<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8563782871693839345</atom:id><lastBuildDate>Fri, 01 Nov 2024 08:47:45 +0000</lastBuildDate><category>neelabh rai</category><category>cyber sabotage</category><category>critical infrastructure</category><category>malware</category><category>CIP</category><category>cybercops india</category><category>HMI</category><category>Industrial Systems</category><category>PLC</category><category>SCADA</category><category>botnet</category><category>cyber terrorism</category><category>patent</category><category>protection</category><category>stuxnet</category><category>validy technology</category><category>website hacked</category><category>BCrypt</category><category>Browser Forensic Tool</category><category>Chris Larsen</category><category>Filebulldog</category><category>HMAC</category><category>IDA Pro</category><category>India</category><category>MD5 security risk</category><category>RFC 2104</category><category>SHA-2</category><category>SMS service</category><category>Vulnerability</category><category>aarohi blood bank</category><category>anti malware</category><category>betterinstaller</category><category>bitly</category><category>blood donation</category><category>bluecoat</category><category>brothersoft</category><category>car hacking</category><category>career counseling</category><category>chart</category><category>compromise</category><category>cyber cops india</category><category>cyber crime</category><category>cyber law</category><category>cyber security</category><category>cyber security roadmap</category><category>cyber security strategy</category><category>cyber war</category><category>diploma</category><category>eastern grid</category><category>ec-council</category><category>eset</category><category>facebook</category><category>framework</category><category>hacked</category><category>incident response</category><category>iran</category><category>malwarebytes</category><category>map</category><category>mbam</category><category>messagelabs intelligence</category><category>natanz</category><category>network</category><category>north-east grid</category><category>northern grid</category><category>ntt data</category><category>nuclear reactor</category><category>power grid failure</category><category>power grids in India</category><category>roadmap</category><category>salted and hashed</category><category>scumware</category><category>somoto</category><category>sony</category><category>survey</category><category>symantec</category><category>terminal commands</category><category>top 10</category><category>ubuntu commands</category><category>wipro</category><category>wot</category><category>साइबर लॉ</category><category>साइबर सुरक्षा</category><title>CYBER COPS India - Securing Bits and Bytes</title><description>&quot;CYBER COPS India&quot; is an initiative to help all netizens stay safer and feel more secure online in the cyberspace by providing Comprehensive Online Proactive Security with an access to global trustworthy security products / technology / solutions, for the first time, in Indian Cyberspace.</description><link>http://cybercopsindia.blogspot.com/</link><managingEditor>noreply@blogger.com (neelabhrai)</managingEditor><generator>Blogger</generator><openSearch:totalResults>20</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-676477229179601014</guid><pubDate>Wed, 09 May 2018 06:36:00 +0000</pubDate><atom:updated>2018-05-09T12:06:33.403+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">terminal commands</category><category domain="http://www.blogger.com/atom/ns#">ubuntu commands</category><title>Some important commands in Ubuntu</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Note: Any &lt;span style=&quot;background-color: yellow;&quot;&gt;highlighted&lt;/span&gt; contents implies that it is to be written in the &lt;span style=&quot;background-color: yellow;&quot;&gt;CAPITALS&lt;/span&gt;.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
To check the battery status:&amp;nbsp;&lt;div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;upower -i /org/freedesktop/UPower/devices/battery_BAT0&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;pre&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;upower -i `upower -e | grep &#39;BAT&#39;`&lt;/span&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
To check the battery current health status:&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;sudo apt-get install acpi&lt;/li&gt;
&lt;li&gt;acpi -&lt;span style=&quot;background-color: yellow;&quot;&gt;V&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
Check more commands associated with acpi:&lt;/div&gt;
&lt;div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;acpi --help&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
Check CPU Details:&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;sudo dmidecode |grep &lt;span style=&quot;background-color: yellow;&quot;&gt;V&lt;/span&gt;ersion&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2018/05/some-important-commands-in-ubuntu.html</link><author>noreply@blogger.com (neelabhrai)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-4766158924333469972</guid><pubDate>Sat, 27 Jun 2015 10:55:00 +0000</pubDate><atom:updated>2015-06-28T14:21:52.958+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">aarohi blood bank</category><category domain="http://www.blogger.com/atom/ns#">blood donation</category><category domain="http://www.blogger.com/atom/ns#">cyber cops india</category><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">neelabh rai</category><category domain="http://www.blogger.com/atom/ns#">ntt data</category><title>Looking back in History..... Awards, Accomplishments, Rewards, etc. given to Neelabh Rai</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1vGdLphQ3lNfT3WBYy1iwIG2A6oQYgd9lVeXvpp6IQb4W_OlVlLki0nerXsIuhRLK9PbZ58dGifdW7nGPLbsFgbJJTySqNnUumtDz24ct8RPQCkBSFATZ2QSh4KYG64SlsBQzNmdYUbfh/s1600/Certificate+-+Aarohi+Blood+Bank+-+38+Blood+Donation.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;404&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1vGdLphQ3lNfT3WBYy1iwIG2A6oQYgd9lVeXvpp6IQb4W_OlVlLki0nerXsIuhRLK9PbZ58dGifdW7nGPLbsFgbJJTySqNnUumtDz24ct8RPQCkBSFATZ2QSh4KYG64SlsBQzNmdYUbfh/s640/Certificate+-+Aarohi+Blood+Bank+-+38+Blood+Donation.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;fb-root&quot;&gt;
&lt;/div&gt;
