Look for any podcast host, guest or anyone
Showing episodes and shows of

Keycybr

Shows

CI&R WARRIORSCI&R WARRIORSCYBERESPIONAGECyber espionage, or cyber spying, is a type of cyberattack in which an unauthorized user attempts to access sensitive or classified data or intellectual property (IP) for economic gain, competitive advantage or political reasons.Featuring “keycybr” CI&R Intern “Gokeda Vijay Swamy”Get in touch with him - https://www.linkedin.com/in/vijay-gokeda-5440621b1/2021-07-2112 minCI&R WARRIORSCI&R WARRIORSTHEFT OF FINANCIAL OR CARD PAYMENT DATAPayment card fraud, also known as credit card fraud, is defined as the unauthorized use of a credit card, debit card, or similar payment tool. Cybercriminals often fraudulently utilize payment data to steal money or property from their victims.Featuring “keycybr” CI&R Intern “Rangeeth MR”Get in touch with him  - https://www.linkedin.com/in/rangeeth-mr-2319b0172/2021-07-2110 minCI&R WARRIORSCI&R WARRIORSHOW CAN WOMEN PREVENT CYBER CRIMEA few important steps that women should follow to ensure their safety while enjoying an active social life online: Say no to stranger's :It is very important to know the person personally before knowing him/her virtually. If you don't say yes to strangers in real life why allow them access to your social profiles.Featuring “keycybr” CI&R Intern “Raj Koladiya”Get in touch with him - https://www.linkedin.com/in/raj-koladiya-23320/2021-07-2112 minCI&R WARRIORSCI&R WARRIORSBODY SHAMING“We are our own worst critic” is often a phrase we use to describe when we, as individuals, are too hard on ourselves. For most people, it is a natural tendency to always be better, faster and stronger however this craze for becoming better can result in severe mental health consequences, especially when it comes time to our physical appearances.Featuring “keycybr” CI&R Intern “Muvva Divya sri”Get in touch with her - https://www.linkedin.com/in/divya-muvva-171339203/2021-07-2112 minCI&R WARRIORSCI&R WARRIORSHOW DO HACKERS HACK SERVERSWeb content is generated in real time by a software application running at server-side. So hackers attack on the web server to steal credential information, passwords, and business information by using DoS (DDos) attacks, SYN flood, ping flood, port scan, sniffing attacks, and social engineering attacks.Featuring “keycybr” CI&R Intern “Saranya N”Get in touch with her - https://www.linkedin.com/in/saranya-nadanasigamani-728098128/2021-07-2110 minCI&R WARRIORSCI&R WARRIORSISSUES IN DIGITAL EVIDENCESome common challenges are lack of availability of proper guidelines for collection acquisition and presentation of electronic evidence, rapid change in technology, big data, use of anti-forensic techniques by criminals, use of free online tools for investigation, etc.Featuring “keycybr” CI&R Intern “Sahil Panicker”Get in touch with him - https://www.linkedin.com/in/sahil-panicker-7411012042021-07-2013 minCI&R WARRIORSCI&R WARRIORSWHY MHA DIRECTS ALL POLICE STATION NOT TO REGISTER CASES UNDER SECTION 66A OF IT ACTThe Central Government today directed all states and Union Territories to ask all police stations under their jurisdiction not to register cases under the repealed Section 66A of the Information Technology Act, 2000.Featuring “keycybr” CI&R Intern “Tanvi Thakare”Get in touch with her - https://www.linkedin.com/in/tanvi-thakre-a19533202/2021-07-2010 minCI&R WARRIORSCI&R WARRIORSPROCESS OF DIGITAL EVIDENCEDigital forensics entails the following steps: Identification -> Preservation -> Analysis -> Documentation -> PresentationFeaturing “keycybr” CI&R Intern “Shreya”Get in touch with her - https://www.linkedin.com/in/shreya-das-8669071aa/2021-07-2012 minCI&R WARRIORSCI&R WARRIORSCLOUD VUNLERABILITYSystem Vulnerabilities. System vulnerabilities are another of the more common cloud security vulnerabilities and they can occur for many reasons. The integration of an insecure third-party application could create system risks or they could arise due to poorly configured security tools within your cloud systems.Featuring “keycybr” CI&R Intern “Mayank Raj"Get in touch with him – https://www.linkedin.com/in/mayank-raj-8a87371b42021-07-2018 minCI&R WARRIORSCI&R WARRIORSWHAT CAUSES CYBER CRIMECybercriminals always opt for an easy way to make big money. They target rich people or rich organizations like banks, casinos, and financial firms where a huge amount of money flows daily and hack sensitive information. Hence, that increases the number of cyber-crimes across the globe.Featuring “keycybr” CI&R Intern “Ajit Choure”Get in touch with him - https://www.linkedin.com/in/ajit-choure-6456a4242021-07-2010 minCI&R WARRIORSCI&R WARRIORSWHAT ARE THE TYPES OF EVIDENCESWhile all evidence is also information, not all information is evidence. Information, in terms of knowledge, provides facts about a topic. These facts vary in terms of relevance, detail, and accuracy. Evidence is often used as a basis for change in healthcare. Featuring “keycybr” CI&R Intern “Rohit Kumar” Get in touch with him - https://www.linkedin.com/in/rohit-kumar-vapt/2021-07-2005 minCI&R WARRIORSCI&R WARRIORSSOCIAL MEDIA VS SOCIAL JUSTICEHow Social Media Can Promote Social Justice. The use of social media to uplift voices and stories, create awareness, and build and strengthen relationships creates a space for organizations, activists, and citizens to demand justice.Featuring “keycybr” CI&R Intern “Rohan Chauhan”Get in touch with him - https://www.linkedin.com/in/rohanchauhan262021-07-2006 minCI&R WARRIORSCI&R WARRIORSDATA BREACHESA data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak, information