?

   1. Minimize the damage - If you are at work and have access to an IT department, contact them immediately. The sooner they can investigate and clean your computer, the less damage to your computer and other computers on the network. If you are on your home computer or a laptop, disconnect your computer from the internet. By removing the internet connection, you prevent an attacker or virus from being able to access your computer and perform tasks such as locating personal data, manipulating or deleting files, or using your computer to attack other computers.

   2. Remove the malicious code - If you have anti-virus software installed on your computer, update the virus definitions (if possible), and perform a manual scan of your entire system. If you do not have anti-virus software, you can purchase it at a local computer store . If the software can't locate and remove the infection, you may need to reinstall your operating system, usually with a system restore disk that is often supplied with a new computer. Note that reinstalling or restoring the operating system typically erases all of your files and any additional software that you have installed on your computer. After reinstalling the operating system and any other software, install all of the appropriate patches to fix known vulnerabilities
How can you reduce the risk of another infection?
Dealing with the presence of malicious code on your computer can be a frustrating experience that can cost you time, money, and data. The following recommendations will build your defense against future infections:

    * use and maintain anti-virus software - Anti-virus software recognizes and protects your computer against most known viruses. However, attackers are continually writing new viruses, so it is important to keep your anti-virus software current
    * change your passwords - Your original passwords may have been compromised during the infection, so you should change them. This includes passwords for web sites that may have been cached in your browser. Make the passwords difficult for attackers to guess
    * keep software up to date - Install software patches so that attackers can't take advantage of known problems or vulnerabilities (see Understanding Patches for more information). Many operating systems offer automatic updates. If this option is available, you should enable it.

    * install or enable a firewall - Firewalls may be able to prevent some types of infection by blocking malicious traffic before it can enter your computer . Some operating systems actually include a firewall, but you need to make sure it is enabled.

    * use anti-spyware tools - Spyware is a common source of viruses, but you can minimize the number of infections by using a legitimate program that identifies and removes spyware
    * follow good security practices - Take appropriate precautions when using email and web browsers so that you reduce the risk that your actions will trigger an infection

China Set to Fight Against Cybercrime by Issuing New Laws Against Hackers

ccording to Gu Jian, Deputy Director of the Network Security Protection Bureau of the Ministry of Public Security (MPS), China is all set to fight against the hacking attacks as the government is drafting law governing the punishment of hackers and other cyber offences, as reported by ShanghaiDaily on November 11, 2010.

He further highlighted that presently, lawmakers are working on the judicial interpretations of the new law, which will be released by the end of 2010.
Gu stated that nearly 80% of the machines in China are facing the problem of botnet attacks, whereby hackers use malicious software to attack and compromise machines.
Remarkably, botnet can be defined as a network of systems that have had malware installed into them and are managed by cybercrooks, while the users are not aware of the computer hacking.
Disturbingly, according to a report released in earlier 2010 by the China National Computer Network Emergency Response Technical Team (CNCERT) revealed that 71% of the global botnets are placed in China. Of which, majority are administered by hackers of foreign origin.
Commenting on the finding, Gu stated that, China, a land of around 440 Million netizens is the key victim of cyber criminals, as reported by the web portal China on November 11, 2010. Gu also said that over 80% of the online attacks targeting China's government agencies official websites come from foreign locations.
Gu further highlighted that, to fight against overseas criminals, China has been making remarkable attempts to co-operate with overseas government agencies. Since 2004, China's public security departments have offered assistance to around 41 countries in 721 online criminal instances.
Until now, Chinese police have set up bilateral cooperation agreements with 30 nations including the United States, Germany, and the UK.
However, according to Gu, existing collaborations between various governments are far away from fighting against overseas cybercrimes.
Conclusively, Gu stated that late response is one of the major problems. Since 2009, China's police agents have asked for investigation assistance for 13 cybercrimes to the U.S. FBI (Federal Bureau of Investigation), including instances concerning fake bank website and child pornography. But, the Chinese police have not got any response till now.

Cyber Laws in India

                         Cyber Laws in India
In May 2000, both the houses of the Indian Parliament passed the information bill. The Bill received the assent of the President in August 2000 and came to be known as the Information Technology Act, 2000. Cyber laws are contained in the IT Act, 2000.

This Act aims to provide the legal infrastructure for e-commerce in India. And the cyber laws have a major impact for e-businesses and the new economy in India. So, it is important to understand what are the various perspectives of the IT Act, 2000 and what it offers.