&lt;script&gt;(function(d, s, id) {  var js, fjs = d.getElementsByTagName(s)[0];  if (d.getElementById(id)) return;  js = d.createElement(s); js.id = id;  js.src = &quot;//connect.facebook.net/en_GB/sdk.js#xfbml=1&amp;version=v2.3&quot;;  fjs.parentNode.insertBefore(js, fjs);}(document, &#39;script&#39;, &#39;facebook-jssdk&#39;));&lt;/script&gt;&lt;br /&gt;
&lt;div class=&quot;fb-post&quot; data-href=&quot;https://www.facebook.com/permalink.php?story_fbid=805768166185228&amp;amp;id=221978211230896&amp;amp;substory_index=0&quot; data-width=&quot;500&quot;&gt;
&lt;div class=&quot;fb-xfbml-parse-ignore&quot;&gt;
&lt;blockquote cite=&quot;https://www.facebook.com/permalink.php?story_fbid=805768166185228&amp;amp;id=221978211230896&amp;amp;substory_index=0&quot;&gt;
Neelabh Rai aged 31 years completed his 38th Blood Donation during ABB&#39;s Camp at NTT Data-iLabs...This IT Professional...&lt;br /&gt;
Posted by &lt;a href=&quot;https://www.facebook.com/pages/Aarohi-Blood-Bank/221978211230896&quot;&gt;Aarohi Blood Bank&lt;/a&gt; on&amp;nbsp;&lt;a href=&quot;https://www.facebook.com/permalink.php?story_fbid=805768166185228&amp;amp;id=221978211230896&amp;amp;substory_index=0&quot;&gt;Friday, 26 June 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2015/06/looking-back-in-history-awards.html</link><author>noreply@blogger.com (neelabhrai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1vGdLphQ3lNfT3WBYy1iwIG2A6oQYgd9lVeXvpp6IQb4W_OlVlLki0nerXsIuhRLK9PbZ58dGifdW7nGPLbsFgbJJTySqNnUumtDz24ct8RPQCkBSFATZ2QSh4KYG64SlsBQzNmdYUbfh/s72-c/Certificate+-+Aarohi+Blood+Bank+-+38+Blood+Donation.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-7156873737107128201</guid><pubDate>Mon, 08 Dec 2014 01:19:00 +0000</pubDate><atom:updated>2014-12-08T06:49:11.403+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">career counseling</category><category domain="http://www.blogger.com/atom/ns#">cyber crime</category><category domain="http://www.blogger.com/atom/ns#">cyber law</category><category domain="http://www.blogger.com/atom/ns#">cyber security</category><category domain="http://www.blogger.com/atom/ns#">diploma</category><category domain="http://www.blogger.com/atom/ns#">neelabh rai</category><category domain="http://www.blogger.com/atom/ns#">साइबर लॉ</category><category domain="http://www.blogger.com/atom/ns#">साइबर सुरक्षा</category><title>साइबर लॉ के क्षेत्र में है करियर के साथ असीम संभावनायें</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
आज भारत में जिस तरह इंटरनेट का विस्तार हो रहा है, उसी तरह यहाँ साइबर लॉ की जरूरत भी महसूस की जाने लगी है। वास्तव में साइबर लॉ की जरूरत हर उस देश में महसूस की जा रही है जहाँ भी साइबर अपराध हो रहे हैं। ऐसे में ज्यादातर सभी विकासशील देशों जहाँ इंटरनेट अभी पूरी तरह से जड़ें जमा नहीं पाया है, वहाँ भी साइबर लॉ की जरुरत महसूस की जा रही है। साइबर अपराध को निपटाने और न्याय दिलाने के लिए इसके विशेषज्ञों की माँग लगातार बढ़ रही है। इसी जरुरत को ध्यान में रखते हुए साइबर लॉ से संबंधित पाठयक्रमों की शुरुआत अब ज्यादातर इंस्टीट्यूट में कर दी गई है। कहीं स्पेशलाइज्ड रूप में, तो कहीं एलएलबी के साथ इसकी पढ़ाई होती है।&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;http://cybercopsindia.blogspot.com/2014/12/cyber-law-career-options.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2014/12/cyber-law-career-options.html</link><author>noreply@blogger.com (neelabhrai)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-5805197616833588268</guid><pubDate>Wed, 14 May 2014 11:40:00 +0000</pubDate><atom:updated>2014-05-14T17:10:37.489+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">BCrypt</category><category domain="http://www.blogger.com/atom/ns#">bitly</category><category domain="http://www.blogger.com/atom/ns#">compromise</category><category domain="http://www.blogger.com/atom/ns#">cybercops india</category><category domain="http://www.blogger.com/atom/ns#">HMAC</category><category domain="http://www.blogger.com/atom/ns#">incident response</category><category domain="http://www.blogger.com/atom/ns#">MD5 security risk</category><category domain="http://www.blogger.com/atom/ns#">neelabh rai</category><category domain="http://www.blogger.com/atom/ns#">RFC 2104</category><category domain="http://www.blogger.com/atom/ns#">salted and hashed</category><category domain="http://www.blogger.com/atom/ns#">SHA-2</category><title>Incident Response Case Study: Bitly Account Compromise</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-size-adjust: none; font-stretch: normal; font: 14px/20px Helvetica, Arial, sans-serif; letter-spacing: normal; margin-bottom: 1em; margin-top: 1em; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;div style=&quot;margin: 0px;&quot;&gt;
There is an important update from the Bitly Account Users from the Bitly Team. The Bitly Team is having some strong reasons to believe that &lt;span class=&quot;il&quot; style=&quot;background-color: #ffffcc; color: #222222;&quot;&gt;Bitly&lt;/span&gt; account credentials may have been compromised; however, they have no indication at this time that the user&amp;#39;s account has been accessed without permission.&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-size-adjust: none; font-stretch: normal; font: 14px/20px Helvetica, Arial, sans-serif; letter-spacing: normal; margin-bottom: 1em; margin-top: 1em; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;div style=&quot;margin: 0px;&quot;&gt;
Whenever a service provider is having some suspicion of account compromising incident, it is better to take precautions. In the same manner, to play safe in the cyberspace The Bitly Team had proactively disconnected any connections one might had done with Facebook and Twitter to publish the posts by using the URL Shortening Links using bit.ly or bitly.com . Once can safely reconnect these accounts in the next login.&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; background-color: white; color: black; font-size-adjust: none; font-stretch: normal; font: 14px/20px Helvetica, Arial, sans-serif; letter-spacing: normal; margin-bottom: 1em; margin-top: 1em; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;&quot;&gt;
&lt;div style=&quot;margin: 0px;&quot;&gt;