leakage and also data spill.Featuring “keycybr” CI&R Intern “Devarsh Parmar”Get in touch with him – https://www.linkedin.com/in/devarsh-parmar-992b5b169/2021-07-2005 minCI&R WARRIORSCI&R WARRIORSCYBER GROOMINGCyber grooming takes place when someone (often an adult) befriends a child online and builds an emotional connection with a future intention of sexual abuse, sexual exploitation or trafficking.Featuring “keycybr” CI&R Intern “Aakash Mudigonda"Get in touch with him – https://www.linkedin.com/in/aakash-mudigonda-2839061ab/2021-07-2008 minCI&R WARRIORSCI&R WARRIORSHOW TO REPORT CYBER CRIME IN INDIAIf you want to report something other than Cybercrime cases or in case of an emergency please contact your local police by dialing 100. Complaints reported on this portal are dealt by respective police authorities of States/ UTs based on the information in the complaints provided by the complainants.Featuring “keycybr” CI&R Intern “Chaitanya Yedilla”Get in touch with him - https://www.linkedin.com/in/chaitanya-leela-prasanth-yedilla-0561741b42021-07-1905 minCI&R WARRIORSCI&R WARRIORSDATABASE FORENSICSDatabase forensics is a branch of digital forensic science relating to the forensic study of databases and their related metadata. The discipline is similar to computer forensics, following the normal forensic process and applying investigative techniques to database contents and metadata.Featuring “keycybr” CI&R Intern “Boya Vamshi Krishna”Get in touch with him - https://www.linkedin.com/in/bittu-vamshi-29bb591a52021-07-1911 minCI&R WARRIORSCI&R WARRIORSTARGETED RANSOMWARETargeted ransomware attacks involve significantly more sophistication (network compromise, reconnaissance and persistence, or lateral movement) and a much larger payout. From 2019 to 2020, the number of users encountering targeted ransomware increased by around 767 per cent.Featuring “keycybr” CI&R Intern “Pappu Kuladeep”Get in touch with him – https://www.linkedin.com/in/pappu-kuladeep/2021-07-1915 minCI&R WARRIORSCI&R WARRIORSPASSWORD & AUTHENTICATIONSimple password authentication offers an easy way of authenticating users. In password authentication, the user must supply a password for each server, and the administrator must keep track of the name and password for each user, typically on separate servers.Featuring “keycybr” CI&R Intern “Pradeep Kvssk”Get in touch with him – https://www.linkedin.com/in/pradeepkvssk2021-07-1914 minCI&R WARRIORSCI&R WARRIORSHOW DO HACKERS ATTACKWhile there is a large community of hackers on the Internet, only a relatively small number of hackers actually program code. Many hackers seek out and download code written by other people. Another way to hack passwords is to use a dictionary attack, a program that inserts common words into password fields.Featuring “keycybr” CI&R Intern “Manas Patil”Get in touch with him – https://www.linkedin.com/in/manas-patil-68a5641a52021-07-1815 minCI&R WARRIORSCI&R WARRIORSWHAT ARE THE CHALLENGES FACED BY DIGITAL FORENSICSSome common challenges are lack of availability of proper guidelines for collection acquisition and presentation of electronic evidence, rapid change in technology, big data, use of anti-forensic techniques by criminals, use of free online tools for investigation, etc. Featuring “keycybr” CI&R Intern “Nidhi Chauhan” Get in touch with her – https://www.linkedin.com/in/nidhi-chauhan-a72511216/2021-07-1806 minCI&R WARRIORSCI&R WARRIORSWHAT ARE THE TYPES OF CYBER SECURITY ATTACKSIn computers and computer networks, an attack is any attempt to expose, alter, disable, destroy, steal or gain information through unauthorized access to or make unauthorized use of an asset.Featuring “keycybr” CI&R Intern “Anurag”Get in touch with him – https://www.linkedin.com/in/anurag-singh-7798072042021-07-1812 minCI&R WARRIORSCI&R WARRIORSSOCIAL MEDIA CHALLENGES ARE DANGEROUS OR NOTFor today’s digital generation, social media allows your children to easily connect to their friends and family. Social media challenges have become a popular way for children, especially teenagers, to engage with their peers. Some challenges promote causes or unity, like the ALS Ice Bucket Challenge or Mannequin Challenge. Unfortunately, dangerous social media challenges have developed, leading children to harm themselves or others due to negative influences or for “likes” and attention. As parents, you should be aware of the top dangerous social media challenges in order to best protect your children.Featuring “keycybr” CI&R Intern “De...2021-07-1809 minCI&R WARRIORSCI&R WARRIORSUPI QR CODE SCAN FRAUDThat's when the fraudsters pose as buyers and share the QR code to pay an advance or token amount. They then create a QR code and share it with the intended victim through WhatsApp or email. They will ask the victim to scan the QR code sent by them so that they will receive the money directly into their bank accounts.Featuring “keycybr” CI&R Intern “Akbar Farooq Khan”Get in touch with him – https://www.linkedin.com/in/akbar-khan%F0%9F%91%A8%E2%80%8D%F0%9F%92%BB-88a329159/2021-07-1714 minCI&R WARRIORSCI&R WARRIORSAUTOMATIVE HACKINGThe most common way hackers gain access to cars today is through the computerized key fob — often in order to steal the vehicle (or what is inside of it). This is typically done by spoofing or cloning the signal that a car and key use to communicate with each other.Featuring “keycybr” CI&R Intern “Vinay K”Get in touch with him – https://www.linkedin.com/in/vinayvinnu016/2021-07-1710 minCI&R WARRIORSCI&R WARRIORSSOCIAL MEDIAS IMPACT ON RELATIONSHIPSocial Media Impacts on