The Information Technology Act, 2000 also aims to provide for the legal framework so that legal sanctity is accorded to all electronic records and other activities carried out by electronic means. The Act states that unless otherwise agreed, an acceptance of contract may be expressed by electronic means of communication and the same shall have legal validity and enforceability. Some highlights of the Act are listed below:

Chapter-II of the Act specifically stipulates that any subscriber may authenticate an electronic record by affixing his digital signature. It further states that any person can verify an electronic record by use of a public key of the subscriber.
 
Chapter-III of the Act details about Electronic Governance and provides inter alia amongst others that where any law provides that information or any other matter shall be in writing or in the typewritten or printed form, then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied if such information or matter is -
 
rendered or made available in an electronic form; and
accessible so as to be usable for a subsequent reference

The said chapter also details the legal recognition of Digital Signatures.


Chapter-IV of the said Act gives a scheme for Regulation of Certifying Authorities. The Act envisages a Controller of Certifying Authorities who shall perform the function of exercising supervision over the activities of the Certifying Authorities as also laying down standards and conditions governing the Certifying Authorities as also specifying the various forms and content of Digital Signature Certificates. The Act recognizes the need for recognizing foreign Certifying Authorities and it further details the various provisions for the issue of license to issue Digital Signature Certificates.
 
Chapter-VII of the Act details about the scheme of things relating to Digital Signature Certificates. The duties of subscribers are also enshrined in the said Act.
 
Chapter-IX of the said Act talks about penalties and adjudication for various offences. The penalties for damage to computer, computer systems etc. has been fixed as damages by way of compensation not exceeding Rs. 1,00,00,000 to affected persons. The Act talks of appointment of any officers not below the rank of a Director to the Government of India or an equivalent officer of state government as an Adjudicating Officer who shall adjudicate whether any person has made a contravention of any of the provisions of the said Act or rules framed there under. The said Adjudicating Officer has been given the powers of a Civil Court.
 
Chapter-X of the Act talks of the establishment of the Cyber Regulations Appellate Tribunal, which shall be an appellate body where appeals against the orders passed by the Adjudicating Officers, shall be preferred.
 
Chapter-XI of the Act talks about various offences and the said offences shall be investigated only by a Police Officer not below the rank of the Deputy Superintendent of Police. These offences include tampering with computer source documents, publishing of information, which is obscene in electronic form, and hacking.
 
The Act also provides for the constitution of the Cyber Regulations Advisory Committee, which shall advice the government as regards any rules, or for any other purpose connected with the said act. The said Act also proposes to amend the Indian Penal Code, 1860, the Indian Evidence Act, 1872, The Bankers' Books Evidence Act, 1891, The Reserve Bank of India Act, 1934 to make them in tune with the provisions of the IT Act.
             Advantages of Cyber Laws
The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber crimes. We need such laws so that people can perform purchase transactions over the Net through credit cards without fear of misuse. The Act offers the much-needed legal framework so that information is not denied legal effect, validity or enforceability, solely on the ground that it is in the form of electronic records.

In view of the growth in transactions and communications carried out through electronic records, the Act seeks to empower government departments to accept filing, creating and retention of official documents in the digital format. The Act has also proposed a legal framework for the authentication and origin of electronic records / communications through digital signature.

From the perspective of e-commerce in India, the IT Act 2000 and its provisions contain many positive aspects. Firstly, the implications of these provisions for the e-businesses would be that email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law.
 
Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.
 
Digital signatures have been given legal validity and sanction in the Act.
 
The Act throws open the doors for the entry of corporate companies in the business of being Certifying Authorities for issuing Digital Signatures Certificates.
 
The Act now allows Government to issue notification on the web thus heralding e-governance.
 
The Act enables the companies to file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in electronic form by means of such electronic form as may be prescribed by the appropriate Government.
 
The IT Act also addresses the important issues of security, which are so critical to the success of electronic transactions. The Act has given a legal definition to the concept of secure digital signatures that would be required to have been passed through a system of a security procedure, as stipulated by the Government at a later date.
 
Under the IT Act, 2000, it shall now be possible for corporates to have a statutory remedy in case if anyone breaks into their computer systems or network and causes damages or copies data. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore.



Cyber Law Cases in India and World

MYSPACE CATCHES A MURDERER

MySpace has played an important role in helping Oakland police apprehend a 19-year old man accused of shooting a San Leandro High School football player Greg "Doody" Ballard, Jr.