If someone will login to their bitly account and if a user sees that their Facebook and Twitter accounts are still connected to their Bitly account, then this information is important for them:&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://cybercopsindia.blogspot.com/2014/05/incident-response-case-study-bitly.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2014/05/incident-response-case-study-bitly.html</link><author>noreply@blogger.com (neelabhrai)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-3103499263233095975</guid><pubDate>Thu, 08 May 2014 19:07:00 +0000</pubDate><atom:updated>2014-07-04T16:44:59.686+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">ec-council</category><category domain="http://www.blogger.com/atom/ns#">hacked</category><category domain="http://www.blogger.com/atom/ns#">neelabh rai</category><category domain="http://www.blogger.com/atom/ns#">website hacked</category><title>EC Council official website hacked (http://www.eccouncil.org/)</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
The official website of International Council of E-Commerce Consultants, popularly known as EC-Council, is hacked. The hacker had inserted an image showing Edward Snowden&amp;#39;s Passport and left following message on the www.ec-council.org website:&lt;br&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&amp;quot;&lt;br&gt;
&lt;i&gt;owned by certified unethical software security professional&lt;br&gt;-Eugene Belford&lt;/i&gt;&lt;br&gt;
&amp;quot;&lt;/blockquote&gt;
The name used by the hacker - Eugene Belford - is taken from the movie &lt;a href=&quot;http://www.imdb.com/title/tt0113243/&quot; target=&quot;_blank&quot;&gt;Hackers (1995)&lt;/a&gt; . The picture inserted is:&lt;br&gt;
&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;http://cybercopsindia.blogspot.com/2014/05/ec-council-official-website-hacked.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2014/05/ec-council-official-website-hacked.html</link><author>noreply@blogger.com (neelabhrai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMpAWzXTvVlgPGTeK9pywW-CCHvANnlpNwfAMd2CyFdUEmjVR4jWw1LW9bMXnDuwnTuZLWCcJSwKGbTD5e2z0LYlwlk9T_9tvkiXkN0tukh0atwp68y9t-hXBC71JUdgXMRU3MZDa-1_WK/s72-c/eccouncil-website-hacked-2014-1.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-8749114254330950844</guid><pubDate>Mon, 06 May 2013 10:59:00 +0000</pubDate><atom:updated>2013-05-06T16:29:57.061+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyber security roadmap</category><category domain="http://www.blogger.com/atom/ns#">cyber security strategy</category><category domain="http://www.blogger.com/atom/ns#">cybercops india</category><category domain="http://www.blogger.com/atom/ns#">framework</category><category domain="http://www.blogger.com/atom/ns#">neelabh rai</category><category domain="http://www.blogger.com/atom/ns#">roadmap</category><title>Cyber Security Roadmap / Strategy (draft version 1.0.0)</title><description>&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;It&amp;#39;s an attempt by &lt;a href=&quot;http://www.cybercops.in/neelabhrai.php&quot; target=&quot;_blank&quot;&gt;Neelabh Rai&lt;/a&gt; to create a cyber security roadmap / strategy that can be implemented by any organization / country / corporate bodies. All its minute details are also in the development stage and will be hopefully completed at the earliest possible. The cyber security roadmap is created single-handedly by &lt;span style=&quot;color: red;&quot;&gt;Neelabh Rai&lt;/span&gt;.&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br&gt;
Since &lt;a href=&quot;http://www.cybercopsindia.com/&quot; target=&quot;_blank&quot;&gt;CYBER COPS India&lt;/a&gt; is a knowledge-sharing platform among the cyber security researchers, practitioners and experts hence, this very document is made available as a &lt;i&gt;copyleft&lt;/i&gt; to all the esteemed readers and viewers.&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br&gt;
Kindly have a look on this very document titled as &lt;b&gt;&amp;quot;Cyber Security Roadmap / Strategy (draft version 1.0.0)&amp;quot;&lt;/b&gt; from here: &lt;/span&gt;&lt;br&gt;
&lt;a href=&quot;http://cybercopsindia.blogspot.com/2013/05/cyber-security-roadmap-strategy-draft.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2013/05/cyber-security-roadmap-strategy-draft.html</link><author>noreply@blogger.com (neelabhrai)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-4637982557273180142</guid><pubDate>Tue, 14 Aug 2012 05:09:00 +0000</pubDate><atom:updated>2012-08-14T10:55:54.558+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">CIP</category><category domain="http://www.blogger.com/atom/ns#">critical infrastructure</category><category domain="http://www.blogger.com/atom/ns#">cyber sabotage</category><category domain="http://www.blogger.com/atom/ns#">eastern grid</category><category domain="http://www.blogger.com/atom/ns#">HMI</category><category domain="http://www.blogger.com/atom/ns#">India</category><category domain="http://www.blogger.com/atom/ns#">Industrial Systems</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">neelabh rai</category><category domain="http://www.blogger.com/atom/ns#">north-east grid</category><category domain="http://www.blogger.com/atom/ns#">northern grid</category><category domain="http://www.blogger.com/atom/ns#">PLC</category><category domain="http://www.blogger.com/atom/ns#">power grid failure</category><category domain="http://www.blogger.com/atom/ns#">power grids in India</category><category domain="http://www.blogger.com/atom/ns#">SCADA</category><title>[Series 01] Indian SCADA Systems - Current Status?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;SCADA&lt;/span&gt;&lt;/b&gt; i.e., &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;S&lt;/span&gt;&lt;/b&gt;upervisory &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;C&lt;/span&gt;&lt;/b&gt;ontrol &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;A&lt;/span&gt;&lt;/b&gt;nd &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;D&lt;/span&gt;&lt;/b&gt;ata &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;A&lt;/span&gt;&lt;/b&gt;cquisition is a real time industrial process control systems used to centrally monitor and control remote or local industrial equipment such as motors, valves, pumps, relays etc. SCADA is used to control:&lt;br&gt;
&lt;br&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;chemical plant processes,&lt;/li&gt;
&lt;li&gt;oil and gas pipelines,&lt;/li&gt;
&lt;li&gt;electrical generation and transmission equipment,&lt;/li&gt;
&lt;li&gt;manufacturing facilities,&lt;/li&gt;
&lt;li&gt;water purification and distribution infrastructures etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