Relationships. Millions of people use social media platforms daily, and those apps have become a ubiquitous part of everyday life. Researchers have found that increased social media usage could lead to more relationship problems, infidelity, and even divorce.Featuring “keycybr” CI&R Intern “Krishna Punwar”Get in touch with her - https://www.linkedin.com/in/krishna-punwar-4854ba1112021-07-1714 minCI&R WARRIORSCI&R WARRIORSCYBER SECURITY IS THE EVERYONE'S RESPONSIBILTY OR NOTAnd it remains true that many of the security measures used to protect data are IT-based. Firewalls, permissions, encryption – all are technical solutions to the problem of preventing data loss, theft, and leakage.Featuring “keycybr” CI&R Intern “Mohd Uvaish Siddiqui”Get in touch with him – https://www.linkedin.com/in/usvr2021-07-1711 minCI&R WARRIORSCI&R WARRIORSWHO USES DIGITAL FORENSICS?Digital forensics is what professionals use to investigate cyber crime. Forensic specialists analyze and report on data stored inside computer networks to: Investigate employee violations. Investigate harassment claims.Featuring “keycybr” CI&R Intern “Myakam Sandeep”Get in touch with him – https://www.linkedin.com/in/myakam-sandeep-b7237b1752021-07-1711 minCI&R WARRIORSCI&R WARRIORSKBC LOTTERY FRAUDIn such cyber frauds, the fraudsters send WhatsApp messages to unsuspecting victims from unknown numbers (most of them starting with +92, the ISD Code of Pakistan) claiming that their mobile number has won a lottery jointly organized by Kaun Banega Crorepati and Reliance Jio worth Rs. 25 lakhs and in order to claim that lottery they need to contact some person whose number is provided in the same WhatsApp message.Featuring “keycybr” CI&R Intern “Arnesha Dey”Get in touch with her - https://www.linkedin.com/in/arnesha-dey-5099571b52021-07-1709 minCI&R WARRIORSCI&R WARRIORSSEXTINGSexting (or "sex texting") is sending or getting sexually explicit or suggestive images, messages, or video on a smartphone or through the Internet. Sexting includes sending: nude or nearly nude photos or selfies. videos that show nudity, sex acts, or simulated sex.Featuring “keycybr” CI&R Intern “Akshay Navarkar”Get in touch with him – https://www.linkedin.com/in/akshay-navarkar-23a4831282021-07-1710 minCI&R WARRIORSCI&R WARRIORSWHAT IS DIGITAL FORENSICS LIFE CYCLE?There are many type of Cyber crimes taking place in the digital world, it is important for the investigator to collect, analyze, store and present the evidence in such a manner that court will believe in such digital evidences and give appropriate punishment to the Cyber criminal.Featuring “keycybr” CI&R Intern “Purushotham Sharma R”Get in touch with him – https://www.linkedin.com/in/purushotham-sharma-r/2021-07-1611 minCI&R WARRIORSCI&R WARRIORSWHAT SHOULD A VICTIM OF SEXTORTION DO?First of all, you should avoid messages from unknown people and fake profiles. If you are talking with any of the above, strictly avoid sharing personal information. Secondly, do not allow mobile apps and computer software to access the webcam, front camera, and microphone and access the gallery.Featuring “keycybr” CI&R Intern “Brijesh Joshi”Get in touch with him – https://www.linkedin.com/in/itbrijesh18/2021-07-1606 minCI&R WARRIORSCI&R WARRIORSCYBER CRIMES AGAINST CHILDRENThe global reach and anonymity of the Internet have greatly facilitated the distribution of child sexual abuse material, and access to it. Offenders can now produce, exchange and even direct live video of children – even babies - being abused. They can also come into direct contact with children via social networks and chat functions in games or apps.Featuring “keycybr” CI&R Intern “Vikram Kale”Get in touch with him – https://www.linkedin.com/in/vikram-kale-0913981a42021-07-1611 minCI&R WARRIORSCI&R WARRIORSFACEBOOK SEXTORTIONMany people use webcams for flirting and cybersex - but sometimes people you meet online aren't who they say they are.Criminals might befriend victims online by using a fake identity and then persuade them to perform sexual acts in front of their webcam, often by using an attractive woman to entice the victim to participate. These women may have been coerced into these actions using financial incentives or threats.Featuring “keycybr” CI&R Intern “Kshitij Pawar”Get in touch with him – https://www.linkedin.com/in/kshitij-pawar04/2021-07-1613 minCI&R WARRIORSCI&R WARRIORSVICTIM BLAMINGVictim blaming occurs when the victim of a crime or any wrongful act is held entirely or partially at fault for the harm that befell them. The study of victimology seeks to mitigate the prejudice against victims, and the perception that victims are in any way responsible for the actions of offenders.Featuring “keycybr” CI&R Intern “Parth Chauhan”. He is pursuing Masters in Forensic Science with specialization in Digital Forensic & Cyber Security from LNJN National Institute of Criminology & Forensic Science (LNJN NICFS), MHA, Delhi. Also he is working as a Managing Director in Indian Forensic Student Council...2021-07-1313 minCI&R WARRIORSCI&R WARRIORSSECTION 66F. PUNISHMENT FOR CYBER TERRORISMSECTION 66F. PUNISHMENT FOR CYBER TERRORISMWhoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life.Featuring "keycybr" CI&R Intern "Anchal Rajkumar Mishra".Get in touch with her - https://www.linkedin.com/in/anchal-m-265451199/2021-01-0905 minCI&R WARRIORSCI&R WARRIORSSECTION 66A. PUNISHMENT FOR SENDING OFFENSIVE MESSAGES THROUGH COMMUNICATION SERVICE, ETCSECTION 66A. PUNISHMENT FOR SENDING OFFENSIVE MESSAGES THROUGH COMMUNICATION SERVICE, ETCAny electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages, shall