Oakland police had a street name of a suspect and were able to identify Dwayne Stancill, 19 of Oakland from a picture they found on a gang's MySpace page. Police brought the suspect to their headquarters where detectives say he confessed. What was most troubling to investigators was the lack of motive for the killing.

OFFICIAL WEBSITE OF MAHARASTRA GOVERNMENT HACKED

MUMBAI, 20 September 2007 — IT experts were trying yesterday to restore the official website of the government of Maharashtra, which was hacked in the early hours of Tuesday.

Rakesh Maria, joint commissioner of police, said that the state’s IT officials lodged a formal complaint with the Cyber Crime Branch police on Tuesday. He added that the hackers would be tracked down. Yesterday the website, http://www.maharashtragovernment.in, remained blocked.

Deputy Chief Minister and Home Minister R.R. Patil confirmed that the Maharashtra government website had been hacked. He added that the state government would seek the help of IT and the Cyber Crime Branch to investigate the hacking.

“We have taken a serious view of this hacking, and if need be the government would even go further and seek the help of private IT experts. Discussions are in progress between the officials of the IT Department and experts,” Patil added.

The state government website contains detailed information about government departments, circulars, reports, and several other topics. IT experts working on restoring the website told Arab News that they fear that the hackers may have destroyed all of the website’s contents.

According to sources, the hackers may be from Washington. IT experts said that the hackers had identified themselves as “Hackers Cool Al-Jazeera” and claimed they were based in Saudi Arabia. They added that this might be a red herring to throw investigators off their trail.

According to a senior official from the state government’s IT department, the official website has been affected by viruses on several occasions in the past, but was never hacked. The official added that the website had no firewall.

Three people held guilty in on line credit card scam

Customers credit card details were misused through online means for booking air-tickets. These culprits were caught by the city Cyber Crime Investigation Cell in pune. It is found that details misused were belonging to 100 people.

Mr. Parvesh Chauhan, ICICI Prudential Life Insurance officer had complained on behalf of one of his customer. In this regard Mr. Sanjeet Mahavir Singh Lukkad, Dharmendra Bhika Kale and Ahmead Sikandar Shaikh were arrested. Lukkad being employeed at a private institution, Kale was his friend. Shaiklh was employed in one of the branches of State Bank of India .

According to the information provided by the police, one of the customer received a SMS based alert for purchasing of the ticket even when the credit card was being held by him. Customer was alert and came to know something was fishy; he enquired and came to know about the misuse. He contacted the Bank in this regards. Police observed involvement of many Bank's in this reference.

The tickets were book through online means. Police requested for the log details and got the information of the Private Institution. Investigation revealed that the details were obtained from State Bank of India . Shaikh was working in the credit card department; due to this he had access to credit card details of some customers. He gave that information to Kale. Kale in return passed this information to his friend Lukkad. Using the information obtained from Kale Lukkad booked tickets. He used to sell these tickets to customers and get money for the same. He had given few tickets to various other institutions.

Cyber Cell head DCP Sunil Pulhari and PI Mohan Mohadikar A.P.I Kate were involved in eight days of investigation and finally caught the culprits.

In this regards various Banks have been contacted; also four air-line industries were contacted.
DCP Sunil Pulhari has requested customers who have fallen in to this trap to inform police authorities on 2612-4452 or 2612-3346 if they have any problems.

