- Taking advantage of human nature
- being needy or authorative
- USB Disk dropping
- Written Skills
- Phishing emails
- Targeted Attacks
- Calling the victims to catch them off-guarded
- name dropping technique
I’m back with a new post, this time on Indian Cyber Laws. In this post I will guide you through the major sections of Indian Information Technology Act. Although this is a very high level overview, it will still help you to understand what all are the offense and what punishment can a culprit be sentenced if found guilty.
My detailed posts on specifications of Sections and Acts in detail(Verbiage, Description, When can be charged, how to nullify the blame, case studies etc.) will be forthcoming under Cyber Laws Series. Meanwhile here is the list of Acts, offenses & punishments.
|63||Damage to computer system||Compensation up to Rs. 1 Crore.|
|66||Hacking||Fine up to Rs. 2 Lakhs & 3 years of imprisonment.|
|67||Publishing obscene material||Fine up to Rs.1 Lakh & 5 years of imprisonment, Double if offense is repeated.|
|68||Not complying with directions of controller||Fine up to Rs. 2 Lakhs & 3 years of imprisonment.|
|70||Attempting to access Secure System||Imprisonment up to 10 years.|
|72||Breaching Confidentiality||Fine up to Rs. 1 Lakhs & 2 years of imprisonment|
|73||Publishing false digital signature||Fine up to Rs. 1 Lakhs OR 2 years of imprisonment OR Both.|
|74||Publishing digital signature for fraudulent purpose||Fine up to Rs. 1 Lakhs & 2 years of imprisonment.|
Oh I almost forgot the next post is dedicated to Article 66A which we Indian hold very closer to our heart as it is directly associated with our freedom of speech. To know What happened recently in regards with IT Act 66A, why that happened and how it may affect your daily online presence, Stay Tuned.
Viva la Security!!
Image Courtesy: Internet.
At last I got some time for for my most beloved yet highly neglected blog. But I am gonna make it habit to pen down every night on this little world of mine.
So when I thought of resuming writing the first chord that hit me was Social Engineering. I know there are biggies who are constantly writing a post or two on this most powerful weapon but every person has his/her special gimmicks. Nope I am not gonna share those in the first post itself, let the wait be worth.
I would like to start with the flicks which amazingly portrayed Social Engineering Tantrums. The whole point behind giving a movie list in the beginning is simple just to cast a spell of this amazing Art of Deception. Watch them in any order but my favorites go like this.
- Catch Me If You Can
- Matchstick Men
- The Usual Suspects
- Dirty Rotten Scoundrels
- Six Degrees of Separation
- Take down
- Now you see me
Although Take Down is just one side of the coin but its a good flick, however if you really want to know what happened in the entire operation go and read The Art of Deception by none other than the man himself Kevin Mitnick.
A shorter version on what part I liked the most in these movies will be forthcoming in the update of this post.
Till then, Viva La Security & have a Security Perspective !!
In the name of Lord Kevin Mitnick, the man who redefined Security.
You must be thinking that I’ve gone crazy but don’t think twice over it cause I feel it the same way. 😉 My obsession with Kevin goes long back when he was the most renowned outlaw and people had started Free Kevin Movement. I am obsessed with how simple it was for him to perform Social Engineering and even more amused with the way he could coauthor the books The Art of Deception and The Art of Intrusion in which he could explain the tricks in even simpler manner.
For those of you who don’t know what is Social Engineering, I’d put it in his own words: “Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology.”
Welcome to next generation Security Threat Handling. In this series we will see as much of cons that can take place and how we should be dealing them.
Stay Tuned. Via la Security!
PS: All articles on this site are for educational purpose only. Author is neither responsible for any threat caused or offense being recorded. Imply your conscience before implementing or using any post.