On 31 July, 2012 a news broke relating to the blackout in 20 states of India due to Northern Electricity Grid Failure which subsequently led to the failure of Eastern and North Eastern Electricity Grid Failure. &lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqpSumDHjCnF3RmM1W-YCyqScL_0SVtK1Fq72jbffIUGXw6ITOoxcB2OPqQe06xnhZFMn1ag0iXLoPg6WyHJQagDWGFaulTvNgohm0ttaV6tJfq1Yy-0Ch-WWxNnBgLZupI8beRmFpX7bG/s1600/_61937523_india_power_grids_624.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;&lt;a href=&quot;http://cybercopsindia.blogspot.com/2012/08/indian-scada-systems-01.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2012/08/indian-scada-systems-01.html</link><author>noreply@blogger.com (neelabhrai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqpSumDHjCnF3RmM1W-YCyqScL_0SVtK1Fq72jbffIUGXw6ITOoxcB2OPqQe06xnhZFMn1ag0iXLoPg6WyHJQagDWGFaulTvNgohm0ttaV6tJfq1Yy-0Ch-WWxNnBgLZupI8beRmFpX7bG/s72-c/_61937523_india_power_grids_624.gif" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-6591339335909196608</guid><pubDate>Tue, 24 Apr 2012 03:07:00 +0000</pubDate><atom:updated>2012-04-24T12:39:38.055+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti malware</category><category domain="http://www.blogger.com/atom/ns#">betterinstaller</category><category domain="http://www.blogger.com/atom/ns#">brothersoft</category><category domain="http://www.blogger.com/atom/ns#">Browser Forensic Tool</category><category domain="http://www.blogger.com/atom/ns#">cybercops india</category><category domain="http://www.blogger.com/atom/ns#">eset</category><category domain="http://www.blogger.com/atom/ns#">Filebulldog</category><category domain="http://www.blogger.com/atom/ns#">IDA Pro</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">malwarebytes</category><category domain="http://www.blogger.com/atom/ns#">mbam</category><category domain="http://www.blogger.com/atom/ns#">neelabh rai</category><category domain="http://www.blogger.com/atom/ns#">scumware</category><category domain="http://www.blogger.com/atom/ns#">somoto</category><category domain="http://www.blogger.com/atom/ns#">wot</category><title>Browser Forensic Tool (BFT) - A Benign Tool or Malign Tool??</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Someone referred me to the UNREMOTE link where an interesting article was posted about a tool named as &amp;quot;Browser Forensic Tool (BFT)&amp;quot;. The link is given below:&lt;br&gt;
&lt;br&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://unremote.org/2012/02/09/bft-browser-forensic-tool/&quot;&gt;http://unremote.org/2012/02/09/bft-browser-forensic-tool/&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;About BFT:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
According to the above given link, BFT is a software that will search in all kind of browser history (even archived) in few seconds. It will retrieve URLs and Title with chosen keywords of all matching search. One can use default example profiles or create a new one, with thematic search.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;center&gt;&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;http://www.youtube.com/embed/u2FR7tr4d_4&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;br&gt;
At first hand since never heard something like this, hence, it was obvious for me to take BFT for a test ride and to know whether it is worth using or not.&lt;br&gt;
&lt;br&gt;
Additionally, the website &lt;a href=&quot;http://www.brothersoft.com/&quot; target=&quot;_blank&quot;&gt;BrotherSoft&lt;/a&gt;&amp;#39;s Publisher also gives the following &lt;a href=&quot;http://www.brothersoft.com/browser-forensic-tool-486857.html&quot; target=&quot;_blank&quot;&gt;comment on BFT&lt;/a&gt; as:&lt;br&gt;
&lt;br&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span itemprop=&quot;description&quot; style=&quot;font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif;&quot;&gt;You wan&amp;#39;t to search very quickly in the &lt;a href=&quot;http://www.brothersoft.com/history-444089.html&quot; target=&quot;_blank&quot;&gt;History&lt;/a&gt; of all common browsers &lt;br&gt;even archived ones by keywords list (manageable) ?&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif;&quot;&gt;&lt;span itemprop=&quot;description&quot;&gt;This
 software is made for you, for companies, anti cyber criminal companies,
&lt;br&gt; for particular this software will simplify your life and save hours of 
manual researching.&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif;&quot;&gt;you can &lt;a href=&quot;http://www.brothersoft.com/browser-forensic-tool-download-486857.html&quot;&gt;free download Browser Forensic Tool 1.0&lt;/a&gt; now.&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br&gt;
&lt;br&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
Reference: &lt;a href=&quot;http://www.brothersoft.com/browser-forensic-tool-486857.html&quot; target=&quot;_blank&quot;&gt;http://www.brothersoft.com/browser-forensic-tool-486857.html&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
Hence, I installed it in a Virtual Machine having an Operating System of Microsoft Windows 7 Professional Version with all the necessary Security Tools installed viz. Anti-Virus, Intrusion Detection System (IDS), Wireshark etc.&lt;br&gt;
&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;http://cybercopsindia.blogspot.com/2012/04/browser-forensic-tool-bft-benign-tool.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2012/04/browser-forensic-tool-bft-benign-tool.html</link><author>noreply@blogger.com (neelabhrai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/u2FR7tr4d_4/default.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-5014161981933822252</guid><pubDate>Tue, 27 Sep 2011 08:04:00 +0000</pubDate><atom:updated>2011-09-27T15:29:13.105+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">survey</category><title>A Research Survey on &quot;Faith / Trust / Confidence of Public on Indian Police&quot;</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.websurveymaster.com/s/cybercopsindia-survey1&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue; font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;Click Here to take Survey&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://media2.intoday.in/indiatoday/images/stories/raj-bala-167_092711102811.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://media2.intoday.in/indiatoday/images/stories/raj-bala-167_092711102811.