How cyber crime operations work – and why they make money

Hackers are no longer motivated by notoriety – it's now all about the money. Guillaume Lovet, Threat Response Team Leader at security firm Fortinet, identifies the players, their roles and the returns they enjoy on their investments.
Cybercrime which is regulated by Internet Law  (Cyber Law) or IT Act has become a profession and the demographic of your typical cybercriminal is changing rapidly, from bedroom-bound geek to the type of organised gangster more traditionally associated with drug-trafficking, extortion and money laundering.
It has become possible for people with comparatively low technical skills to steal thousands of pounds a day without leaving their homes. In fact, to make more money than can be made selling heroin (and with far less risk), the only time the criminal need leave his PC is to collect his cash. Sometimes they don't even need to do that.
In all industries, efficient business models depend upon horizontal separation of production processes, professional services, sales channels etc. (each requiring specialised skills and resources), as well as a good deal of trade at prices set by the market forces of supply and demand. Cybercrime is no different: it boasts a buoyant international market for skills, tools and finished product. It even has its own currency.
The rise of cybercrime is inextricably linked to the ubiquity of credit card transactions and online bank accounts. Get hold of this financial data and not only can you steal silently, but also – through a process of virus-driven automation – with ruthlessly efficient and hypothetically infinite frequency.
The question of how to obtain credit card/bank account data can be answered by a selection of methods each involving their own relative combinations of risk, expense and skill.
The most straightforward is to buy the ‘finished product’. In this case we’ll use the example of an online bank account. The product takes the form of information necessary to gain authorised control over a bank account with a six-figure balance. The cost to obtain this information is $400 (cybercriminals always deal in dollars). It seems like a small figure, but for the work involved and the risk incurred it’s very easy money for the criminal who can provide it. Also remember that this is an international trade; many cyber-criminals of this ilk are from poor countries in Eastern Europe, South America or South-East Asia.
The probable marketplace for this transaction will be a hidden IRC (Internet Relay Chat) chatroom. The $400 fee will most likely be exchanged in some form of virtual currency such as e-gold.
Not all cyber-criminals operate at the coalface, and certainly don’t work exclusively of one another; different protagonists in the crime community perform a range of important, specialised functions. These broadly encompass:
Coders – comparative veterans of the hacking community. With a few years' experience at the art and a list of established contacts, ‘coders’ produce ready-to-use tools (i.e. Trojans, mailers, custom bots) or services (such as making a binary code undetectable to AV engines) to the cybercrime labour force – the ‘kids’. Coders can make a few hundred dollars for every criminal activity they engage in.
Kids – so-called because of their tender age: most are under 18. They buy, trade and resell the elementary building blocks of effective cyber-scams such as spam lists, php mailers, proxies, credit card numbers, hacked hosts, scam pages etc. ‘Kids’ will make less than $100 a month, largely because of the frequency of being ‘ripped off’ by one another.
Drops – the individuals who convert the ‘virtual money’ obtained in cybercrime into real cash. Usually located in countries with lax e-crime laws (Bolivia, Indonesia and Malaysia are currently very popular), they represent ‘safe’ addresses for goods purchased with stolen financial details to be sent, or else ‘safe’ legitimate bank accounts for money to be transferred into illegally, and paid out of legitimately.
Mobs – professionally operating criminal organisations combining or utilising all of the functions covered by the above. Organised crime makes particularly good use of safe ‘drops’, as well as recruiting accomplished ‘coders’ onto their payrolls.
Gaining control of a bank account is increasingly accomplished through phishing. There are other cybercrime techniques, but space does not allow their full explanation.
All of the following phishing tools can be acquired very cheaply: a scam letter and scam page in your chosen language, a fresh spam list, a selection of php mailers to spam-out 100,000 mails for six hours, a hacked website for hosting the scam page for a few days, and finally a stolen but valid credit card with which to register a domain name. With all this taken care of, the total costs for sending out 100,000 phishing emails can be as little as $60. This kind of ‘phishing trip’ will uncover at least 20 bank accounts of varying cash balances, giving a ‘market value’ of $200 – $2,000 in e-gold if the details were simply sold to another cybercriminal. The worst-case scenario is a 300% return on the investment, but it could be ten times that.
Better returns can be accomplished by using ‘drops’ to cash the money. The risks are high, though: drops may take as much as 50% of the value of the account as commission, and instances of ‘ripping off’ or ‘grassing up’ to the police are not uncommon. Cautious phishers often separate themselves from the physical cashing of their spoils via a series of ‘drops’ that do not know one another. However, even taking into account the 50% commission, and a 50% ‘rip-off’ rate, if we assume a single stolen balance of $10,000 – $100,000, then the phisher is still looking at a return of between 40 and 400 times the meagre outlay of his/her phishing trip.
In large operations, offshore accounts are invariably used to accumulate the criminal spoils. This is more complicated and far more expensive, but ultimately safer.
The alarming efficiency of cybercrime can be illustrated starkly by comparing it to the illegal narcotics business. One is faster, less detectable, more profitable (generating a return around 400 times higher than the outlay) and primarily non-violent. The other takes months or years to set-up or realise an investment, is cracked down upon by all almost all governments internationally, fraught with expensive overheads, and extremely dangerous.
Add phishing to the other cyber-criminal activities driven by hacking and virus technologies – such as carding, adware/spyware planting, online extortion, industrial spying and mobile phone dialers – and you’ll find a healthy community of cottage industries and international organisations working together productively and trading for impressive profits. Of course these people are threatening businesses and individuals with devastating loss, financial hardship and troubling uncertainty – and must be stopped.
On top of viruses, worms, bots and Trojan attacks, organisations in particular are contending with social engineering deception and traffic masquerading as legitimate applications on the network. In a reactive approach to this onslaught, companies have been layering their networks with stand alone firewalls, intrusion prevention devices, anti-virus and anti-spyware solutions in a desperate attempt to plug holes in the armoury. They're beginning to recognise it's a failed strategy. After all, billions of pounds are being spent on security technology, and yet security breaches continue to rise.
To fight cybercrime there needs to be a tightening of international digital legislation and of cross-border law enforcement co-ordination. But there also needs to be a more creative and inventive response from the organisations under threat. Piecemeal, reactive security solutions are giving way to strategically deployed multi-threat security systems. Instead of having to install, manage and maintain disparate devices, organisations can consolidate their security capabilities into a commonly managed appliance. These measures combined, in addition to greater user education are the best safeguard against the deviousness and pure innovation of cyber-criminal activities.