be punishable with imprisonment for a term which may extend to three years and with fine.Featuring "keycybr" CI&R Intern "Puneeth Kumar".Get in touch with him - https://www.linkedin.com/in/puneeth-kumarnr/2021-01-0707 minCI&R WARRIORSCI&R WARRIORSEMAIL SPOOFINGEMAIL SPOOFINGEmail spoofing is the creation of email messages with a forged sender address. The core email protocols do not have any mechanism for authentication, making it common for spam and phishing emails to use such spoofing to mislead or even prank the recipient about the origin of the messageFeaturing "keycybr" CI&R Intern "Mohak Laddha".Get in touch with him -  https://www.linkedin.com/in/mohak-laddha-73395a120/2021-01-0707 minCI&R WARRIORSCI&R WARRIORSUNDERSTANDING COMPUTER SOFTWAREUNDERSTANDING COMPUTER SOFTWARESoftware is a program that enables a computer to perform a specific task, as opposed to the physical components of the system (hardware). Computer software has to be "loaded" into the computer's storage (such as a hard drive, memory, or RAM). Once the software is loaded, the computer is able to execute the software.Featuring "keycybr" CI&R Intern "Abhijit Kedare".Get in touch with him - https://www.linkedin.com/in/abhijit-kedare-a7758320/2021-01-0619 minCI&R WARRIORSCI&R WARRIORSINVESTIGATING DIGITAL SIGNATURE CRIMEINVESTIGATING DIGITAL SIGNATURE CRIMEPrivate key is the key which creates a digital signature to an electronic record ... sorts of digital media are recovered and investigated by means of acquiring.Featuring "keycybr" CI&R Intern "Yaswanth Kumar Divvela".Get in touch with him - https://www.linkedin.com/in/yaswanth-kumar-divvela-505899186/2021-01-0404 minCI&R WARRIORSCI&R WARRIORSANALYSIS OF EMAIL SENT FROM THUNDERBIRD CLIENTANALYSIS OF EMAIL SENT FROM THUNDERBIRD CLIENTThunderbird email header analysis can play a major role in understanding the route of email message and identify the email spoofing and spamming. This can be traced by checking the sender and receiver information and detecting the manipulations made in the header. Thus, any kind of manipulation or discrepancy in email message header is a clear indication of discrepancy email. Therefore, many forensics investigation teams also consider email header forensics to be the foremost artifact for investigating cyber crimes.Featuring "keycybr" CI&R Intern "Dhaval Advani"....2021-01-0404 minCI&R WARRIORSCI&R WARRIORSIP TRACINGIP TRACINGIP tracking is the technology behind our website that will give you an easy way to lookup, find, track and trace any publicly accessible IP location in the world. "What is My IP" and "IP Lookup" are frequently searched terms on the internet.Featuring "keycybr" CI&R Intern "Karan Johar".Get in touch with him - https://www.linkedin.com/in/karan-johar-a63677160/2021-01-0415 minCI&R WARRIORSCI&R WARRIORSANALYSIS OF REDIFMAIL HEADERANALYSIS OF REDIFMAIL HEADEREmail Headers hold a lot of information. Much of this information is never displayed to the user. The email reader only sees a select few pieces of information like the subject, date, and the sender's email and info. The surprising part is that the information that is actually displayed to a user can be easily forged!Featuring "keycybr" CI&R Intern "Ankit Dobhal".Get in touch with him - https://www.linkedin.com/in/ankit-dobhal-aa237015b/2021-01-0406 minCI&R WARRIORSCI&R WARRIORSSECTION 66B. PUNISHMENT FOR DISHONESTLY RECEIVING STOLEN COMPUTER RESOURCE OR COMMUNICATION DEVICESECTION 66B. PUNISHMENT FOR DISHONESTLY RECEIVING STOLEN COMPUTER RESOURCE OR COMMUNICATION DEVICEWhoever dishonestly received or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both.Featuring "keycybr" CI&R Intern "Arbind Garai".Get in touch with him - https://www.linkedin.com/in/arbind-garai-3822aa143/2021-01-0406 minCI&R WARRIORSCI&R WARRIORSEMAIL BOMBINGEMAIL BOMBINGAn email bombing is an attack on your inbox that involves sending massive amounts of messages to your address.Featuring "keycybr" CI&R Intern "Rupali Sharma".Get in touch with her - https://www.linkedin.com/in/rupali-sharma-7bb36818a/2021-01-0405 minCI&R WARRIORSCI&R WARRIORSSECTION 66. COMPUTER RELATED OFFENCESSECTION 66. COMPUTER RELATED OFFENCESIf any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.Featuring "keycybr" CI&R Intern "Likhita Deshpande".Get in touch with her -https://www.linkedin.com/in/likhitha-deshpande-7836631b4/2021-01-0404 minCI&R WARRIORSCI&R WARRIORSSECTION 71. PENALTY FOR MISREPRESENTATIONSECTION 71. PENALTY FOR MISREPRESENTATIONWhoever makes any misrepresentation to, or suppresses any material fact from the Controller or the Certifying Authority for obtaining any licence or 89 [Electronic Signature] Certificate, as the case may be, shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.Featuring "keycybr" CI&R Intern "Sahajpreet Singh".Get in touch with him - https://www.linkedin.com/in/sahajpreet-singh-319ab5179/2021-01-0408 minCI&R WARRIORSCI&R WARRIORSGUIDELINES FOR USB DRIVE EXAMINATIONGUIDELINES FOR USB DRIVE EXAMINATIONFlash memory is a solid-state chip that maintains stored data without any external power source.  