Showing posts with label CYBER News. Show all posts
Showing posts with label CYBER News. Show all posts

Wednesday, 20 February 2013

India may cut the Internet connection?

Have you ever wondered how a country would be difficult to disconnect all connections to the Internet? If you think that the threat of dictatorship or civil war will suffer the most in the country, let me tell you that prefer peace enough to cut the Internet in democracy are in danger.
Take the case of India. 'Internet connectivity' research on the Internet to cut as much risk, beyond the control of the government in the shadows of tribal leaders in Afghanistan, as well as here.
But how? In 2012, Libya, Egypt and Syria click cut the Internet connection after 'Renesis' institution of the connections in all countries of the world are researching the possibility of cuts.
'Renesis' government or muscle cutting capacity on the Internet, but also connecting wire from the Internet Service Providers (ISP Global) depends on.
Global ISP will be much less than the risk, because the way the Internet will clamp it together to make them disappear.

How much danger to India?

"Iran 100 ISP, but less than 10 of these are connected to the world, so too is the risk of cutting their prevention and the Internet."
Jim Kovi, chief technical officer, 'Renesis'
In countries where the Renesis is very complicated and advanced satellite network, the Internet is more vulnerable to cuts.
'Renesis' Kovi's chief technical officer Jim told the BBC, "100 ISPs in Iran, but fewer than 10 of these are connected to the world, thus preventing the risk of cutting hair is too much.,"
The USA, Canada, Australia and Russia, not only in countries that are at risk. There are 40 more than the global ISP, the Internet is not completely off if possible.
And in India? 'Renesis' compared with the rest of the world is at risk because of the Internet in India to prevent global ISP from 10 to 40, all of them are locked together can take several days to.
But there is less danger in Afghanistan. Less government control in Afghanistan, Uzbek, Iranian and Pakistani borders crossing more likely to reach the Internet. This may take several days to cut together the whole internet.

Where will cut full internet connection?

"China's ISP specializes in preventing the world's information, the government does not listen to such a company, it is difficult to believe this."
Adam Segal, China cyber - security expert
'Renesis' Internet in the European country of Belarus is too much risk of being bitten.
There is a government of Belarus ISP Telecom Company combines the world, it can be turned off via the internet to the whole country.
The postcode is no secret that the public must have the internet to work. Belarus is the postcode 6697.
The 'Renesis' The Internet in China is at risk of being bitten. Xinjiang province of China in the years 2009 and 2010, the Internet was disconnected.
'Renesis' indicates that several independent companies in China on the Internet is working hard to try and click difficult for the Chinese government is.
But in China, cyber - security expert Adam Segal have different opinions. He says, "China's ISP specializes in preventing the world's information, the government does not listen to such a company, it is hard to believe."
Segal said China wants to convey the message to the world that his country is no restrain on the Internet, so that if necessary, but the pace is very slow to close the Internet as there image.

Wednesday, 21 November 2012

Cybercrime Now Goes Social


 
In the current generation everyone should know about the word “Cybercrime” as it includes spyware, computer viruses, fake links that could capture our personal information, online bullying, bank accounts fraud and many more. It is the scam which is used to gather personal information without the owner’s knowledge. Before people used to target desktops for tracking personal data but due to advancement in mobile phone hackers are preferring mobile phones and social networking sites. 


The usage of social networking sites like Facebook, Twitter, Yahoo etc., has increased drastically with which cybercriminals are also looking forward to these sites. We upload videos, pictures and share our personal details. We also add friends and family members to our accounts. We see many advertisements and applications on social media, which usually scam users. These are also called Phishing links; if you click onto this link you will get a new page asking email id and password. As soon as you enter a user name and password, your account gets hacked then it can be misused by applying to Gmail, PayPal and other accounts. A survey says that nearly 5 out of 10 people are falling victims to this fraud. There are many reasons behind this such as:

  • Nearly 33% of people don’t log out their accounts from a session.
  • There are 36% of people who accept friend requests from strangers.
  • Many people don’t check and click on unknown web links which leads to “Phishing”.
  • Not having knowledge about privacy settings to secure their accounts.

To overcome such problems and to protect your accounts, you should take some useful measures like to avoid unknown friend requests, good privacy, ignoring Phishing links etc. Always make sure to change your passwords often and use lengthy passwords. People can even opt for threat management appliances in order to overcome cyber-attacks. This is a recently developed solution for industries based on network securities which has multiple features like anti-spam, filtering content, prevention of data leakage and so on. 
For example, Cyberoam Unified threat management (UTM) appliances are offering solutions for large, medium and small enterprises with comprehensive features. All the specifications are integrated on a single platform. Cyberoam UTM offers security from layer 1 to layer 8. It ensures effective network security, connectivity, availability and controlled network access to customer, partners, telecommuters etc. The highlights of this tool are it shifts from firewall to unified threat management security, layers from 1 to 8, VPN, IPS and advanced network security.

Similarly there are many UTM’s available on the market such as Endian, Extensible, Hewlet Packard 200 UTM for effective and high network security. These devices can be installed in your enterprises to overcome the problem of cyber-attacks. The prices of UTM’s vary from one brand to another and are not much expensive. If you are short of cash to purchase these tools then you can opt for same day cash loans for getting instant money. Hence it is necessary to ensure security processes and stay away from Cyber-crimes.

Saturday, 13 October 2012

cyber news

Indian Cyber Army is Organising A Ethical Hacking Boot camp at New Delhi

According To A Update On Indian Cyber Army Official Facebook Page , They Are Going To Organise A Hacking Boot Camp In New Delhi Of Five Days ( Date: 15-19 September 2012 ).

Key Features:


>>First time ever in Indian IT Industry, International Certification by IADL,UK in Information Security & Ethical Hacking which is cost effective and accepted globally.

>>Course content is developed with the support of Department of Information Technology, Ministry of Communications and IT, Government of India.



Interested Persons Who Want To Join This Boot Camp :

Mail INDIAN CYBER ARMY : Workshop [at] Indiancyberarmy [dot] org

Or Contact INDIAN CYEBR ARMY  :  +91 7838773877

Iran Denies Charges of Cyber Attacks on US Banks

Just one month after reports surfaced that Iran was hit with yet another cyber attack, the country is back in the spotlight, this time being blamed for a series of cyber attacks on U.S. banks.

According to Reuters, the websites of Bank of America and JPMorgan Chase unexpectedly went down last week, with a source familiar with the issue telling the news agency that “massive denial-of-service attacks” were to blame.
But as the banks continue to investigate, some are already speculating that the attacks were a product of Iranian hackers, retaliating for U.S. and European sanctions against Iran’s financial institutions.
“I don’t believe that these were just hackers who were skilled enough to break in to cause disruption,” said Sen. Joe Lieberman (I-Conn.) in an interview that aired on C-SPAN. “I think that this was done by Iran and [its army] the Quds Force.”
Calling it a counterattack, Lieberman said that Islamist extremists had announced their bank breach plans on a website just days before the attacks were carried out, adding that the New York Stock Exchange was another intended cyber target.
Lieberman went on to say that while it “wasn’t a very sophisticated attack,” the incident serves as a “powerful example” of America’s network vulnerabilities.
But according to Iran’s Fars News Agency, the U.S.’ charges are false, and the Middle Eastern country is not at fault.
“Iran has not hacked the U.S. banks,” Gholam Reza Jalali, director of Iran’s Civil Defense Organization, told FNA on Sunday.
Further refuting the claims, Jalali advised that the attack accusations were “aimed at demonizing Iran in cyberspace to portray the country as a global threat to cybersecurity and justify the U.S. and Israeli cyber attacks on Iran.”