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;Rajbala Malik&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;I was watching a popular News Channel &quot;&lt;/span&gt;&lt;a href=&quot;http://aajtak.intoday.in/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;AAJ TAK&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&quot; yesterday evening at my home when a news flashed that Ms. Rajbala Malik, 51-year-old and a supporter of Swami Ramdev, lost the battle between life and death after 110 days living in ICU (Intensive Care Unit). She&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222;&quot;&gt;died due to the Lathi Charge done by Delhi Police that took place on the unfortunate night of 4 June 2011 at Ramlila Maidan.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Leader of the Opposition in Lok Sabha Sushma Swaraj said on Twitter as &quot;After oscillating between life and death for 15 weeks, Rajbala died. It is a sad commentary on our police functioning... I demand that a murder case be registered against Delhi Police and the guilty must be punished&quot;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;See this news link:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://bit.ly/aajtak-rajbala&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;http://bit.ly/aajtak-rajbala&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt; (in Hindi) OR&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://bit.ly/rajbala-english&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;http://bit.ly/rajbala-english&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;(in English)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://media2.intoday.in/indiatoday/images/stories//2011September/amarjeet-150_092711084806.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://media2.intoday.in/indiatoday/images/stories//2011September/amarjeet-150_092711084806.jpg&quot; width=&quot;141&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small;&quot;&gt;Amarjeet Chadha was shot&lt;br /&gt;&amp;nbsp;dead by Head Constable&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222;&quot;&gt;Then I switched to another News Channel where&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222;&quot;&gt;another news was being aired by the reporter of the callousness shown by a Delhi Police Head Constable. A 60-year-old dry fruits trader was shot dead and a mobile phone store owner injured in Lahori Gate Area. Head Constable of Delhi Police fired three rounds at businessman Amarjeet Singh Chaddha in an attempt to rob him of his gold chains and cash around 21:00 hours on Saturday, 27 September, 2011.&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;Just today, few hours ago, another news flashed in the news channel that the man who tried to save the trader, the mobile phone store owner, is also dead now as the bullet (it too was fired by the same shooter) had crossed piercing his neck. For more information on this news, click here:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://bit.ly/delhitraderdead&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;http://bit.ly/delhitraderdead&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;Then, I switched to &quot;&lt;/span&gt;&lt;a href=&quot;http://www.ndtv.com/&quot; style=&quot;color: #222222;&quot;&gt;NDTV India&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&quot; News Channel, which was showing another news on Indian Police. This time it was flashing the news as &quot;&lt;b&gt;&lt;i&gt;Truck Driver refuses to pay Bribe, Beaten to Death&lt;/i&gt;&lt;/b&gt;&quot;. Another news showing the insensitivity of our Indian Police. This time this event took place in Chandauli, Uttar Pradesh (UP). See this video link:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://bit.ly/ndtvindia-truckdriverdead&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;http://bit.ly/ndtvindia-truckdriverdead&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;Click here to read the news:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://bit.ly/zeenews-truckdriverdead&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;http://bit.ly/zeenews-truckdriverdead&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;These all news are just samples of the one side of coin of the working of our Indian Police. I don&#39;t say that the Indian Police is always like this. There are many brave and honest Policemen too in the uniform who are working for giving a better environment for the society and they are doing their best.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;One such person to whom I am well aware of his way of working, his conduct was&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Ajay_Kumar&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;Dr. Ajay Kumar&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;, IPS officer of 1986 batch, Jamshedpur, Jharkhand. &amp;nbsp;He was posted in Jamshedpur from 1994 - 1996 and this is the tenure which is termed as the Golden period for this very place.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;During the 1990s Jamshedpur was ruled by local &quot;Goons&quot;, and crime was at a peak in the city, when the chief minister of&amp;nbsp;Bihar&amp;nbsp;Lalu Prasad Yadav, on request of the&amp;nbsp;Tata Steel&amp;nbsp;MD J. J. Irani, sent Dr. Ajay Kumar, as the City SP in 1994. In a short time the SP was successful in controlling and decreasing the crime rate in Jamshedpur.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19px;&quot;&gt;Read more here:&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;&lt;a href=&quot;http://bit.ly/ndtvindia-ajaykumar&quot;&gt;http://bit.ly/ndtvindia-ajaykumar&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 19px;&quot;&gt;. Do see this interesting post &lt;a href=&quot;http://www.indiancricketfans.com/showthread.php?t=131793&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; line-height: 19px;&quot;&gt;&lt;i&gt;This&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;survey is created with an honest intention to see what the common man (i.e.,&amp;nbsp;Aam Aadmi) of India thinks and feels about the Indian Police and how much faith / trust / confidence the common man is having now&lt;/span&gt;.