Current laws lacking to manage cross-fringe digital wrong doings

blockchain620

Existing Malaysian law is lacking with regards to managing cross- boarder cyber crimes in the midst of flooding worldwide dangers, a cyber security master said today. Cyber Security Malaysia senior VP of Strategic Research Division, Sazali Sukardi, said nearby laws are just material inside the limits of Malaysia — which makes them difficult to be used against outer dangers.

“There joint effort between investigative gatherings is essential in tending to issues concerning cross-border cyber crimes,” he said at the International Association of Counter terrorism and Security Professionals’ Asean Counter Terrorism Symposium here.

Sazali brought up the impediment forced by Malaysian law was a typical issue looked among nearby authorization offices amid examinations concerning cross-fringe cybercrimes perpetrated against Malaysians by nonnatives abroad.

“For instance, a cybercriminal dwelling somewhere else perpetrates money related extortion on a Malaysian casualty through the web.“However, because of the legitimate restrictions, the casualty can’t look for appropriate equity since specialists can’t confine the criminal dwelling outside of Malaysia aside from with the assistance of experts in the nation of origin where the wrongdoing was supposedly carried out,” he stated, including that the criminal could have vanished by at that point.

He said an examination composed by the National Cyber security Agency under the domain of the National Security Council was led by the Attorney General Chambers as of late to decide the attainability of turning into a signatory of the Budapest Convention.Otherwise called the Convention of Cyber crime, it was the primary universal bargain trying to address web and PC wrongdoing by fitting national laws, enhancing investigative methods and expanding participation among its signatories.

The Convention was first marked in November 2001 and has a sum of 56 signatories around the world. In any case, the issue was still under thought as Sazali trusted Malaysia is still “not prepared” to be a signatory, as a few angles still should have been enhanced.“We must be readied when we sign the arrangement as signatories are relied upon to add to each other commonly.“What is the point in the event that we sign the bargain yet our foundation, labor or ability is deficient?” he asked, asking Malaysia to coordinate the “desires” of the settlement.

He brought up the regions that were all the while lacking when it came to cross-fringe examination included inadequate specialized aptitude, labor deficiencies and framework accessibility.

SOURCE:  https://www.malaysiainternet.my/mwforum/topic/current-laws-inadequate-to-deal-with-cross-border-cybercrimes/

You cannot ‘cyber-hijack’ an airplane, but you can still create mischief

_103331755_british_airways_getty

 

English airways has settled an August breach that brought about information being stolen from around 380,000 clients and the organization is treating a test of the occurrence with some “dire.”

The airline said in an announcement in regards to the breach, which happened between August 21 and Sept. 5. The rupture has been settled and the site is working regularly now.Information stolen included “the individual and money related subtle elements of clients making appointments on ba.com and the airline’s portable application were endangered,” yet noticed that the criminals didn’t scratch international ID or travel points of interest.

“While British Airways has guaranteed the general population that the influenced clients will be informed, we frequently observe the assessed number of influenced people develop after some time,” said Webroot senior security examiner Randy Abrams. Abrams said the information could be accessible to cyber-criminals who could “total and connect [it] to create altogether far reaching profiles.”He asked British Airways clients to “check in with their banks and Visa organizations – as they will moderate budgetary trade off – and set up two-factor validation for extra security.”

This is a hit to the  protection of common man’s data and British Airways joins a developing rundown of associations that have confronted a thump down punch.