Inside the flash chip, data is stored in cells protected by floating gates. Tunneling electrons change the gate's electronic charge in "a flash" (hence the name), clearing the cell of its contents so it can be rewritten.Featuring "keycybr" CI&R Intern "Vivek Mehta".Get in touch with him - https://www.linkedin.com/in/vivek-mehta-0aa683143/2021-01-0409 minCI&R WARRIORSCI&R WARRIORSSECTION 67C. PRESERVATION AND RETENTION OF INFORMATION BY INTERMEDIARIESSECTION 67C. PRESERVATION AND RETENTION OF INFORMATION BY INTERMEDIARIESSection 67C in The Information Technology Act, 2000. (1) Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.Featuring "keycybr" CI&R Intern "Omkar Jadhav".Get in touch with him - https://www.linkedin.com/in/omkar-jadhav-8023981a4/ 2021-01-0301 minCI&R WARRIORSCI&R WARRIORSCOMPUTER SOFTWARE & COPYRIGHT LAWCOMPUTER SOFTWARE & COPYRIGHT LAWComputer software or programs are instructions that are executed by a computer. Software is protected under copyright law and the inventions related to software are protected under patent law.Featuring "keycybr" CI&R Intern "Daaddreya D".Get in touch with him - https://www.linkedin.com/in/daadreyaa-dhanashankar-67a9191b92021-01-0308 minCI&R WARRIORSCI&R WARRIORSSECTION 67. PUNISHMENT FOR PUBLISHING OR TRANSMITTING OBSCENE MATERIAL IN ELECTRONIC FORMSECTION 67. PUNISHMENT FOR PUBLISHING OR TRANSMITTING OBSCENE MATERIAL IN ELECTRONIC FORMWhoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakhFeaturing "keycybr" CI&R Intern "Shubham Agarwal Jain".Get in touch with him - https://www.linkedin.com/in/shubhamaj/2021-01-0302 minCI&R WARRIORSCI&R WARRIORSSECTION 66B. PUNISHMENT FOR DISHONESTLY RECEIVING STOLEN COMPUTER RESOURCE OR COMMUNICATION DEVICESECTION 66B. PUNISHMENT FOR DISHONESTLY RECEIVING STOLEN COMPUTER RESOURCE OR COMMUNICATION DEVICEWhoever dishonestly received or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with fine.Featuring "keycybr" CI&R Intern "Shyamsundar Rao".Get in touch with him - https://www.linkedin.com/in/shyamsunder-rao-11a1021b4/2021-01-0302 minCI&R WARRIORSCI&R WARRIORSCHAIN OF CUSTODYCHAIN OF CUSTODYIn criminal and civil law, the term “chain of custody” refers to the order in which items of evidence have been handled during the investigation of a case. Proving that an item has been properly handled through an unbroken chain of custody is required for it to be legally considered as evidence in court.Featuring "keycybr" CI&R Intern "Raja Ragavan".Get in touch with him - https://www.linkedin.com/in/raja-ragavan-21647a1a72021-01-0303 minCI&R WARRIORSCI&R WARRIORSCYBER TERRORISMCYBER TERRORISMCyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.Featuring "keycybr" CI&R Intern "Rohith Bolishetty".Get in touch with him - https://www.linkedin.com/in/bolishetty-rohith-2001/2021-01-0311 minCI&R WARRIORSCI&R WARRIORSDATA DIDDLINGDATA DIDDLINGData diddling is a type of cybercrime in which data is altered as it is entered into a computer system, most often by a data entry clerk or a computer virus. Computerized processing of the altered data results in a fraudulent benefit.Featuring "keycybr" CI&R Intern "Riyaz Mohammad".Get in touch with him - https://www.linkedin.com/in/riyaz-mohammad-b333911b1/2021-01-0203 minCI&R WARRIORSCI&R WARRIORSSALAMI ATTACKSSALAMI ATTACKSA salami attack is when small attacks add up to one major attack that can go undetected due to the nature of this type of cyber crime. It also known as salami slicing.Featuring "keycybr" CI&R Intern "Shanmukha Priya Jetti".Get in touch with her - https://www.linkedin.com/in/j-shanmukha-priya-0513581a1/2021-01-0204 minCI&R WARRIORSCI&R WARRIORSSECTION 65. TAMPERING WITH COMPUTER SOURCE DOCUMENTSSECTION 65. TAMPERING WITH COMPUTER SOURCE DOCUMENTSSection 65 of this Act provides that Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer Programme, computer system or computer network, when the computer source code is requiredFeaturing "keycybr" CI&R Intern "Ansh Goyal".Get in touch with him - https://www.linkedin.com/in/ansh-goyal-251182191/2021-01-0203 minCI&R WARRIORSCI&R WARRIORSCONFISCATION & SEIZURECONFISCATION & SEIZUREIt is issued when it is suspected that the goods are liable to confiscation. Seizure is taking over of actual possession of the goods by the department. Seizure can be made only after inquiry/investigation that the goods are liable to confiscation.Featuring "keycybr" CI&R Intern "Aakanti HarshaVardhan".Get in touch with him - https://www.linkedin.com/in/harsha-aakanti/2021-01-0205 minCI&R WARRIORSCI&R WARRIORSUSE OF ENCRYPTION BY TERRORISTSUSE OF ENCRYPTION BY TERRORISTSThe purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. These algorithms provide confidentiality and drive key security initiatives including authentication, integrity, and non-repudiation.Featuring "keycybr" CI&R Intern "Abhishek Kumar Sah".Get in touch with him - https://www.linkedin.com/in/abhishek-kumar-sah-328618105/2021-01-0221 minCI&R WARRIORSCI&R WARRIORSONLINE EMAIL HEADER ANALYSIS TOOLSONLINE EMAIL HEADER ANALYSIS TOOLSThis tool will make email headers human readable by parsing them according to RFC 822. Email headers are present on every email you receive via the Internet.Featuring "keycybr" CI&R Intern "Ajay M".Get in touch with him - https://www.linkedin.com/in/ajay-murali-899b2817b/2021-01-0206 minCI&R WARRIORSCI&R WARRIORSSALE OF ILLEGAL ARTICLESSALE OF ILLEGAL ARTICLESAlthough this can be termed as a victimless crime in terms of financial loss etc, the articles being sold are termed illegal for a reason. Narcotics or drugs cause physical and mental damage beyond recovery.Featuring "keycybr" CI&R Intern "Hrishikesh Punju Nikam".Get in touch with him - https://www.linkedin.com/in/rishi-nikam-0b30331592021-01-0211 minCI&R WARRIORSCI&R WARRIORSDENIAL OF SERVICE ATTACKSDENIAL OF SERVICE ATTACKSA Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.Featuring "keycybr" CI&R Intern "Anurag Kumar Rawat".Get in touch with him - https://www.linkedin.com/in/pavan-adavi-b43481189/2021-01-0211 minCI&R WARRIORSCI&R WARRIORSFORGERYFORGERYForgery is a white-collar crime that