&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/i&gt;With these concepts and ideas in mind, the survey is formulated and made available to the public and&amp;nbsp;&lt;b&gt;its&#39; my request to all the Indians who surf the Internet that please do take&amp;nbsp;&lt;a href=&quot;http://www.websurveymaster.com/s/cybercopsindia-survey1&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;this&lt;/span&gt;&lt;/a&gt;&amp;nbsp;survey&lt;/b&gt;. The survey comprises of just&lt;b&gt;&amp;nbsp;ten (10) questions only&lt;/b&gt;&amp;nbsp;which can be completed in 5-10 minutes.&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222;&quot;&gt;No personal information is required to submit. The only expectation is an honesty in giving this survey by only one time. For those Indian individuals for whom their Privacy is important, I had already given an option just after the title of my survey as &quot;&lt;b&gt;&lt;i&gt;Please record my answers anonymously&lt;/i&gt;&lt;/b&gt;&quot;. Just check it, and complete the survey!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&lt;a href=&quot;http://www.websurveymaster.com/s/cybercopsindia-survey1&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue; font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;Click Here to take Survey&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif;&quot;&gt;About Neelabh Rai, the creator of this research survey:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;If someone is interested to know about me, then feel free to contact me directly on my official email id&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnOVD2DazasCdmctnkKKyH-Wz5FaFuJcrF-Gj4TEokyZyBLswsJSwCjmoKCWJa75fjuaF5PR9wzX9iuAtKQSLzFtqa5mpAy2Z_PPwCziBoeLRMQim7Er2Bx96LPa6-uPfbKY6WKm7EyUQX/s1600/cybercopsindia-official-email-id.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnOVD2DazasCdmctnkKKyH-Wz5FaFuJcrF-Gj4TEokyZyBLswsJSwCjmoKCWJa75fjuaF5PR9wzX9iuAtKQSLzFtqa5mpAy2Z_PPwCziBoeLRMQim7Er2Bx96LPa6-uPfbKY6WKm7EyUQX/s1600/cybercopsindia-official-email-id.JPG&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #222222; font-family: Arial, Helvetica, sans-serif;&quot;&gt;with the &lt;b&gt;&lt;i&gt;subject: &lt;/i&gt;&lt;/b&gt;&lt;i&gt;&lt;b&gt;&quot;Faith / Trust / Confidence of Public on Indian Police&quot;&lt;/b&gt;&lt;/i&gt;. More information related to me can be obtained in cyberspace by just entering my name &quot;Neelabh Rai&quot;. For your ease, I am providing few website links that will allow you to know a brief about me:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;1)&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.cybercops.in/neelabhrai.php&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://www.cybercops.in/&lt;wbr&gt;&lt;/wbr&gt;neelabhrai.php&lt;/a&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;2)&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://bit.ly/csasinkeynote&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://bit.ly/csasinkeynote&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&amp;nbsp;(redirected to SMi UK Website)&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;3)&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.cybercops.in/about.php&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://www.cybercops.in/about.&lt;wbr&gt;&lt;/wbr&gt;php&lt;/a&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;4)&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://masterofearth.info/aboutme.html&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://masterofearth.info/&lt;wbr&gt;&lt;/wbr&gt;aboutme.html&lt;/a&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;5)&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://twitter.com/cybercopsindia&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;https://twitter.com/&lt;wbr&gt;&lt;/wbr&gt;cybercopsindia&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&amp;nbsp;(Twitter ID)&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;6)&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://in.linkedin.com/in/neelabhrai&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://in.linkedin.com/in/&lt;wbr&gt;&lt;/wbr&gt;neelabhrai&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&amp;nbsp;(LinkedIn Professional Profile)&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;7)&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.cybercops.in/news.php&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://www.cybercops.in/news.&lt;wbr&gt;&lt;/wbr&gt;php&lt;/a&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;8)&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://cybercopsindia.blogspot.com/&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://cybercopsindia.&lt;wbr&gt;&lt;/wbr&gt;blogspot.com/&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&amp;nbsp;(Corporate Blog)&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;9)&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.aerospace19.com/profile-382&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://www.aerospace19.com/&lt;wbr&gt;&lt;/wbr&gt;profile-382&lt;/a&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;10)&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.asclonline.com/blog/2009/09/01/student-of-the-month-september-2009/&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://www.asclonline.com/&lt;wbr&gt;&lt;/wbr&gt;blog/2009/09/01/student-of-&lt;wbr&gt;&lt;/wbr&gt;the-month-september-2009/&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&amp;nbsp;(Asian School of Cyber Laws, Pune awarded Student of the Month award and published some hidden information w.r.t. me)&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;11)&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://en.gravatar.com/cybercopsin&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://en.gravatar.com/&lt;wbr&gt;&lt;/wbr&gt;cybercopsin&lt;/a&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;12)&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://bit.ly/csasin10112011&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://bit.ly/csasin10112011&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&amp;nbsp;(See the time slot of 09.50 and 11.00 ; Neelabh Rai is invited to speak and present his innovative ideas in Singapore this November, 2011)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;Since I am an &#39;Independent&#39; Cyber Security Researcher who is working only on Indian Cyberspace, your this very survey will help me in providing the best solution for securing our economic future.