Sunday, 26 April 2020

Top 5 Most Advanced Cyber Security Tools and Softwares


1.     Teramind : Teramind is one of the best cyber security systems in the market and also one of the top providers of employee monitoring software. It helps in detecting suspicious behaviour in the systems and preventing data loss. They work with over 2000 organizations across the verticals of energy, manufacturing, finance, retail, technology, government, and healthcare. The software detects malicious behaviour, monitors threats and provides security approach from a user’s perspective.
SOURCE: GOOGLE

2.WebTitan : It is a DNS-based cyber security software and web content filter that blocks ransom ware, malware and cyber attacks. This helps businesses, public WIFI providers and educational institutions for having complete control over their applications. The software provides numerous features like behavioural analytics, AI/Machine learning scanning, granular policy control, IOC verification, comprehensive reporting, users can get advanced web content filtering. It also has the functionality to prevent access to unsuitable content.

SOURCE: GOOGLE
3.Barkly : Barkly has a simple management system and provides the smartest technology and most reliable protection. It blocks all forms of attack across all the intents and vectors. Blacklisting, whitelisting, incident and endpoint management, behavioral analytics, and incident and endpoint management are some of the top features of this software. It allows visibility into various levels of the system through its three-level architecture pattern.

SOURCE: GOOGLE

4.Indeni : It is an automated and crowd-sourced cybersecurity application for security and network infrastructure. The users of this application get access to anatural resource of maintenance, automation tasks, network visibility, high availability, security, and vendor best practices. The top features of this application include AI/Machine learning, behavioral analytics, incident management, etc. It easily detects any form of ransomware or malicious activity in the networks or systems.

SOURCE: GOOGLE

5.Acunetix :
 It is one of the top automatic cybersecurity systems and created to tackle the increasing rate of cyberattacks. It has an extensive feature list of manual and automated penetration testing tools which enables the users to learn about the vulnerability assessment and repair any detected threats. It is ideal for military, education, government organizations, finance, e-commerce, telecom, and banking sectors.

SOURCE: GOOGLE




Friday, 17 April 2020

SOCIAL MEDIA CRIMES


More and more people, regardless of age and gender, are signing up for profiles on online social networks for connecting with each other in this virtual world. Some have hundreds or thousands of friends and followers spread across multiple profiles. But at the same time there is spread of fake profiles also. Fake profiles often spam legitimate users, posting inappropriate or illegal content. Fake profiles are also created while misrepresenting some known person to cause harassment to him/her.

The most common targeted websites/apps for creating ‘Fake Profiles’ are as under:
1. Facebook
SOURCE:GOOGLE

2. Instagram
SOURCE:GOOGLE

3. Twitter
SOURCE:GOOGLE


4. LinkedIn
SOURCE:GOOGLE


Below are the common crimes being committed on or as a result of Social Media:-

1. Online Threats, Stalking, Cyber bullying
The most commonly reported and seen crimes that occur on social media involve people making threats, bullying, harassing, and stalking others online. While much of this type of activity goes unpunished, or isn't taken seriously, victims of these types of crimes frequently don't know when to call the police. 
If you feel threatened by a statement made online about you, or believe that the threat is credible, it's probably a good idea to consider calling the police.
SOURCE:GOOGLE
2. Hacking and Fraud
Although logging into a friend's social media account to post an embarrassing status message may be acceptable between friends, but technically, can be a serious crime. Additionally, creating fake accounts, or impersonation accounts, to trick people (as opposed to just remaining anonymous), can also be punished as fraud depending on the actions the fake/impersonation account holder takes.
SOURCE:GOOGLE
3. Buying Illegal Things
Connecting over social media to make business connections, or to buy legal goods or services may be perfectly legitimate. However, connecting over social media to buy drugs, or other regulated, controlled or banned products is probably illegal.
SOURCE:GOOGLE

