Write Disk Protection

While investigating the digital evidence we need to protect targeted drive to write. Here you will find a simple to write disk protection. Step 01: Open run box by pressing window key + R Step 02: Type “regedit” in run box to open windows registry editor menu Step 03: Now go to “HKEY_LOCAL_MACHINE” Step 04: Now go to “SYSTEM” Step 05: Now go to “CurrentControlSet” Step 06: Now go to “Control” Step 07: Now right click on “Control” and select “NewàKey” Step 08: Store this key with the name “StorageDevicePolicies” Step…

Applicability of Sec. 65B for electronic evidence, SC, 4226 of 2012

REPORTABLE IN THE SUPREME COURT OF INDIA CIVIL APPELLATE JURISDICTION CIVIL APPEAL NO. 4226 OF 2012 Anvar P.V. … Appellant (s) Versus P.K. Basheer and others … Respondent (s) J U DG MENT KURIAN, J.: 1. Construction by plaintiff, destruction by defendant. Construction by pleadings, proof by evidence; proof only by relevant and admissible evidence. Genuineness, veracity or reliability of the evidence is seen by the court only after the stage of relevancy and admissibility. These are some of the first principles of evidence. What is the nature and manner…

WhatsApp Privacy Issue, Delhi High Court Judgement

* IN  THE  HIGH  COURT  OF  DELHI  AT  NEW  DELHI       Pronounced on: September 23, 2016 +  W.P.(C) 7663/2016 & C.M.No.31553/2016 (directions)  KARMANYA SINGH SAREEN AND ANR ….. Petitioners Through: Ms.Pratibha M.Singh, Mr.Sandeep Sethi, Sr.Advs. with Mr.T.Singhdev, Mr.Prabhas Bajaj, Mr.Tarun Verma, Advs.    Versus  UNION OF INDIA AND ORS    ….. Respondents Through: Mr.Ruchir Mishra, CGSC with Mr.Mukesh Kr.Tiwari, Adv. for UOI. Mr.Siddharth Luthra, Sr.Adv. with Mr.Tejas Karia, Mr.Akhil Anand, Mr.Vivek Reddy, Ms.Richa Srivastava, Mr.Shashank Mishra, Ms.Tara Narula, Mr.Gautam Khazanchi, Advs. for R-2. Mr.Kirtiman Singh, Standing Counsel and Mr.Prashant Bezboruah, Adv. for R-5/TRAI.  CORAM: HON’BLE THE CHIEF JUSTICE HON’BLE MS. JUSTICE…

Black Vine: Formidable cyber espionage group targeted aerospace, healthcare since 2012

Symantec today published a whitepaper on a highly resourceful cyberespionage group called Black Vine that has been operating since 2012.  Symantec believes that Anthem breach was just one of the multiple attacks by this group. Earlier this year, Anthem, the second largest health insurance provider in the US publicly disclosed that it had been the victim of a major cyberattack. The attack against Anthem resulted in the largest known healthcare data breach to date, with 80 million patient records exposed. The group has access to zero-day exploits, most likely obtained through the Elderwood framework, and uses custom-developed back door malware. By connecting multiple Black…

Few Types of Cyber Attacks – Cyber Threats

Botnet – a network of software robots, or bots, that automatically spread malware Fast Flux – moving data quickly among the computers in a botnet to make it difficult to trace the source of malware or phishing websites Zombie Computer – a computer that has been hacked into and is used to launch malicious attacks or to become part of a botnet Social Engineering – using lies and manipulation to trick people into revealing their personal information. Phishing is a form of social engineering Denial-of-Service attacks – flooding a network or server with traffic in order to make it unavailable to its users Skimmers – Devices that steal credit…