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;At last, kindly help me by forwarding this very survey to all your friends, colleagues, relatives, family members... The link is:&amp;nbsp;&lt;a href=&quot;http://bit.ly/cybercopsindia-survey1&quot;&gt;http://bit.ly/cybercopsindia-survey1&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222;&quot;&gt;If any queries, feel free to connect with me @&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.cybercops.in/contactme.php&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://www.cybercops.in/&lt;wbr&gt;&lt;/wbr&gt;contactme.php&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444;&quot;&gt;PS: Please do not change the subject line when sending any email to me. Keep the subject as &quot;Faith / Trust / Confidence of Public on Indian Police&quot;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #cc0000;&quot;&gt;&lt;i&gt;Thanks in advance for your time and efforts in making this survey have a more clear picture!&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.websurveymaster.com/s/cybercopsindia-survey1&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue; font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;Click Here to take Survey&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2011/09/research-survey-on-faith-trust.html</link><author>noreply@blogger.com (neelabhrai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnOVD2DazasCdmctnkKKyH-Wz5FaFuJcrF-Gj4TEokyZyBLswsJSwCjmoKCWJa75fjuaF5PR9wzX9iuAtKQSLzFtqa5mpAy2Z_PPwCziBoeLRMQim7Er2Bx96LPa6-uPfbKY6WKm7EyUQX/s72-c/cybercopsindia-official-email-id.JPG" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-8358302670605771082</guid><pubDate>Sat, 24 Sep 2011 13:21:00 +0000</pubDate><atom:updated>2011-09-25T00:58:02.036+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">CIP</category><category domain="http://www.blogger.com/atom/ns#">critical infrastructure</category><category domain="http://www.blogger.com/atom/ns#">cyber sabotage</category><category domain="http://www.blogger.com/atom/ns#">HMI</category><category domain="http://www.blogger.com/atom/ns#">Industrial Systems</category><category domain="http://www.blogger.com/atom/ns#">PLC</category><category domain="http://www.blogger.com/atom/ns#">SCADA</category><category domain="http://www.blogger.com/atom/ns#">stuxnet</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><title>More SCADA Vulnerabilities Discovered by Italian Researcher Luigi Auriemma in Industrial Systems - A Brief Overview</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #111111; font-family: &amp;#39;Lucida Grande&amp;#39;, Arial, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #111111;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: black; font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;span lang=&quot;EN-IN&quot; style=&quot;font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #111111;&quot;&gt;SCADA vulnerabilities continue to surge as Italian Security Researcher &lt;/span&gt;&lt;b&gt;&lt;a href=&quot;http://aluigi.altervista.org/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;Luigi Auriemma&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #111111;&quot;&gt; found holes in six different systems. Companies suffering the vulnerabilities range from &lt;/span&gt;&lt;a href=&quot;http://www.rockwellautomation.com/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;Rockwell Automation&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #111111;&quot;&gt; to &lt;/span&gt;&lt;a href=&quot;http://www.beckhoff.com/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;Beckhoff&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #111111;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;span lang=&quot;EN-IN&quot; style=&quot;font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #111111;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;span lang=&quot;EN-IN&quot; style=&quot;font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #111111;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvdIlw8rrDq124w0UsG7CfiWQRAniEQbmtnPv-F8MaSTV00DuP8ITuU0KCtWshTnf3IHY0TywcCQTCJlS-0HKuYDQ0q2l6q3VnmQNxbtYljVJdAW6zLh3_vG3dCDJBWZVCIkhtY5KCTB6f/s1600/SCADA.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;145&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvdIlw8rrDq124w0UsG7CfiWQRAniEQbmtnPv-F8MaSTV00DuP8ITuU0KCtWshTnf3IHY0TywcCQTCJlS-0HKuYDQ0q2l6q3VnmQNxbtYljVJdAW6zLh3_vG3dCDJBWZVCIkhtY5KCTB6f/s200/SCADA.gif&quot; width=&quot;200&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;span lang=&quot;EN-IN&quot; style=&quot;font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #111111;&quot;&gt;The vulnerabilities found in such companies&amp;#39; products include:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;br&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://cybercopsindia.blogspot.com/2011/09/more-scada-vulnerabilities-discovered.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2011/09/more-scada-vulnerabilities-discovered.html</link><author>noreply@blogger.com (neelabhrai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvdIlw8rrDq124w0UsG7CfiWQRAniEQbmtnPv-F8MaSTV00DuP8ITuU0KCtWshTnf3IHY0TywcCQTCJlS-0HKuYDQ0q2l6q3VnmQNxbtYljVJdAW6zLh3_vG3dCDJBWZVCIkhtY5KCTB6f/s72-c/SCADA.gif" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-315203712619446033</guid><pubDate>Wed, 21 Sep 2011 16:00:00 +0000</pubDate><atom:updated>2011-09-24T20:06:41.416+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">sony</category><category domain="http://www.blogger.com/atom/ns#">website hacked</category><category domain="http://www.blogger.com/atom/ns#">wipro</category><title>WIPRO Limited&#39;s Consumer Care and Lighting business division, North-West Switches hacked by a Pakistan-based Hacker Group &quot;HITCHER&quot;</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif; font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &amp;#39;Times New Roman&amp;#39;; font-size: small;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;Cyber Crime is growing at an alarming rate. And unfortunately, the security experts aren&amp;#39;t able to match their speeds! Due to this, every now and then there is a news of cyber crime viz. advanced persistent threat, SCADA vulnerability found, ICS under threat, website hacked, phishing reported, XSS injection flaw discovered, identity theft, database hacked, stuxnet etc. Nowadays, there are more number of cases of the hacking of websites especially the corporate sectors. &lt;/span&gt;In technical terms, hacking of website isn&amp;#39;t a big deal. But if the market scenario is considered and especially when it is serving the customers, then it is indeed a big deal!!