4. Vacation Robberies
Sadly, one common practice among burglars is to use social media to discover when a potential victim is on vacation. If your vacation status updates are publicly viewable, rather than restricted to friend groups, then potential burglars can easily see when you are going to be away for an extended period of time.
SOURCE:GOOGLE
5. Creation of fake profile
Creation of fake profile of a person and posting offensive content including morphed photographs on the fake profile
SOURCE:GOOGLE
6. Fake online friendship
Developing online friendship over social media (with no real-life familiarity and using the emotional connect to trick you in transferring funds on some pretext such as medical emergency, legal troubles, problems in a foreign country etc.
SOURCE:GOOGLE



Friday, 10 April 2020

Cyber Law in India and the IT Act, 2000


In India, cyber laws are contained in the Information Technology Act, 2000. The main object of this Act is to provide legal recognition to e-commerce and electronic formats and to facilitate the filing of electronic records with the Government. This legislation lays down rules and regulations related to cybercrimes, electronic information and formats, electronic authentication and digital signatures, and liability of network service providers. The I.T. Act is based on the united nation model law on electronic commerce 1996 recommended by the General Assembly of the United Nations by a resolution dated 30 January 1997.


The Indian Cyber Law covers these major aspects of Cyberspace and cybercrime:
1.   The Indian Cyber Law makes every format in electronic form legal, which means anything that you write, share and publish electronically is now considered legal.
2.   It also makes all electronic contracts legal, which means that an offer can be electronically made and accepted, and it would amount to a valid and binding electronic contract.
3.   The Indian Cyber Law recognizes and legalizes the concept of digital signatures and electronic authentications. 
4.   Indian Cyber Law covers almost all kinds of cybercrimes and provides punishment for the same. 
5.   It also punishes the people of other nationalities, provided their crimes involve any computer or network situated in India.

Source: Google 

Pros of the I.T. Act, 2000


1. Before the enactment of the I.T. Act, 2000, the usual means of communication such as emails and texts were not considered as a legal form of communication and due to this, they were not admissible as evidence in a court of law. But after the enactment of I.T. Act, 2000 electronic formats and communication got legal recognition, and now they are admissible as evidence in a court of law.

2.   With the introduction of the I.T. Act, 2000, now companies can carry out e-commerce and e-business and promote online transactions commercially using the legal infrastructure provided by this Act. 

3.   Digital signatures and authentications have been legalized after the I.T. Act, 2000, which is a great assistance to carry out transactions online as they help in verifying the identity of an individual on the internet.

4.  The I.T. Act, 2000, provides for corporate to have statutory remedies if anyone hacks and breaks into their computer systems or networks and causes any kind of damages. The I.T. Act, 2000 provides for monetary damages, by the way, compensation, as a remedy for such crimes. 

5.  The I.T. Act, 2000 has defined, recognized and penalized various cyber crimes such as hacking, spamming, identity theft, phishing and many more. Prior to this Act, cybercrimes were not included in any legislation, and there was no legal remedy for such crimes. 

6. The Act allows companies to issue digital certificates by becoming Certifying Authorities. 

7.  This Act also allows the Government to issue notices on the internet through e-governance. 

Source: Google

Cons of the I.T. Act, 2000
1.   The I.T. Act, 2000 may cause a conflict of jurisdiction. 

2.  Electronic commerce is based on the system of domain names. The I.T. Act, 2000 does not address the issues relating to domain names, rights and liabilities of domain owners. 

3.  The I.T. Act, 2000 does not provide for the protection of Intellectual Property Rights as issues regarding copyrights and patents are very common in relation to computer programs and networks.

4.  The offences covered and defined under the I.T. Act, 2000 are not exhaustive in nature. Since, with the advancements in technologies, computer programs and networks are constantly changing and evolving, and with this advancement, the nature of cybercrimes is also evolving. This Act does not cover various kinds of cybercrimes such as cyberstalking, cyber fraud, chat room abuse, theft of internet hours and many more. 

5.   The I.T. Act, 2000 has not addressed issues like privacy and content regulation, which is very necessary, considering the vulnerability internet poses. 

6.   Lastly, the main issue with this Act is its implementation. The I.T. Act, 2000 does not lay down any parameters for its implementation and regulations.

