Sunday, 26 April 2020

Top 5 Most Advanced Cyber Security Tools and Softwares


1.     Teramind : Teramind is one of the best cyber security systems in the market and also one of the top providers of employee monitoring software. It helps in detecting suspicious behaviour in the systems and preventing data loss. They work with over 2000 organizations across the verticals of energy, manufacturing, finance, retail, technology, government, and healthcare. The software detects malicious behaviour, monitors threats and provides security approach from a user’s perspective.
SOURCE: GOOGLE

2.WebTitan : It is a DNS-based cyber security software and web content filter that blocks ransom ware, malware and cyber attacks. This helps businesses, public WIFI providers and educational institutions for having complete control over their applications. The software provides numerous features like behavioural analytics, AI/Machine learning scanning, granular policy control, IOC verification, comprehensive reporting, users can get advanced web content filtering. It also has the functionality to prevent access to unsuitable content.

SOURCE: GOOGLE
3.Barkly : Barkly has a simple management system and provides the smartest technology and most reliable protection. It blocks all forms of attack across all the intents and vectors. Blacklisting, whitelisting, incident and endpoint management, behavioral analytics, and incident and endpoint management are some of the top features of this software. It allows visibility into various levels of the system through its three-level architecture pattern.

SOURCE: GOOGLE

4.Indeni : It is an automated and crowd-sourced cybersecurity application for security and network infrastructure. The users of this application get access to anatural resource of maintenance, automation tasks, network visibility, high availability, security, and vendor best practices. The top features of this application include AI/Machine learning, behavioral analytics, incident management, etc. It easily detects any form of ransomware or malicious activity in the networks or systems.

SOURCE: GOOGLE

5.Acunetix :
 It is one of the top automatic cybersecurity systems and created to tackle the increasing rate of cyberattacks. It has an extensive feature list of manual and automated penetration testing tools which enables the users to learn about the vulnerability assessment and repair any detected threats. It is ideal for military, education, government organizations, finance, e-commerce, telecom, and banking sectors.

SOURCE: GOOGLE




Friday, 17 April 2020

SOCIAL MEDIA CRIMES


More and more people, regardless of age and gender, are signing up for profiles on online social networks for connecting with each other in this virtual world. Some have hundreds or thousands of friends and followers spread across multiple profiles. But at the same time there is spread of fake profiles also. Fake profiles often spam legitimate users, posting inappropriate or illegal content. Fake profiles are also created while misrepresenting some known person to cause harassment to him/her.

The most common targeted websites/apps for creating ‘Fake Profiles’ are as under:
1. Facebook
SOURCE:GOOGLE

2. Instagram
SOURCE:GOOGLE

3. Twitter
SOURCE:GOOGLE


4. LinkedIn
SOURCE:GOOGLE


Below are the common crimes being committed on or as a result of Social Media:-

1. Online Threats, Stalking, Cyber bullying
The most commonly reported and seen crimes that occur on social media involve people making threats, bullying, harassing, and stalking others online. While much of this type of activity goes unpunished, or isn't taken seriously, victims of these types of crimes frequently don't know when to call the police. 
If you feel threatened by a statement made online about you, or believe that the threat is credible, it's probably a good idea to consider calling the police.
SOURCE:GOOGLE
2. Hacking and Fraud
Although logging into a friend's social media account to post an embarrassing status message may be acceptable between friends, but technically, can be a serious crime. Additionally, creating fake accounts, or impersonation accounts, to trick people (as opposed to just remaining anonymous), can also be punished as fraud depending on the actions the fake/impersonation account holder takes.
SOURCE:GOOGLE
3. Buying Illegal Things
Connecting over social media to make business connections, or to buy legal goods or services may be perfectly legitimate. However, connecting over social media to buy drugs, or other regulated, controlled or banned products is probably illegal.
SOURCE:GOOGLE

4. Vacation Robberies
Sadly, one common practice among burglars is to use social media to discover when a potential victim is on vacation. If your vacation status updates are publicly viewable, rather than restricted to friend groups, then potential burglars can easily see when you are going to be away for an extended period of time.
SOURCE:GOOGLE
5. Creation of fake profile
Creation of fake profile of a person and posting offensive content including morphed photographs on the fake profile
SOURCE:GOOGLE
6. Fake online friendship
Developing online friendship over social media (with no real-life familiarity and using the emotional connect to trick you in transferring funds on some pretext such as medical emergency, legal troubles, problems in a foreign country etc.
SOURCE:GOOGLE



Friday, 10 April 2020

Cyber Law in India and the IT Act, 2000


In India, cyber laws are contained in the Information Technology Act, 2000. The main object of this Act is to provide legal recognition to e-commerce and electronic formats and to facilitate the filing of electronic records with the Government. This legislation lays down rules and regulations related to cybercrimes, electronic information and formats, electronic authentication and digital signatures, and liability of network service providers. The I.T. Act is based on the united nation model law on electronic commerce 1996 recommended by the General Assembly of the United Nations by a resolution dated 30 January 1997.