5 Free Antivirus – Download Free Antivirus and Save your computer from Virus Attack!

Today I switched my computer ON just like any other day and the hell broke lose. Computer was running slow, high-speed internet was acting choked and I almost thought my monitor belongs to a 16 year old sexually charged with adult pop-ups all over the screen.
By the time I could figure out what went wrong (virus attack), I had already lost some data on my hard drive and my Operating System was acting weird.
A computer that is inadequately protected is vulnerable to all sorts of viruses, spyware or malicious codes which could attack your data or even your operating system.
Some malware are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Other malware programs are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. (Wikipedia)
I gathered information on about 5 most popular free Antivirus softwares which do a good job of protecting your computer and keep your data safe from such attacks.
Why pay for Antivirus softwares when free ones are equally good? Following is the list of top 5 free antivirus softwares.
Avast.com – avast! is a fully featured free antivirus designed specifically for home users or for non-commercial use, however, it requires you to register your free version with Avast within 60 days of installation. It is compatible with Windows Vista/XP/2000/NT/ME/98. The latest version of Avast 4.8 comes with 39 downloadable skins to personalize your free copy of antiviurs software.
Some of the features of avast! Free Antivirus for Home Edition are listed below.
•    Anti-spyware built-in
•    Web Shield
•    Anti-rootkit built-in
•    Automatic updates
•    Strong self-protection
•    Virus Chest
•    Antivirus kernel
•    System integration
•    Simple User Interface
•    Integrated Virus Cleaner
•    Resident protection
•    Support for 64-bit Windows
•    P2P and IM Shields
•    Internationalization
•    Network Shield

AVG’s is one of the most popular free Antivirus softwares available online. AVG has a strong userbase of 70 million users and the number just keeps going up! AVG is easy to download, install and use. It is compatible with Windows Vista & Windows XP and freely available for home and non-Commercial use.
AVG keeps it virus database udpated with the latest virus definitions, this helps its users detect the latest virus threats as soon as it hits internet.
Her are some of the key feature of AVG FREE Edition
•    Automatic update functionality
•    The AVG Resident Shield, which provides real-time protection as files are opened and programs are run
•    The AVG E-mail Scanner, which protects your e-mail
•    The AVG On-Demand Scanner, which allows the user to perform scheduled and manual tests
•    Free Virus Database Updates
•    AVG Virus Vault for safe handling of infected files

Avira AntiVir Personal – FREE Antivirus is a another reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs such as viruses, Trojans, hoaxes, worms, dialers etc. It also monitors every action executed by the user or the operating system and reacts promptly when a malicious program is detected.
“AntiVir is also low-profile. By that I mean it spawns only two background services and if there weren’t a system tray applet to access the program, you probably wouldn’t even know it was running.” – (pcworld.com)
Avira is a Free Antivirus protection for Windows Vista/XP/2000 and also for Linux users. It has over 30 million users worldwide.
Some of the features that Avira AntiVir Personal has are following.
•    Protection from viruses, worms and Trojans
•    Protection against expensive dialers
•    Protection from hidden rootkits
•    Faster Scanning up to 20% faster
•    Protection from phishing

Bitdefender offers its version of free antivirus and it also publicizes that it is “one of the world’s most effective antivirus engines for free!”
Bitdefender’s Free Edition is an on-demand virus scanner, which is best used in a system recovery and is ideal for users who connect to the internet on a regular basis; however it’s not for users who are “always-on” the internet. For these types of users Bitdefender recommends them to upgrade to a more powerful version of their software which is the paid version.
Few features offered by BitDefender are listed below
•    Antivirus
•    IMPROVED Proactive detection
•    Spyware scanning and cleaning
•    IMPROVED Deployment and use
•    IMPROVED User Experience
•    Hourly Updates
•    NEW Rootkit Detection and Removal
Bitdefender also comes with other features such as Skinable Interface, where you can customize the looks of the scanner.
Also included in this version is the “Quarantine” and “Report” feature. In Quarantine you can isolate the infected file to reduce the risk of your other files and OS getting infected any further. In the Reporting feature you can check the statistics of your last scan.