SOURCE:- https://www.scmagazine.com/home/news/data-breach/hackers-steal-data-on-380000-british-airways-customers/

Curbs on tracking minors’ data may hurt tech giants

 

kids-with-phones-2-720x720.jpg

Technology giants such as Google, YouTube, Facebook, Instagram and Snap-chat, having large number of followers mostly including teenagers in India, are likely to be hit if Justice Srikrishna Committee’s suggestions to track data of and advertising targeted at users under the age of 18 are accepted. It suggests excluding such companies from reporting and tracking of children, monitoring their behavior and activities or targeting them with advertisements and using any of their personal data that can cause damage to them.Although some of the websites and apps allow children to sign up if they are 13 years of age or older, under India’s laws their terms and conditions are not considered valid. The Srikrishna panel is recommending enforcement the law stating that a minor cannot enter into a contract, under the Indian Contract Act 1872. Companies will require to set-up age verification mechanism and get parental approval of the users under the age of 18. In US, the Children’s Online Privacy Protection Act is applicable for those under the age of 13 — this is what the social media majors currently follow in India, too. The European Union’s General Data Protection Regulation (GDPR) has set the age limit for parental consent at 16. 

“Children are more vulnerable than adults, so longer the protection, the better. Everyone is interested in the generation that is coming, not the generation that has gone by. Everything that is popular today was once popular with teenagers. Companies would want a lower age, obviously,” said Mishi Choudhary, legal director at the Software Freedom Law Center in New York and managing partner of Mishi Choudhary & Associates in India. 

 

Mandavia M. (2018, July 30). Curbs on tracking minors’ data may hurt tech giants. Retrieved from https://economictimes.indiatimes.com/news/economy/policy/curbs-on-tracking-minors-data-may-hurt-tech-giants/articleshow/65191301.cms

The best way to fight cyber-crime is with proper awareness

safety-first.jpg 

The rise of cybercrime in India made experts realize that proper awareness and integration of the security policies was needed. Corporates are needed to speed up their security in order to speed up their security in order to leave the frauds behind. They discussed at a seminar in Kolkata that in order to counter the cyber threats corporates shouldn’t only enhance their security but also provide training to their employees to decrease the risk factors.

“India is called the ransomware (a virus) capital of Asia. The cyber threats are rising to steeply here that corporate should not only enhance their security protocols but also impart security training to its employees to minimise the risk factors,” said Sandeep Sengupta, chief of a city-based data security company.

Senior offers of the state police’s cyber cell stated that issues like debit and credit card fraud along with bank account hacking happen every day now. They pointed the fact that criminals have the benefit of anonymity in cybercrime as they don’t have to be there physically in order to harm someone.

Being careful against fake websites or spam emails is necessary. Chatterjee who deals with Cyber and E-evidence law said, “In case of a cybercrime through social media, the biggest hurdle is to get the necessary data from the service provider. Unlike the telecommunication companies, the social media websites often refuse to share their user’s information due to security reasons. They even decline to share the IP address used to post or share something online”. It is necessary to distinguish between investigation and human rights violation in these cases, he pointed.

 

IANS (2017, May 12). The best way to fight cybercrime is with proper awareness. Retrieved from https://www.firstpost.com/tech/news-analysis/the-best-way-to-fight-cybercrime-is-with-proper-awareness-experts-3702615.html

 

Data protection bill may be tabled in winter session

data_protection

The government plans to propose the draft regarding personal data protection bill submitted by Justice BN Srikrishna committee in Parliament by December after discussing with different ministries, industry representatives and the public. The draft will allow citizens and users to have a word about how and for what their personal data can be used and they will also have the right to withdraw consent. There will also be the option of ‘right to be forgotten’, subject to certain conditions. However, some of the committee’s recommendations have raised concerns among companies. Two members of the Srikrishna committee, Rama Vedashree, CEO of Data Security Council of India and Rishikesha Krishnan, director at IIM Indore, have also expressed disagreement on some recommendations. While both have expressed concern on data localization, Vedashree said she disagreed with the categorization of financial data and passwords as personal data in the draft bill. She also felt inclusion of “criminal offences” is draconian and wanted an industry wide consultation before enforcing the law. The passage of the bill may not be easy as draft law has overriding provisions over existing laws and more than 50 laws, particularly those dealing with Aadhaar, right to information and information technology, may have to be revised. 

