Skip to main content

Posts

Showing posts from August, 2021

Usage of Toolkit in Cyber Crimes

  A toolkit is a tool or route for committing crimes. In many circumstances, cybercriminals utilise toolkits including malware assaults. In this situation, search engines are infected. Toolkits also support cybercriminals through automation of procedures like the building of websites. The XRumer, ZeuS, and UMaxSoft Doorway Generator are some examples of toolkits. Toolkits should concern organisations as keywords for websites may be produced. This puts firms whose data are available on their websites at risk. Spam spreading toolkits are also utilised. It was used to disseminate it via Twitter, for example. By implementing the latest updates on their software, organisations should safeguard themselves. Another approach of defending an organisation against fraud is to avoid supplying information without confirming the provenance of an application. Moreover, companies should watch out so that unsecured email messages, infected software and other harmful actions are not answered. The wo...

How Cyber Hygiene is equivalent to Personal Hygiene?

  Personal hygiene is necessary for the human body same so cyber hygiene. It is a cyber security practice to keep your software and hardware safe and protected from any kind of cyber-attack. Cyber hygiene is also an essential part to safeguard our systems from any kind of breach or malware attacks. The main objective behind cyber hygiene is to organize and prevent the system’s sensitive data from any kind of attack or theft. Why is Cyber Hygiene Important? Firstly, it is our duty to maintain our system and keep it in good working condition by protecting it from external viruses and secondly, like our health is in our hands, similarly, we can secure our computers and it is possible for us to prevent cybercrime causing by security breaches. Installing malware, or recovering personal data by creating a habit centred around cyber hygiene & considered as best practice. Nowadays, many big companies have hired cyber security professionals to prevent their system’s data from breach, bu...

Advanced Social Engineering: No tech hacking changed to tech

In this growing digitalization world, there is a requirement for information safety.   Moreover, IT organizations must take care of their information at most priority. In most of the places, how much secure the organization may be, how modern their products are, there is always a weak point in each area known as ‘Humans’. The ability to get sensitive information from a person is called social engineering. Social Engineering surpasses a variation security risk as it has shown to be one of the most straightforward most economical, enthusiastic and significantly productive ways for attackers to achieve their completions. While thinking about security, clients are accepted to be the most vulnerable connection. In any case, numerous associations permit clients to have more than the needed advantages to play out their positions. Overcoming all the traditional social engineering attacks like eves dropping, dumpster diving has evolved into new advancements. As prominently known, a fake ...

Fashion Piracy: New Trend in IPR

During social media scrolling, online reading , e-commerce exploration, or random internet surfing, one must have noticed certain advertisements that say “buy a GUCCI bag or Sabyasachi Mukherjee lehenga or Rado watch at giveaway prices”. And once the user clicks the link it is redirected to a third-party vendor website, which is a website not authorized to sell these products. Now the question arises from where they buy such products? The answer is that person has just indulged in online piracy. We are confused as to how clicking an advertisement and buying from the redirected website equates to indulging in piracy. For that, we need to understand what intellectual property (herein referred to as IP) is, basic Intellectual Property Rights (herein referred to as IPR) of fashion designers, and how online piracy works. And further, this blog will be discussing all these aspects in a detailed version . IP is a category of property, including intangible creations, resulting from the appli...

Is Privacy on the Internet and Personal Privacy Inter-related?

Before diving into the concepts of privacy on the internet and personal privacy, let us have some idea regarding the term ‘Privacy’ itself. The origin of Privacy has been accredited to the Greek philosopher Aristotle in the judgement of Justice K.S. Puttaswamy (Retd.) & Anr. vs. Union of India & Ors . The division of public and private realms is said to have been brought out by Aristotle. He put forward the division i.e., namely, as ‘polis’ and ‘Oikos. Here, ‘polis’ refers to the public sphere of political affairs and ‘Oikos refers to the personal sphere of human life. Also, according to the Black’s Law Dictionary, Privacy means the Right to be let alone ; the right of a person to be free from unwarranted publicity. So, in other words, privacy means being free from unwanted or undue intrusion or disturbance.  The concept of Privacy, however, stepped the stairs of the Hon’ble Supreme Court through the case of M.P. Sharma & Ors. Vs. Satish Chandra . In this case, it was...

Importance of Cyber Education for Teenagers exposed to the E-World

Today's young generation is most exposed to cyberspace. Amid the Covid-19 pandemic situation prevalent in the country, many states were completely shut down, due to which the education system suffered a lot. During the initial stages of the Lockdown, the schools had no means to teach the students. All the educational institutions, School teachers and coaching centres suffered a lot, but slowly and gradually everything started evolving through online modes. By the time passed, schools started conducting online meetings via zoom, google meet and various other platforms for students. This sudden shift of the education fraternity to online mode made it necessary for the students to be provided with their own personal Mobile Phones and Internet. Indeed it was the only way left for the education system to continue with the studies of the higher and lower grade students in a proper manner. This digitalization helped us in many ways. It resulted very helpfully in maintaining the heavy loss...

Dominant Firms and Intellectual Property Rights: An Analysis

  The Chinese Electric Vehicle battery manufacturer, CATL (Contemporary Amperex Technology) filed a lawsuit against a smaller firm for violating its intellectual property. The company alleged that China Lithium Battery Technology (CALB) utilized its technology to manufacture batteries. While the lawsuit is yet to be settled, the issue concerns one of the most flourishing sectors in the global economy – electric vehicles. With growing concerns about environmental pollution, various companies have invested huge amounts of resources into manufacturing electric vehicles. In this context, it is interesting to note the interplay between intellectual property law and competition law. This piece analyzes two possible legal challenges involved in this issue. Firstly, it elaborates on the competition law aspect due to the significant market share of these two companies. This ties into the second legal argument pertaining to intellectual property rights. The difficulty in protecting the R...

Cyber Twitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities

  In the broad domain of security, analysts and policymakers need knowledge about the state of the world to make timely critical decisions, operational/tactical as well as strategic. This knowledge has to be extracted from a variety of different sources and then represented in a form that will enable further analysis and decision making. Some of the data underlying this knowledge is in textual sources traditionally associated with Open-source Intelligence (OSINT). OSINT is intelligence gathered from publicly available overt sources such as newspapers, magazines, social networking sites, video sharing sites, wikis, blogs, etc. In the cybersecurity domain, information available through OSINT can complement data obtained through traditional security systems and monitoring tools like Intrusion Detection and Prevention Systems (IDPs). Cybersecurity information sources can be divided into two abstract groups, formal sources such as NIST’s National Vulnerability Database (NVD), United Sta...