generally refers to the false making or material alteration of a legal instrument with the specific intent to defraud anyone.Featuring "keycybr" CI&R Intern "Anurag Kumar Rawat".Get in touch with him - https://www.linkedin.com/in/anurag-kumar-8413a0197/2021-01-0202 minCI&R WARRIORSCI&R WARRIORSSECTION 66D. PUNISHMENT FOR CHEATING BY PERSONATION BY USING COMPUTER RESOURCESECTION 66D. PUNISHMENT FOR CHEATING BY PERSONATION BY USING COMPUTER RESOURCEWhoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.Featuring "keycybr" CI&R Intern "Jayesh Auti".Get in touch with him - https://www.linkedin.com/in/jayesh-auti-365422192/2021-01-0203 minCI&R WARRIORSCI&R WARRIORSINTERNET TIME THEFTINTERNET TIME THEFTIt refers to the theft in a manner where the unauthorized person uses internet hours paid by another person. The authorized person gets access to another person's ISP user ID and password, either by hacking or by illegal means without that person's knowledge.Featuring "keycybr" CI&R Intern "Sabbithi Yahwanth".Get in touch with him - https://www.linkedin.com/in/s-yahwanth-780362191/2021-01-0211 minCI&R WARRIORSCI&R WARRIORSPASSWORD BREAKINGPASSWORD BREAKINGIn cryptanalysis and computer security, password breaking is the process of recovering passwords from data that has been stored in or transmitted by a computer system in scrambled form.Featuring "keycybr" CI&R Intern "Hymavathi M".Get in touch with her - https://www.linkedin.com/in/hymavathi-m-202417177/2021-01-0203 minCI&R WARRIORSCI&R WARRIORSRECOVERING DELETED EVIDENCERECOVERING DELETED EVIDENCEIf the deleted files have no trace in the recycle bin like in case of the “Ctrl+Delete” command, then, in that case, you can use commercial recovery tools to recover the deleted evidence. One such example commercial tool is DiskInternals Partition Recovery.Featuring "keycybr" CI&R Intern "Teja Kumar".Get in touch with him - https://www.linkedin.com/in/teja-kumar-788b4718b/2021-01-0211 minCI&R WARRIORSCI&R WARRIORSANALYSIS OF GMAIL HEADERANALYSIS OF GMAIL HEADEREmail headers contain tracking information for an individual email, detailing the path a message took as it went through various mail servers. The headers contain time-stamps, IP addresses and sender/recipient information.Featuring "keycybr" CI&R Intern "Prasanth Kumar Nagothi".Get in touch with him - https://www.linkedin.com/in/prasanthkumarnagothi/2021-01-0114 minCI&R WARRIORSCI&R WARRIORSTROJANS & KEYLOGGERSTROJANS & KEYLOGGERSA keylogger Trojan virus is just as it sounds: a program that logs keystrokes. The danger of one infecting your computer is that it tracks every single keystroke you enter through your keyboard, including passwords and usernames.Featuring "keycybr" CI&R Intern "Kunal Das".Get in touch with him - https://www.linkedin.com/in/kunal-das-5a48651a6/2021-01-0106 minCI&R WARRIORSCI&R WARRIORSVIRUS-WORMS ATTACKSVIRUS-WORMS ATTACKSViruses and worms are malicious programs that self-replicate on computers or via computer networks without the user being aware; each subsequent copy of such malicious programs is also able to self-replicate.Featuring "keycybr" CI&R Intern "E M Vamsi Krishna".Get in touch with him - https://www.linkedin.com/in/vamsi-krishna-b55125155/2021-01-0109 minCI&R WARRIORSCI&R WARRIORSCYBER STALKINGCYBER STALKINGCyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel.Featuring "keycybr" CI&R Intern "Sakshi Shrivastava".Get in touch with her - https://www.linkedin.com/in/sakshi-shrivastava-8a4b55180/2021-01-0106 minCI&R WARRIORSCI&R WARRIORSWEB SERVER LOGSWEB SERVER LOGSA server log is a log file (or several files) automatically created and maintained by a server consisting of a list of activities it performed. A typical example is a web server log which maintains a history of page requests. However, server logs typically do not collect user-specific information.Featuring "keycybr" CI&R Intern "Lahari Nagumothu".Get in touch with her - https://www.linkedin.com/in/lahari-nagumothu-0554a01b6/2021-01-0112 minCI&R WARRIORSCI&R WARRIORSEMAIL FRAUDSEMAIL FRAUDSEmail fraud (or email scam) is intentional deception for either personal gain or to damage another individual by means of email. Almost as soon as email became widely used, it began to be used as a means to defraud people. Email fraud can take the form of a "con game", or scam.Featuring "keycybr" CI&R Intern "Konasagaram Chippagi Dhanvanthri".Get in touch with him - https://www.linkedin.com/in/dhanvanthri-kc-a150051612021-01-0114 minCI&R WARRIORSCI&R WARRIORSCYBER PORNOGRAPHYCYBER PORNOGRAPHYCyberpornography is the act of using cyberspace to create, display, distribute, import, or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults. Cyberpornography is a criminal offense, classified as causing harm to persons.Featuring "keycybr" CI&R Intern "Abuthahir".Get in touch with him - https://www.linkedin.com/in/abuthahir-a-5815a01a7/2021-01-0108 minCI&R WARRIORSCI&R WARRIORSGUIDELINES FOR EVIDENCE COLLECTIONGUIDELINES FOR EVIDENCE COLLECTIONThe Evidence Collection Unit (ECU) is charged with the processing of crime scenes and for providing expert court testimony. The ECU photographs, collects, and examines evidence discovered, and collected at crime scenes. ECU Officers are trained to photograph, prepare, and collect footprint, tool, and tire impressions.Featuring "keycybr" CI&R Intern "Aditya Chauhan".Get in touch with him - https://www.linkedin.com/in/aditya-chauhan17/2020-12-3120 minCI&R WARRIORSCI&R WARRIORSINTELLECTUAL PROPERTY CRIMESINTELLECTUAL PROPERTY CRIMESIntellectual property crime is committed when someone manufactures, sells or