Monthly Archives: June 2013

Cyber Surveillance in India

The public outcry on the US program “PRISM” under which US Government is said to be spying on Cyber Communication of individuals has naturally raised some attention on the Indian situation. Under ITA 2008 there are powers for the Government … Continue reading

Posted in Cyber Law | Leave a comment

IB Warnings on WeChat app

It is reported that Indian intelligence agencies have flagged a mobile application by name WeChat developed by a Chinese company “Tencent” as a “Threat”. After the revelation about the US intelligence program PRISM through which the US Intelligence agencies are … Continue reading

Posted in Cyber Law | Leave a comment

Use of Aadhar for Cardholder authentication

It is reported that RBI is considering use of Aadhar as a second factor authentication for Credit Card transactions. Report in TOI here The cost of upgrading the card swipe mechanism at the merchants with a biometric capable instrument is … Continue reading

Posted in Bank, RBI, Uncategorized | Leave a comment

Mule Recruitment Advertisement on job sites

Trusteer research team has reported that a mule recruitment advertisement has been hosted on a recruitment site careerbuilder dot com. The advertisement lures job seekers to marketandtarget dot com. More details availalable here. Naavi

Posted in Cyber Law | Leave a comment

Karnataka High Court delivers a favourable verdict for Axis Bank

P.S: Karnataka High Court has given a decision on 27th May 2013 in a writ petition filed by Axis Bank which has a huge implication on Cyber Crime victims in Karnataka and elsewhere in India. Hence in the general public … Continue reading

Posted in Bank, Cyber Crime, Cyber Law, ITA 2008, Uncategorized | Leave a comment

Bank Executive in Credit Card fraud

In a credit card cloning fraud in Hyderabad, an employee of HSBC call center has been arrested on charges of credit card cloning. The executive reportedly bought credit card data from a Nigerian and also used skimmers to collect more … Continue reading

Posted in Cyber Crime, ITA 2008 | Leave a comment