 

Agarwal S. (2018, August 03).  Data protection bill may be tabled in winter session. Retrieved from https://economictimes.indiatimes.com/tech/internet/data-protection-bill-may-be-tabled-in-winter-session/articleshow/65251657.cms

How internet has become a crime scene

 

543504-cyber-crime-120116.jpg

Having cameras on their phones it has become a weapon for people. Due to this a woman’s life was shattered when her ex shared her nudes and continued to threaten her with further sharing. Such acts can lead to irreversible damage with pictures going on the internet. We are surrounded by cyber. New technologies including Internet of Things (IOT), digital assistant, artificial intelligence, etc. are designed to attract us. Every equipment we use is now-a-days connected to internet and can be turned into a weapon by cyber criminals. The sophistication of cyber-crime along with innovative use of technology makes committing crime quite easier than before. User’s details and data including credit card details are stolen through viruses, spam emails, sites, photos and what not. Children sharing their nudes or “sexy” pictures on web chats thinking that the person on the other hand is trustworthy. Apart from revenge porn cases of morphing faces on nudes on social media are also on rise these. People are being trolled and victimized including celebrities on daily basis. However, after several cases emerging people have finally woken up and are taking action against pornography and child pornography. Not only the law but the knowledge of its implications and restrictions is necessary as well.

 

Nappinai N.S. (2017, November 03). How internet has become a crime scene. Retrieved from https://economictimes.indiatimes.com/tech/internet/no-one-is-safe-how-internet-has-become-a-playground-for-cyber-criminals/articleshow/61418856.cms

Government asks WhatsApp to outline steps taken to deal with fake news.

The government has asked WhatsApp to convey the various steps they take to deal with fake news, even as it said the Centre has no plans to tap into citizen’s messages, Parliament was informed today. 

Besides, the government has taken several initiatives for user awareness relating to cyber safety and the Indian Computer Emergency Response Team (CERT-In) issues advisories about cyber safety and security, Minister of State for Electronics and IT SS Ahluwalia pointed.

Following multiple incidents of mob killing across the country, the government had slapped WhatsApp with two notices, with the second one warning that it will treat it as ‘abettor’ of rumor propagation and legal consequences will follow if satisfactory checks are not put in place. WhatsApp, in its response to these notices, had outlined initiatives it’s taking to curb fake news circulation, including education and advocacy efforts.               

whatsapp_660_071118073007

“MHA has also issued a number of advisories which includes advisory on untoward incidents in the name of protection of cows…advisory on cyber-crime prevention and control…and also an advisory on incidents of lynching by mobs in some States fueled by rumors of lifting/kidnapping of children,” he said. 
He added, pursuant to the directions of a Supreme Court order, MHA has issued a directive to all states for implementation of directions of the apex court and has constituted a Group of Ministers and a High level Committee to make recommendations in this matter. 

Retrieved from https://economictimes.indiatimes.com/news/politics-and-nation/government-asks-whatsapp-to-outline-steps-taken-to-deal-with-fake-news/articleshow/65324066.cms

IS CLOUD A SAFE STORAGE HOUSE?

As the innovation propels, individuals desire to utilize the assets which don’t require much time to manage and are anything but difficult to get to, regardless of how much mischief it makes. Such a progression may at times make calamities. In any case, the vast majority of us take it easy in light of the fact that we trust we won’t be the prey of such mis-happenings. One of such innovation is cloud computing, which has artistically changed the world by conveying the advanced administrations. It has not just met the capacity issues regarding huge information yet in addition profited numerous associations by diminishing different expenses and accomplishing upper hand by this center competency (distributed computing).SMEs-can-benefit-from-riding-the-wave-of-Internet-of-Things2-1300x671

The Companies as well as, we the average folks store a tremendous information in the cloud. The vast majority of the occasions this information is extremely delicate in nature including protected innovation. We assume that the information we store in the cloud is totally protected, yet tragically it’s not. Cloud suppliers uncover an arrangement of programming (UIs) or APIs that clients use to oversee and cooperate with cloud administrations. There is an appropriate framework administration required from the specialist co-ops end, on the grounds that it’s where the odds of getting your framework hacked is 100%. Then again, some cloud administrations are utilized as vectors or medium for information ex-filtration; where assailants encode the malignant programming into records and recordings and transfer them publicly. There are numerous instances of information rupture where specialist co-ops are the genuine guilty parties who purposefully give these administrations the intention to endeavor information break and control the information or take the information.