The Indian Cyber Law covers these major aspects of Cyberspace and cybercrime:
1.   The Indian Cyber Law makes every format in electronic form legal, which means anything that you write, share and publish electronically is now considered legal.
2.   It also makes all electronic contracts legal, which means that an offer can be electronically made and accepted, and it would amount to a valid and binding electronic contract.
3.   The Indian Cyber Law recognizes and legalizes the concept of digital signatures and electronic authentications. 
4.   Indian Cyber Law covers almost all kinds of cybercrimes and provides punishment for the same. 
5.   It also punishes the people of other nationalities, provided their crimes involve any computer or network situated in India.

Source: Google 

Pros of the I.T. Act, 2000


1. Before the enactment of the I.T. Act, 2000, the usual means of communication such as emails and texts were not considered as a legal form of communication and due to this, they were not admissible as evidence in a court of law. But after the enactment of I.T. Act, 2000 electronic formats and communication got legal recognition, and now they are admissible as evidence in a court of law.

2.   With the introduction of the I.T. Act, 2000, now companies can carry out e-commerce and e-business and promote online transactions commercially using the legal infrastructure provided by this Act. 

3.   Digital signatures and authentications have been legalized after the I.T. Act, 2000, which is a great assistance to carry out transactions online as they help in verifying the identity of an individual on the internet.

4.  The I.T. Act, 2000, provides for corporate to have statutory remedies if anyone hacks and breaks into their computer systems or networks and causes any kind of damages. The I.T. Act, 2000 provides for monetary damages, by the way, compensation, as a remedy for such crimes. 

5.  The I.T. Act, 2000 has defined, recognized and penalized various cyber crimes such as hacking, spamming, identity theft, phishing and many more. Prior to this Act, cybercrimes were not included in any legislation, and there was no legal remedy for such crimes. 

6. The Act allows companies to issue digital certificates by becoming Certifying Authorities. 

7.  This Act also allows the Government to issue notices on the internet through e-governance. 

Source: Google

Cons of the I.T. Act, 2000
1.   The I.T. Act, 2000 may cause a conflict of jurisdiction. 

2.  Electronic commerce is based on the system of domain names. The I.T. Act, 2000 does not address the issues relating to domain names, rights and liabilities of domain owners. 

3.  The I.T. Act, 2000 does not provide for the protection of Intellectual Property Rights as issues regarding copyrights and patents are very common in relation to computer programs and networks.

4.  The offences covered and defined under the I.T. Act, 2000 are not exhaustive in nature. Since, with the advancements in technologies, computer programs and networks are constantly changing and evolving, and with this advancement, the nature of cybercrimes is also evolving. This Act does not cover various kinds of cybercrimes such as cyberstalking, cyber fraud, chat room abuse, theft of internet hours and many more. 

5.   The I.T. Act, 2000 has not addressed issues like privacy and content regulation, which is very necessary, considering the vulnerability internet poses. 

6.   Lastly, the main issue with this Act is its implementation. The I.T. Act, 2000 does not lay down any parameters for its implementation and regulations.

Source: Google 


Friday, 3 April 2020

TOP 7 MOST TRUSTED CYBERSECURITY FIRMS IN INDIA

The cybersecurity space in India is still in its growing stage at $4.4 billion a year. Now with the Indian government taking multiple initiative to encourage the digital transformation of the country through the growth of tech firms, the cybersecurity market is also set to grow at a CAGR(Compound annual growth rate) of 15% for the next five years. Experts predict the industry will grow to $35 billion by 2025.



Here we list the 7 most popular cybersecurity firms in India, who are already riding this growth wave:





1 Cyberlops infuses ltd       


Based out of Jaipur, this cybersecurity firm aims to provide digital protection to other tech firms and offers a wide range of information security services. This includes web and mobile application penetration testing, network penetration testing, wireless penetration testing, source code review, security enhancement, firewall and router set review.

