TENNESSEE GOVERNMENT SITE SUFFERS GROUP HACKS IN PROTEST OF NEW LAW

SITE SUFFERS HACKS The website of the Tennessee state government was hit by a group of hackers. The hackers intruded into the site accessing the personal records of Tennessee citizens. The hacking group known as ANONYMOUS stated their protest against a new law which would make it a crime to post pictures online that would cause emotional distress to someone. The group has expressed that the new law would take away the free speech right. The state legislature explained that the objective behind the new law is to stop cyber bullying on social media networks but not to curb the freedom of speech. Legal experts have also taken issue with the law calling it unconstitutional.

Continue reading

STRONG CYBER DEFENCE STRATEGY TO COUNTER CYBER ATTACKS

cyber defenseThe advent of information technology has re-defined the world into a cyber world. There is also an considerable increase in cyber crime, cyber attacks in corresponding to the technology changes.The cyber warfare is also developing as a new trend of battle. The threats of cyber attacks have a deep impact on the nation and also expose the critical infrastructure like banking, financial sector to risk.

Continue reading

LACK OF SECURITY MEASURES UNDER SEC 43(a) OF IT ACT

LACK OF SECURITY MEASURES UNDER SEC 43(a) OF IT ACT ATTRACTS HUGE LIABILITY
The organizations maintaining sensitive and personal information are required to take reasonable security measures as laid down under Section 43(a) of the INDIAN IT AMENDMENT ACT 2008. The section mandates the personal information which identifies a person like passport, credit card, pan card, driving license should be protected.

Continue reading

HACKERS INTRUDE INTO THE FEDERAL NETWORKS OF CANADA MINISTRY

In recent times, the hackers broke into the network of Canada Ministry. The broadcasting corporation of Canada reported that emails were sent to the staff of the Ministry by the hackers that seemed to come from senior managers. When the staff opened the attachments, the hackers exploited a path into the federal network. The President of Treasury Board contended that he was not told of the breach. He expressed that upon the information given to him he was confident that the systems were shut down and important information had not been carried away and the staff continued their operations of ongoing assessment. The internet access is still restricted for the staff of the Finance Department and Treasury Board. The network of the agencies is now disconnected from the main network of the government. They have a separate computer station which is independent.

Continue reading

CYBER CRIMES POSE THREAT TO UK ECONOMY

UK poundThe information era has witnessed the development of technology at a rapid pace.  The cyber crimes are also on a rise competing with the technology. The computer technology has created a revolution in the administration of nations. The various sectors are using these technologies for their business operations.

Continue reading

FLOODED CYBER ATTACKS FORCE CHINA TO AMEND CYBER LAW

cyber attacksThe Chinese Cyber Law was finally enhanced due to extensive cyber-attacks. The cyber law of china which did not have strong provisions for cyber crimes earlier have become a victim recently to many cyber threats. China is considered to be the hacker’s hub has now been hit by many cyber crimes. The amendments were not made to cyber laws corresponding to the latest cyber crimes.

Continue reading

LEGAL BATTLE OVER CYBER TERRORISM

cyber terroristsThe terrorism is one of the biggest challenges in the world today. The cyber terrorism is one of the most difficult attacks to counter in the recent times. The cyber terrorism as the name suggests makes use of the internet in an attack. The attack may be a terrorist attack or an attack  for political purposes. It is generally an internet based attack to disrupt large networks across the globe.  The term cyber terrorism is very wide.  It attacks the networks across the world without necessarily affecting the real world infrastructure, properties or lives.

Continue reading

Page 1 of 2
1 2