Not just the enormous organizations fall prey of such information yet we ordinary citizens also. For the most part, youngsters are more technophillic. They tend to store their delicate information on the cloud which incorporates their photographs and recordings. Such touchy information is put away in the database of the hunk specialist organization who has an entire access to such information in this way obstructing the security and protection of the clients.On the outrageous end; numerous cases have approached with respect to the information is lost. Where immense information might be lost unintentionally and for all time.

Packet sniffer- a network traffic analyst

Site pages and messages are not sent through the web unblemished as one report. Or maybe, the sending side (your PC) separates them into numerous little information bundles. These parcels are routed to an IP address at the less than desirable end which typically has a commitment to recognize receipt of each bundle it gets. With a specific end goal to do bolster that, every bundle contains the sending and accepting IP address and a considerable measure of other data.These bundles don’t get go from the sender to the collector all at once. Or maybe, every bundle navigates the web on the way to its goal by going through various movement control gadgets, for example, routers and switches. Each time a parcel goes through one of these movement control gadgets, it is defenseless to catch and investigation.

The routers’ part in this procedure is truly to course movement to its goal. The routers of the web have some thought of where the goal IP address is, or if nothing else they know where to send the parcel on the off chance that they’re not specifically associated with the goal. This system is called union since parcels from everywhere throughout the world join on their goal by ideals of directing. Consider an expansive goal, for example, Facebook. It has movement coming to it from the whole way across the globe. As those bundles get closer to the genuine Facebook servers, the dissimilar activity focalizes into an extremely bustling area of the web. The routers at those areas should be exceptionally strong and secure.

15640689 - businessman searching virus in a internet cable   

The major players ever in the history, associated with bundle sniffing for different reasons throughout the years are non other than two major governments viz- U.S & U.K.

The Snowden papers uncovered a monstrous reconnaissance device, named “PRISM“, that the United States Government has been conveying in mystery for quite a long time. Specifically, the National Security Agency (NSA) has been inactively gathering web movement bound for substantial web destinations, for example, Facebook, Google, and others. The NSA has substantial scale investigation apparatuses, for example, XKeyscore which enable it to look through the gathered bundles at a later date. 

On the other hand, United Kingdom has a similar passive collection surveillance system named “Tempora“. The UK is uniquely positioned in that most of its internet traffic arrives at the UK via undersea fiber optic cables. This provides a single point of entry and egress to and from the UK and the “Tempora” collection devices operate at these locations.

SOURCE: https://www.comparitech.com/blog/information-security/what-is-packet-sniffing/#gref

Law makers are law breakers!

In the line of flame for gathering individuals’ information for Aadhaar, the Narendra Modi government is File sharing and transfer vector conceptconfronting the anger of protection vigilantes for wrongfully sharing information from the “authority application of the Prime Minister of India” with an outsider organization in the US. The PM’S application guaranteed that the information that clients give on the application is entirely “private”, housed securely and not passed on to any other individual, a French vigilante programmer in a progression of tweets affirmed that the individual information including email IDs, photographs, sexual orientation and names of the clients of Modi’s versatile application were being sent to an outsider space without their assent. in any case, lamentably BJP turned over the amusement by saying the data was being used for examination using outsider organization, similar to Google Analytics. However, consideration should be given to the point that sharing individual data without consent of the customers “is unlawful”.

There are different laws that give equity to the casualty (virtual network users) whose information is being stolen or shared without his assent. So, these laws ought to be connected on the government also.

SOURCE:- https://economictimes.indiatimes.com/news/politics-and-nation/does-namo-app-share-its-data-with-third-party-illegally/articleshow/63469093.cms