Posts

Showing posts from 2021
Image
  Code of Criminal Procedure Section1 Introduction        For every High Court, the Central Government or the State Government shall, after consultation with the High Court, appoint a Public Prosecutor and may also appoint one or more Additional Public Prosecutors, for conducting in such Court, any prosecution, appeal or other proceeding on behalf of the Central This Act may be called the Code of Criminal Procedure, 1973. It extends to the whole of India except the State of Jammu and Kashmir; provided that the provisions of this Code, other than those relating to Chapters VIII , X and XI thereof, shall not apply— to the State of Nagaland, to the tribal areas but the concerned State Government may, by notification apply such provisions or any of them to the whole or part of the State of Nagaland or such tribal areas, as the case may be, with such supplemental, incidental or consequential modifications, as may be specified in the notification. It shall come into force on the
Image
SBI, ICICI, HDFC, Axis Bank, PNB and the Indian IT department targeted in phishing scam. INTRODUCTION  Cyber criminals are trying to lure Indian users into revealing important personal information with a new report on Monday warning that suspicious messages asking users to submit an application for the disbursement of income tax refund have been doing the rounds, with a link that directs users to a web page looking like the income tax e-filing web page. Which banks hack by phishing scam ? The targeted banks in the campaign include the State Bank of India, ICICI, HDFC, Axis Bank and Punjab National Bank, revealed an investigation by New Delhi-based think tank CyberPeace Foundation along with cybersecurity services firmAutobot Infosec. The suspicious links originate from the US and France, said the report, adding that the campaign is collecting personal as well as banking information from the user and getting into this type of trap could cause a massive financial loss for the users. All

How to hack Solar wind ?

Image
     A malicious web shell deployed on Windows systems by leveraging a previously undisclosed zero-day in Solar Winds' Orion network monitoring software may have been the work of a possible Chinese threat group.       In a report published by Secure works on Monday, the cyber security firm attributed the intrusions to a threat actor it calls Spiral.       Back on December 22, 2020, Microsoft disclosed that a second   espionage group may have been abusing the IT infrastructure provider's Orion software to drop a persistent backdoor called Supernova on target systems. The findings were also corroborated by cyber security firms Palo Alto Networks' Unit 42 threat intelligence team and GuidePoint Security, both of whom described Supernova as a .NET web shell implemented by modifying an "app_web_logoimagehandler.ashx.b6031896.dll" module of the SolarWinds Orion application. What is role of  CTU Researchers ? According to Secure works Counter Threat Unit (CTU) researche

How to hack vaccine of covid - 19 ?

Image
  How the Chinese hackers hack the Bharat Biotech security ?        A Chinese state-backed hacking group has in recent weeks targeted the IT systems of two Indian vaccine makers whose corona virus shots are being used in the country's immunisation campaign, cyber intelligence firm  Cyfirma told Reuters . Why the chinese hack the bharat biotech  security?     "The real motivation here is actually exfiltrating intellectual property and getting a competitive advantage over Indian pharmaceutical companies," said Cyfirma Chief Executive Kumar Ritesh, formerly a top cyber official with British foreign intelligence agency MI6. Where the chinese cyber attack happened ?    "They checked and they came back," Cyfirma said. "Our technical analysis and evaluation verified the threats and attacks."    The US Department of Justice said here in 2018 that  APT10 had acted in association with the Chinese Ministry of State Security .       Microsoft said in November tha

What is Cyber Defamation ? And What are Legal Issues Involved?

Image
CYBER DEFAMATION   A. Definition Cyber defamation is publishing of defamatory material against another person with the help of computers or Internet. If someone publishes some defamatory statement about some other person on a website or send emails containing defamatory material to other persons with the intention to defame the other person about whom the statement has been made would amount to cyber defamation.    B. Legal Issues Involved Section 66A of The Information Technology Act says that any person who sends, by means of a computer resource or a communication device:-    Any information that is grossly offensive or has menacing character; or   Any content information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device.  Any electronic mail or electr

Which are the top tools used for Pentesting and Bug Hunting??

Image
10 Open Source Security Testing Tools To Test Your Website Hello, guy's today we are going see some more tools which are Freely available Tools for security Testing. These tools going to help you to find the bugs and problems in your website or the website you are testing. These tools can be used to make your work easier for finding bugs and help you to earn more money. The two most effective ways to scrutinize the security status of a website are vulnerability assessment and penetration testing. Here is a list of top open-source tools popular among security testers: 1. NetSparker NetSparker is one in all pack for all the things you need to for the website security. Available as both hosted as well as self-hosted solutions, this platform can be easily integrated completely in any type of test and dev environment. NetSparker has a trade-marked Proof-Based-Scanning technology that uses automation to identify vulnerabilities and verify false positives, thus eliminating the need

What is Cyber Law In India?

Image
  Cyber Law India            Cyber Law India i s an organization that is dedicated to the passing of relevant and dynamic Cyber laws in India. Considering India is one of the biggest economies impacting electronic commerce and the biggest markets to target, it is but natural to accept that India should have in place appropriate enabling legal provisions for effective and secure cyber transactions.      Cyber Law India as an organization, has been active since late 1990’s in India. This organization has been spreading awareness through various means, amongst the people at large about the necessity of the Cyber laws and the need for having strong and vibrant Cyber laws in India. Cyber law India was responsible for conducting various programmes directing at creating more awareness about the needs for Cyber law in India. The Information Technology Bill 1999 when presented in Parliament, was appropriately analyzed at Cyber law India. Dr. Pavan Duggal, President, Cyber Law India, was respons

Which are the Best password Manager in 2021??

Image
 Hello Guys, after a long gap of vacation we are back again with some new type of hacks and security news and many more hacking applications. So, Hows was your experience in this covid period please tells as in the comment sections what you learn abut hacking and cyber security etc etc. Let's begin with our today's topic that is: BEST FREE PASSWORD MANAGER FOR 2021?? SO as we all now we have in this Covid pandemic there were a large amount of cyber crime happened and many people lost their data because of not taking care of their personal information such as password. We all have various accounts on various websites for some or the other reason but we can't remember all website account and password details so we end with forgetting or we write in some normal text file with eventually some leads to a clear access to our personal account details and our social media or any other account access. So that's why we need a password manager so we can store our password at safe