This company’s services are used in sectors like law enforcement agencies, financial institutions, educational institutions and public and private sectors. 

SOURCE:GOOGLE


2
eSec Forte® Technologiess


eSec Forte Technologies is one of the few companies in India that have a CMMI (Capability Maturity Model Integration )level 3 certification for global consulting and IT services. They have expert offerings like infosec services, forensic services, malware detection, security audit, vulnerability management, penetration testing and risk assessment. Many of their services have been certified by various quality certification institutions.


They are authorised technology partners of information security solutions with several firms like Tufin, Atola Technology, Cyber Deception and more. eSec also manufactures CrackBox, their proprietary tool for password breaking/cracking. They have offices in Gurgaon (Headquarters), Bangalore, Mumbai, Singapore and Sri Lanka.


SOURCE:GOOGLE

3 Hicube Infosec Pvt. Ltd.


Hicube infosec is one of India’s leading cybersecurity organisations that specialises in vulnerability assessment and penetration testing, online malware scanner and cybercrime consultancy. They strive towards having a firm global footprint in cybersecurity and cybercrime investigation. They provide customised and specialised products and services to their clients.


Hicube also offers training in cybersecurity analyst, cybersecurity specialist and cybersecurity expert. These courses are designed for people who intend to explore these fields deeper and advance their understanding of the subject. These courses can also be taken up by non-technical professionals looking for career opportunities in the cybersecurity space.


SOURCE:GOOGLE


4 k7 computer private ltd.


Founded by J Kesavardhanan in 1991, K7 computing has introduced cybersecurity solutions which have won numerous international awards and certifications. This company has clients in over 100 countries. They provide every client with constant and consistent protection against any internet-based threats. 


With over 25 million users their client base covers a wide range of government organisations and private industries from finance to healthcare and education. K7 computing’s flagship products are K7 Total Security and K7 Enterprise Security which are used by home users and organisations alike.


SOURCE:GOOGLE


5
Quick Heal Technologies Ltd


Quick Heal is one of the leading It security solutions company in India. The company is headquartered in Pune and was founded in 1995. The company has put in nearly two and a half decades of R&D (Research and development )into the computer and network security solutions. Their clients range from home users and small offices to corporate companies. 

Quick Heal’s international products are certified by ICSA Labs, AV-Test and other such agencies. Their international operations span over 80 countries globally and the company has around 1,300 employees currently.


SOURCE:GOOGLE

6.Skylark Information Technologies Private Limited


 Headquartered in Chennai, this company was founded in 1993 and provides     IT solutions and services to over 300 clients. Skylark provides a range of IT  security solutions from application and database security, Next-Gen Firewall and endpoint mobile security solutions to cloud security solutions fully customised for the clients’ needs.

Skylark also offers a range of services in blockchain technology. They have partnered with manufacturers such as HPE, Fujitsu and VMware to offer complete IT infrastructure solutions for small and businesses alike. 


SOURCE:GOOGLE

7 wifi- jungle


Wi-Jungle’s journey started in 2014 and was the first private company to be launched as a Free WiFi service provider. Operating from Jaipur, the company now offers NextGen Network Security Firewall (NGFW)/ Unified Threat Management (UTM), Hotspot Gateway, etc to various companies across the globe in many industries like hospitality, healthcare, education, retail and more.

Wi-Jungle stands out from the rest of its competitors by providing one appliance that serves the purpose of NGFW/UTM as well as a hotspot gateway thus eliminating the necessity of two different devices.


SOURCE:GOOGLE


Monday, 23 March 2020

7 Types of Hackers You Should Know





.      1. White Hat: Also known as ethical hackers, White Hat hackers are the good guys of the hacker world. They'll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be [certified to pursue a career in ethical hacking](https://www.cybrary.it/course/ethical-hacking/). The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.


SOURCE: GOOGLE

    2. Black Hat: Also known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on.


SOURCE: GOOGLE

   3. Gray Hat: Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don't steal money or information (although, sometimes they deface a website or two), yet they don't help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media's attention.

SOURCE: GOOGLE

  4.Green Hat: These are the hacker "n00bz," but unlike Script Kiddies, they care about hacking and strive to become full-blown hackers. They're often flamed by the hacker community for asking many basic questions. When their questions are answered, they'll listen with the intent and curiosity of a child listening to family stories. 