Source: Google 


Friday, 3 April 2020

TOP 7 MOST TRUSTED CYBERSECURITY FIRMS IN INDIA

The cybersecurity space in India is still in its growing stage at $4.4 billion a year. Now with the Indian government taking multiple initiative to encourage the digital transformation of the country through the growth of tech firms, the cybersecurity market is also set to grow at a CAGR(Compound annual growth rate) of 15% for the next five years. Experts predict the industry will grow to $35 billion by 2025.



Here we list the 7 most popular cybersecurity firms in India, who are already riding this growth wave:





1 Cyberlops infuses ltd       


Based out of Jaipur, this cybersecurity firm aims to provide digital protection to other tech firms and offers a wide range of information security services. This includes web and mobile application penetration testing, network penetration testing, wireless penetration testing, source code review, security enhancement, firewall and router set review.

This company’s services are used in sectors like law enforcement agencies, financial institutions, educational institutions and public and private sectors. 

SOURCE:GOOGLE


2
eSec Forte® Technologiess


eSec Forte Technologies is one of the few companies in India that have a CMMI (Capability Maturity Model Integration )level 3 certification for global consulting and IT services. They have expert offerings like infosec services, forensic services, malware detection, security audit, vulnerability management, penetration testing and risk assessment. Many of their services have been certified by various quality certification institutions.


They are authorised technology partners of information security solutions with several firms like Tufin, Atola Technology, Cyber Deception and more. eSec also manufactures CrackBox, their proprietary tool for password breaking/cracking. They have offices in Gurgaon (Headquarters), Bangalore, Mumbai, Singapore and Sri Lanka.


SOURCE:GOOGLE

3 Hicube Infosec Pvt. Ltd.


Hicube infosec is one of India’s leading cybersecurity organisations that specialises in vulnerability assessment and penetration testing, online malware scanner and cybercrime consultancy. They strive towards having a firm global footprint in cybersecurity and cybercrime investigation. They provide customised and specialised products and services to their clients.


Hicube also offers training in cybersecurity analyst, cybersecurity specialist and cybersecurity expert. These courses are designed for people who intend to explore these fields deeper and advance their understanding of the subject. These courses can also be taken up by non-technical professionals looking for career opportunities in the cybersecurity space.


SOURCE:GOOGLE


4 k7 computer private ltd.


Founded by J Kesavardhanan in 1991, K7 computing has introduced cybersecurity solutions which have won numerous international awards and certifications. This company has clients in over 100 countries. They provide every client with constant and consistent protection against any internet-based threats. 


With over 25 million users their client base covers a wide range of government organisations and private industries from finance to healthcare and education. K7 computing’s flagship products are K7 Total Security and K7 Enterprise Security which are used by home users and organisations alike.


SOURCE:GOOGLE


5
Quick Heal Technologies Ltd


Quick Heal is one of the leading It security solutions company in India. The company is headquartered in Pune and was founded in 1995. The company has put in nearly two and a half decades of R&D (Research and development )into the computer and network security solutions. Their clients range from home users and small offices to corporate companies. 

Quick Heal’s international products are certified by ICSA Labs, AV-Test and other such agencies. Their international operations span over 80 countries globally and the company has around 1,300 employees currently.


SOURCE:GOOGLE

6.Skylark Information Technologies Private Limited


 Headquartered in Chennai, this company was founded in 1993 and provides     IT solutions and services to over 300 clients. Skylark provides a range of IT  security solutions from application and database security, Next-Gen Firewall and endpoint mobile security solutions to cloud security solutions fully customised for the clients’ needs.

Skylark also offers a range of services in blockchain technology. They have partnered with manufacturers such as HPE, Fujitsu and VMware to offer complete IT infrastructure solutions for small and businesses alike. 


SOURCE:GOOGLE

7 wifi- jungle


Wi-Jungle’s journey started in 2014 and was the first private company to be launched as a Free WiFi service provider. Operating from Jaipur, the company now offers NextGen Network Security Firewall (NGFW)/ Unified Threat Management (UTM), Hotspot Gateway, etc to various companies across the globe in many industries like hospitality, healthcare, education, retail and more.

Wi-Jungle stands out from the rest of its competitors by providing one appliance that serves the purpose of NGFW/UTM as well as a hotspot gateway thus eliminating the necessity of two different devices.


SOURCE:GOOGLE