Guide for Payment Cardholders to avoid falling victim to frauds:

Background: The author, Niranjan Upadhye, is a Civil engineer by qualification from Mumbai University and had his first ‘swipe’ with the Cards industry, while working as marketing executive for a foreign bank’s DSA. For some years, he then worked for the Card Products Division of a major foreign bank in Mumbai.

He is presently working with UTI Bank Ltd in their Risk & Fraud Containment function & also looks after some of the Bank’s new initiatives in eCommerce. Niranjan is a member of the Indian Payment Cards Risk Council and has been a witness to the Security & Fraud control challenges that the Payment Cards Industry faces. He has been keenly involved in various aspects of the Cards Business such as Acceptance & Infrastructure development, Merchant training, Fraud Control and Transactions monitoring.

Read more...




PHISHING

Background: The author, Niranjan Upadhye, is a Civil engineer by qualification from Mumbai University and had his first ‘swipe’ with the Cards industry, while working as marketing executive for a foreign bank’s DSA. For some years, he then worked for the Card Products Division of a major foreign bank in Mumbai.

Read more...




What is Identity Theft?

Identity theft occurs when somebody steals a person’s name and other personal information for fraudulent purposes. Identity theft is a form of identity crime where somebody uses a false identity to commit a crime. It involves stealing victims’ personal information and credentials, often to make purchases. It is an act of impersonating another by means of using the person’s information, such as birth date, Social Security number, address, name, and bank account information. It is an fact the co-option of another person’s personal information e.g., name, Social Security number, credit card number or passport without that person’s knowledge and the fraudulent use of such knowledge. Identity theft is deliberately assuming another person’s identity, usually to gain access to their finances or frame them for a crime. It can also be used to enable illegal immigration, terrorism, espionage, or changing identity permanently.
Read more...




MUMBAI CYBER LAB

Mumbai Cyber Lab is a unique initiative of Police-Public collaboration for training of police officers of Mumbai police in investigation of cyber crime. Conceived during the year 2004, Mumbai Cyber Lab was made operational on 8th March 2004. It imparts basic training to the officers posted at different Police Stations and has trained 842 officers till date.
Read more...




Consumers Now Target of Nigerian Letter Scams

The Cyber Crime Investigation Cell, Mumbai has been warning businesses for several years not to be tempted by fraudulent letters from Nigeria that offer get-rich-quick schemes. The so-called “Nigeria Letter scam” has been around since the early 1990s, scamming businesses nationwide out of millions of dollars. Although small businesses, churches and non-profit organizations have been the primary target, consumers are reporting that these letters are now showing up in their mailboxes at home.
The CCIC advises consumers who receive these letters not to provide any personal or banking information to these con artists. The best thing to do is not to respond at all.

Read more...




Cyber criminals zero in on airlines

BANGALORE: Cyber crime is getting costlier. Cases of fraud in online
airticket booking, internet banking, an unknown call centre servicing
toll-free numbers and pay sites and illegally debiting money from US
credit card holders are fast pushing obscene MMSs on mobile phones and
e-mails to the sidelines.

Read more...




Internet Security

01. Background
02. What is an Internet?
03. What is World Wide Web (WWW)?
04. How does an Internet Work?
05. Domain Name System (DNS)

Read more...




SCAM: The Nigerian Advance Fee Scheme

The Nigerian Advance Fee Scam has been around for quite awhile, but despite many warnings, continues to draw in many victims. In fact, the Police receives approximately 100 telephone calls from victims/ potential victims and 300-500 pieces of related correspondence per day about this scam!
Read more...




How to Stop the Porn Predators

There are three types of adult Web sites on the Internet.

1.The first type of adult site tries to operate in a responsible manner, by rating its pages and doing its best to make the site filterable by child protection software. They are dedicated providing their material ONLY to adults.

2.The second category of adult sites doesn’t know any better. They either have not been informed of the ways to operate responsibly or are too lazy to do anything about it. They need to be educated.

3.The third type is the most dangerous. These adult sites are run by “porn predators”, people who have no ethics and would gladly use any means possible to “site spam” your children.

Read more...




Forensic Computer And Cybercrime

This presentation deals with the following aspects of forensic computer and cybercrime investigations namely the detection and investigation of malicious applications and custom developed solutions. The primary goal of this type of investigation is to recover information, (both overt and covert), that is pertinent to an investigation and prosecution of the criminal activity being investigated.

Read more...