distributes counterfeit or pirated goods, such as such as patents, trademarks, industrial designs or literary and artistic works, for commercial gain.Featuring "keycybr" CI&R Intern "Rehan Rakhangi".Get in touch with him - https://www.linkedin.com/in/rehan-rakhangi-b52451141/2020-12-3110 minCI&R WARRIORSCI&R WARRIORSWEB JACKINGWEB JACKINGWeb jacking is simply when someone clones your website, and tricks you to believe the cloned site is yours. The malicious link is placed somewhere on your webpage waiting for a click. Immediately, you click on it; a malicious web server replaces it. And that means you have lost complete access to your website.Featuring "keycybr" CI&R Intern "Akash Palla".Get in touch with him - https://www.linkedin.com/in/akash-palla-54887a193/2020-12-3104 minCI&R WARRIORSCI&R WARRIORSWEB DEFACEMENTWEB DEFACEMENTWeb defacement is an attack in which bad actors delete or modify the content on the site, replacing it with their own messages.Featuring "keycybr" CI&R Intern "Hardik Rathod".Get in touch with him - https://www.linkedin.com/in/hardik-rathod1491/2020-12-3112 minCI&R WARRIORSCI&R WARRIORSCYBER DEFAMATIONCYBER DEFAMATIONThe tort of cyber defamation is an act of intentionally insulting, defaming or offending another individual or a party through a virtual medium. It can be both written and oral. Today Internet has given us an opportunity to share our opinions globally.Featuring "keycybr" CI&R Intern "Devarsh Parmar".Get in touch with him - https://www.linkedin.com/in/devarsh-parmar-992b5b169/2020-12-3104 minCI&R WARRIORSCI&R WARRIORSFINANCIAL CRIMESFINANCIAL CRIMESFinancial crime is crime committed against property, involving the unlawful conversion of the ownership of property to one's own personal use and benefit.Featuring "keycybr" CI&R Intern "Vanshika Gupta".Get in touch with her - https://www.linkedin.com/in/vanshika2900/2020-12-3109 minCI&R WARRIORSCI&R WARRIORSTRACKING MAIL ACCOUNTSTRACKING MAIL ACCOUNTSEmail tracking is the process of tracking sent emails and using that data to inform business decisions. Most email tracking tools capture data on open rates, times, and locations, as well as click-throughs on links and attachments.Featuring "keycybr" CI&R Intern "Kundurthi Siddhu Sai Krishna".Get in touch with him - https://www.linkedin.com/in/siddhukundurthi2020-12-3007 minCI&R WARRIORSCI&R WARRIORSGUIDELINES FOR EVIDENCE ARCHIVALGUIDELINES FOR EVIDENCE ARCHIVALArchival evidence refers to the original source materials, which historians regard as primary sources. Everything that they and predecessors write about the past is described as a secondary source.Featuring "keycybr" CI&R Intern "Kilaru Nikhil Chowdary".Get in touch with him - https://www.linkedin.com/in/nikhil-chowdary-kilaru-5762661aa/2020-12-3009 minCI&R WARRIORSCI&R WARRIORSUSING GOOGLE AS A HACKING TOOLSUSING GOOGLE AS A HACKING TOOLSGoogle Dorking is a search technique that enables hackers to gain access to information that corporations and individuals did not intend to make publicly available. Using this technique, hackers are able to identify vulnerable systems and can recover usernames, passwords, email addresses, and even credit card details.Featuring "keycybr" CI&R Intern "Shailendra Verma".Get in touch with him - https://www.linkedin.com/in/shailendra-verma-15a6081b0/2020-12-3005 minCI&R WARRIORSCI&R WARRIORSTYPES OF TROJANSTYPES OF TROJANSA Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.Featuring "keycybr" CI&R Intern "Sopan Abdal".Get in touch with him - https://www.linkedin.com/in/sopan911/2020-12-3005 minCI&R WARRIORSCI&R WARRIORSPORT SCANNINGPORT SCANNINGPort scanning is a method of determining which ports on a network are open and could be receiving or sending data. It is also a process for sending packets to specific ports on a host and analyzing responses to identify vulnerabilities.Featuring "keycybr" CI&R Intern "Hemanth Reddy".Get in touch with him - https://www.linkedin.com/in/hemanth-reddy-51b357191/2020-12-3007 minCI&R WARRIORSCI&R WARRIORSPACKET SNIFFINGPACKET SNIFFINGPacket sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network, regardless of how the packet is addressed. In this way, every packet, or a defined subset of packets, may be gathered for further analysis.Featuring "keycybr" CI&R Intern "Chetan Bansal".Get in touch with him - https://www.linkedin.com/in/chetanbansal11/2020-12-3005 minCI&R WARRIORSCI&R WARRIORSWEBCRAWLINGWEBCRAWLINGA Web crawler, sometimes called a spider or spiderbot and often shortened to crawler, is an Internet bot that systematically browses the World Wide Web, typically for the purpose of Web indexing (web spidering).Featuring "keycybr" CI&R Intern "Afrar Ahamed".Get in touch with him - https://www.linkedin.com/in/afrar-afri-2ba21b1922020-12-2907 minCI&R WARRIORSCI&R WARRIORSWRAPPER TOOLSWRAPPER TOOLSWrapper tools combine two or more separate programs at a fundamental level into one package. Some wrappers allow for combining two, six, nine, or even an arbitrary number of programs together. Featuring "keycybr" CI&R Intern "Kasani ShivaTeja".He's is Professional Ethical Hacker, Core team member at TCA company and cybersecurity Manager at Cyberhakz company. And also Security researcher.Get in touch with him - https://www.linkedin.com/in/hacktivist 2020-12-2904 minCI&R WARRIORSCI&R WARRIORSFOOTPRINTINGFOOTPRINTINGFootprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.Featuring "keycybr" CI&R Intern "Siddharth Bose".Get in touch with him - https://www.linkedin.com/in/siddharth-bose-406180191/2020-12-2910 minCI&R WARRIORSCI&R WARRIORSPOISONING THE SOURCESPOISONING THE