SOURCE: GOOGLE
  
   5 .Red Hat: These are the vigilantes of the hacker world. They're like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer.

SOURCE: GOOGLE


9     6 .Blue Hat: If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who've them angry. Most Blue Hats are n00bz, but like the Script Kiddies, they have no desire to learn.

SOURCE: GOOGLE




7.Script Kiddie: Script Kiddies normally don't care about hacking (if they did, they'd be Green Hats. See below.). They copy code and use it for a virus or an SQLi or something else. Script Kiddies will never hack for themselves; they'll just download overused software (LOIC or Metasploit, for example) and watch a YouTube video on how to use it. A common Script Kiddie attack is DoSing or DDoSing (Denial of Service and Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain. This attack is frequently used by the "hacker" which doesn't help anyone's reputation

SOURCE: GOOGLE




















Tuesday, 17 March 2020

Top 10 personal security tips and tricks


   


1. Keep Your Software Up to Date


One of the most important cyber security tips to mitigate ransomware is patching outdated software, both operating system, and applications. This helps remove critical vulnerabilities that hackers use to access your devices. Here are a few quick tips to get you started:
·         Turn on automatic system updates for your device
·         Make sure your desktop web browser uses automatic security updates
·         Keep your web browser plugins like Flash, Java, etc. updated
 Check out our blog on patch management best pratices.

SOURCE :GOOGLE

2. Use Anti-Virus Protection & Firewall


Anti-virus (AV) protection software has been the most prevalent solution to fight malicious attacks. AV software blocks malware and other malicious viruses from entering your device and compromising your data. Use anti-virus software from trusted vendors and only run one AV tool on your device.
Using a firewall is also important when defending your data against malicious attacks. A firewall helps screen out hackers, viruses, and other malicious activity that occurs over the Internet and determines what traffic is allowed to enter your device. Windows and Mac OS X comes with their respective firewalls, aptly named Windows Firewall and Mac Firewall. Your router should also have a firewall built in to prevent attacks on your network. 

SOURCE :GOOGLE

3. Use Strong Passwords & Use a Password Management Tool


You’ve probably heard that strong passwords are critical to online security. The truth is passwords are important in keeping hackers out of your data! According to the National Institute of Standards and Technology’s (NIST) 2017 new password policy framework, you should consider:
·         Dropping the crazy, complex mixture of upper case letters, symbols, and numbers. Instead, opt for something more user-friendly but with at least eight characters and a maximum length of 64 characters.
·         Don’t use the same password twice.
·         The password should contain at least one lowercase letter, one uppercase letter, one number, and four symbols but not the following &%#@_.
·         Choose something that is easy to remember and never leave a password hint out in the open or make it publicly available for hackers to see
·         Reset your password when you forget it. But, change it once per year as a general refresh. 



SOURCE :GOOGLE

4. Use Two-Factor or Multi-Factor Authentication


Two-factor or multi-factor authentication is a service that adds additional layers of security to the standard password method of online identification. Without two-factor authentication, you would normally enter a username and password. But, with two-factor, you would be prompted to enter one additional authentication method such as a Personal Identification Code, another password or even fingerprint. With multi-factor authentication, you would be prompted to enter more than two additional authentication methods after entering your username and password.

SOURCE :GOOGLE

5. Learn about Phishing Scams – be very suspicious of emails, phone calls, and flyers

We recently blogged that phishing scams are nastier than ever this year. In a phishing scheme attempt, the attacker poses as someone or something the sender is not to trick the recipient into divulging credentials, clicking a malicious link, or opening an attachment that infects the user’s system with malware, trojan, or zero-day vulnerability exploit. This often leads to a ransomware attack. In fact, 90% of ransomware attacks originate from phishing attempts.

A few important cyber security tips to remember about phishing schemes include:
1.      Bottom line – Don’t open email from people you don’t know
2.      Know which links are safe and which are not – hover over a link to discover where it directs to
3.      Be suspicious of the emails sent to you in general – look and see where it came from and if there are grammatical errors
4.      Malicious links can come from friends who have been infected too. So, be extra careful!

SOURCE :GOOGLE

6. Connect Securely


Cyber security tips about this have been dished out by nearly every tech expert under the sun, but many still don’t follow this advice. You might be tempted to connect your device to an unsecured connection, but when you weigh the consequences, it’s not worth it. Only connect to private networks when possible, especially when handling sensitive information.

SOURCE :GOOGLE