Hacker compromises Royal Navy data security

The official Royal Navy website was shut down yesterday (8th November) after a hacker compromised its DATA SECURITY
Computer details of former and current defence staff were posted online by an unknown Romanian citizen known only via his codename as TinKode.
The hacker, who claims to have committed the breach after detailing the incident on his blog, posted the "hash values" for staff passwords on the internet.
These hash values are essentially a key for cybercriminals to enable them to easily crack user passwords.
According to the Ministry of Defence, the breach did not result in any malicious damage.
Rik Ferguson, a cyber security analyst at the company Trend Micro, said: "It's always embarrassing when something public is successfully hacked and should serve as a warning to anyone who has a presence online to take all the necessary steps to secure their websites."
Are your archives backing-up? Kroll Ontrack; providers of cost-effective archive data: migration, duplication, extraction and conversion services.

Cyber attacks enter new phase......INCREASE YOUR SECURITY LEVEL

North Korea was originally a prime suspect for launching the cyber attacks, but the isolated state was not named on a list of five countries where the attacks may have originated, the Korea Communications Commission (KCC) said.

The attacks targeting dozens of government and business sites in South Korea and the United States did not cause major damage or security breaches, experts said, but the KCC warned a new phase could cause severe damage to PCs.


Leading South Korean web security firm Ahnlab, which has closely examined the attacks, said the new phase would target data on tens of thousands of infected personal computers.

"The affected computers will not be able to boot and their storage files will be disabled," said Lee Byung-cheol of Ahnlab.

Almost all of the websites that were out of service this week, including the South's Defence Ministry, were up and running while Lee said the damage to internet locations was dwindling due to better safeguards.

The KCC said host websites believed behind the original attacks were based in Germany, Austria, Georgia, the United States and South Korea. The location of the hackers behind the attacks was still unknown, it said.

South Korean MPs briefed by the National Intelligence Service said although websites in North Korea were not on the list, Pyongyang was still considered a suspect, Yonhap news agency said.

Internet access is denied to almost everyone in impoverished North Korea, a country that cannot produce enough electricity to light its cities at night. Intelligence sources say leader Kim Jong-il launched a cyber warfare unit several years ago.

Some analysts have questioned the North's involvement, saying it may be the work of industrial spies or pranksters.

The attacks will likely be seen by the North's leadership as a victory for Kim Jong-il - even if Pyongyang was not involved - because they added a new dimension to the threats posed by the state, which rattled regional security with a nuclear test in May and ballistic missile tests last week.

The attacks saturated target websites with access requests generated by malicious software planted on personal computers. This overwhelmed some targeted sites and slowed server response to legitimate traffic.

The so-called "distributed denial of service" hacking attack spreads viruses on PCs, turning them into zombies to simultaneously connect to specific sites, unbeknown to owners, experts said.

U.S. officials would not speculate on who might be behind the attacks but noted that US government websites face attacks or scams "millions of times" a day.

Mobile scams 'costing users five times more than PC scams', security firm warns

As the number of people using the mobile internet continues to rise rapidly, criminals are exploiting new technologies with increasing efficiency, the latest research suggests.

With smartphones predicted to outsell PCs in 2011, the survey, commissioned by mobile security firm AdaptiveMobile, indicates that traditional spam email successfully persuades fewer than one in a million users to visit the site it’s advertising.
 


So-called “conversion rates” of mobile spam are often higher than one per cent, however, and one SMS text message spam attack can generate more than $10 million in just three days.

The types of scam the firm found ranged included sophisticated attacks that exploit smartphone capabilities to connect to the internet – the results included “click fraud” on adverts or mobile viruses. Simpler scams included SMS messages claiming the recipient had won a prize and fooling them into replying via a premium rate call or text.

“With spammers finding ways of avoiding the cost of sending bulk SMS, the traditional barrier to receiving spam on mobiles has been removed,” said Simeon Coney, vice-president of business development at AdaptiveMobile.

“A mobile phone is a very personal device and people are intrinsically more trusting of communications via their handset than content in their email inboxes. While the mobile operators are fighting the criminals at a network level, users too need to play their part if they’re to stay safe in an increasingly mobile world.”