SOURCESHackers can Trojanize software programs during the software’s development and testing process. A hacker could join a software development company or contribute code to an open source software project.Featuring "keycybr" CI&R Intern "Harsha R".Get in touch with him - https://www.linkedin.com/in/hpyhar2020-12-2906 minCI&R WARRIORSCI&R WARRIORSMIMICKING FILE NAMESMIMICKING FILE NAMESThese Trojan horse naming issues go far beyond just putting spaces between the name and its file extension on Windows systems. Often, to fool a victim, attackers create another file and process with exactly the same name as an existing program installed on the machine e.g. “iexplore”, a Windows process.Featuring "keycybr" CI&R Intern "Kumar Atul Jaiswal".Get in touch with him - https://www.linkedin.com/in/whoiskumaratul/2020-12-2909 minCI&R WARRIORSCI&R WARRIORSWHOIS SEARCHWHOIS SEARCHWhen you register a domain name, the Internet Corporation for Assigned Names and Numbers (ICANN) requires your domain name registrar to submit your personal contact information to the WHOIS database.Featuring "keycybr" CI&R Intern "Shoana Anjum".Get in touch with her - https://www.linkedin.com/in/shoana-anjum-0827321b1/2020-12-2906 minCI&R WARRIORSCI&R WARRIORSEMAIL TRACKING & TRACINGEMAIL TRACKING & TRACINGEmail tracking is a method for monitoring the delivery of email messages to the intended recipient. Most tracking technologies use some form of  digitally time-stamped  record to reveal the exact time and date that an email was received or opened, as well the IP address of the recipient.Featuring "keycybr" CI&R Intern "Saurabh Sharma".Get in touch with him -https://www.linkedin.com/in/saurabh-sharma-85899b160/2020-12-2806 minCI&R WARRIORSCI&R WARRIORSMANIPULATING WINDOWS SUFFIXES - PART 1MANIPULATING WINDOWS SUFFIXESDNS suffix attack is type of attack where the Hacker gain the access of windows sensitive information and NTLM password due to not FQDN - Fully Qualified Domain Name authenticate it. So using the Wi-Fi access point hackers targeting in public places.Featuring "keycybr" CI&R Intern "Mukesh Kumar Rao".Get in touch with him -https://www.linkedin.com/in/mukesh-kumar-rao-233313105/2020-12-2811 minCI&R WARRIORSCI&R WARRIORSUSING KEYLOGGERS FOR ENCRYPTIONUSING KEYLOGGERS FOR ENCRYPTIONKeyloggers are a type of monitoring software designed to record keystrokes made by a user. One of the oldest forms of cyber threat, these keystroke loggers record the information you type into a website or application and send to back to a third party.Featuring "keycybr" CI&R Intern "Sahil More".Get in touch with him - https://www.linkedin.com/mwlite/in/sahil-more-09062020-12-2707 minCI&R WARRIORSCI&R WARRIORSHANDLING ENCRYPTED FILESHANDLING ENCRYPTED FILESData, or plaintext, is encrypted with an encryption algorithm and an encryption key. The process results in ciphertext, which only can be viewed in its original form if it is decrypted with the correct key. Symmetric-key ciphers use the same secret key for encrypting and decrypting a message or file.Featuring "keycybr" CI&R Intern "Bhairavi Bhosale".Get in touch with her - https://www.linkedin.com/in/bhairavibhosale212020-12-2704 minCI&R WARRIORSCI&R WARRIORSCYBER CRIME INVESTIGATION : TOOLS & TECHNIQUES EXPLAINEDCYBER CRIME INVESTIGATION : TOOLS & TECHNIQUES EXPLAINEDA lot of national and federal agencies use interviews and surveillance reports to obtain proof of cybercrime. Surveillance involves not only security cameras, videos and photos, but also electronic device surveillance that details what's being used and when, how it's being used, and all the digital behavior involved.Featuring "keycybr" CI&R Intern "Vaibhav Sanva". He is a Certified Ethical Hacker. Done his Btech in CSE with cybersecurity as his major . He reported upto 15 Indian Govt websites to NCIIPC (A unit of Indian Govt.) and received acknowledgements for the...2020-12-2707 minCI&R WARRIORSCI&R WARRIORSINVESTIGATING SERVER LOGSINVESTIGATING SERVER LOGSIn many cyber crime cases especially in web defacement analysis of File Transfer Protocol (FTP) and web server logs yields the most crucial evidence – the IP address of the suspect. Website defacement is usually the substitution of the original home page of a website with another page. In most of the web defacement cases the home page of the website is replaced with a pornographic or defamatory page.Featuring "keycybr" CI&R Intern "Jaydev Joshi". He is pursuing B.Tech from Atmiya university. Also he is a core team member of The Ha...2020-12-2703 minCI&R WARRIORSCI&R WARRIORSHANDLING HIDDEN DATAHANDLING HIDDEN DATATechnology savvy criminals use various methods to hide incriminating information. Hidden files and folders System files Alternate data streams (ADS)Featuring "keycybr" CI&R Intern "Paladugu Jashwanth". He is currently pursuing his bachelor's of technology in the stream of computer science (2nd year).Get in touch with him - https://www.linkedin.com/in/paladugu-jashwanth-a28a23150/2020-12-2708 minCI&R WARRIORSCI&R WARRIORSHANDLING STEGANOGRAPHYHANDLING STEGANOGRAPHYSteganography is the practice of concealing a message within another message or a physical object. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video.Featuring "keycybr" CI&R Intern "Dhaval Sabapara" He is student of computer engineering, influencer of cybersecurity. Also he is a volunteer at anti cyber crime society He is good at- information security, penetrating tester, system admin.Get in touch with him - https://in.linkedin.com/in/dhaval-sabapara-5021b117a2020-12-2606 minkeycybrkeycybrkeycybr (Trailer)2020-02-0400 min