&lt;br&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;http://cybercopsindia.blogspot.com/2011/09/wipro-limiteds-consumer-care-and.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2011/09/wipro-limiteds-consumer-care-and.html</link><author>noreply@blogger.com (neelabhrai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP57_FBpHnXwbhnqDtGEicdNIYCO6CHGaXj0cFlP5RXnkPzi1NAKUJak1il7M_3WsNDvwHnOF840mQ73VRw_0shitaFQNgPZwKaMV9-y2eCKyrzMAGRZXYNRf74vDF03HrGv-Pos3C8NUf/s72-c/Wipro+Hacked+Image.bmp" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-8735048083640515009</guid><pubDate>Fri, 09 Sep 2011 21:04:00 +0000</pubDate><atom:updated>2011-09-10T07:15:54.682+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">SMS service</category><title>FREE SMS-based Services launched by CYBER COPS India for Spreading Cyber Security Awareness for Indians</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-text-size-adjust: none; background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 15px;&quot;&gt;CYBER COPS India will like to make the common man secure from getting ransacked electronically. For this reason, CYBER COPS India had initiated&lt;b&gt; SMS-based Service &lt;/b&gt;for the registered members so that the basic Cyber Security Tips can be floated directly on the mobile phone of the subscribers. Currently this service is available only in India.&lt;br /&gt;&lt;br /&gt;To subscribe for SMS services of CYBER COPS India via web, click here:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;a href=&quot;http://labs.google.co.in/smschannels/subscribe/cybercopsindia&quot; rel=&quot;nofollow&quot; style=&quot;-webkit-text-size-adjust: none; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;http://labs.google.co.in/smschannels/subscribe/cybercopsindia&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Or, to subscribe using your mobile phone, kindly send an SMS having the following message:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;ON cybercopsindia&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;and send it to&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;9870807070&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-text-size-adjust: none; background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 15px;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-text-size-adjust: none; background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 15px;&quot;&gt;&lt;b&gt;More information about SMS-based service:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-text-size-adjust: none; background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-text-size-adjust: none; background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-text-size-adjust: auto; font-family: arial, sans-serif; font-size: 13px; line-height: normal;&quot;&gt;It is a&amp;nbsp;&lt;a href=&quot;https://www.google.com/accounts/Login?continue=http://labs.google.co.in/smschannels&quot; style=&quot;color: #0000cc; font-family: arial, sans-serif;&quot;&gt;Google SMS Channels&lt;/a&gt;&amp;nbsp;service that enables channels/groups provide services on SMS. It&#39;s a free service that enables the subscriber to get premium content published by Google publishing partners, Google popular products (Google News, Blogger and Google Groups) and websites with RSS/Atom support for free.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 14px;&quot;&gt;This service is currently available to users in India and requires an Indian mobile number.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 14px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 14px;&quot;&gt;Its&#39; a free service, hence not even a single penny is required to spend for receiving SMS services. Generally to receive such SMSs from Mobile Service Providers, they charge monthly fees as well as subscription fees on a per SMS basis. To alter this and provide premium features, CYBER COPS India planned to initiate the SMS-based services for those who possesses Indian Mobile Numbers.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 14px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 14px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;If one do not wish to receive SMS then send one of the following commands &#39;&lt;b&gt;dndon&lt;/b&gt;&#39; OR &#39;&lt;b&gt;donotdisturb&lt;/b&gt;&#39; OR &#39;&lt;b&gt;nodisturb&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: arial, sans-serif; font-size: 14px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&#39; to 9870807070.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
If you want to start receiving SMS and had previously set the DND on, then send a SMS with &#39;&lt;b&gt;dndoff&lt;/b&gt;&#39; to 9870807070.&lt;br /&gt;
&lt;br /&gt;
Additionally, CYBER COPS India had also enabled the feature of sending SMS from your own mobile phone or via website to us. However, the comment moderation is switched ON before getting it posted and served to the subscribers. Hence, if someone post messages via his/her Mobile Phone, neither the subscribers nor the owner of the channel will ever be able to view your mobile number. All mobile number are treated with the highest confidentiality and are not displayed to anyone. To read more about confidentiality, kindly see here:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.google.com/mobile/privacy.html&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;http://www.google.com/mobile/privacy.html&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
If any subscriber is encountering any more questions regarding the services, then kindly feel free to read this FAQ (Frequently Asked Questions) from here:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://labs.google.co.in/smschannels/help&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;http://labs.google.co.in/smschannels/help&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Still having any queries or doubts, then feel free to contact me here:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.cybercops.in/contactme.php&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;http://www.cybercops.in/contactme.php&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
CYBER COPS India will be glad to help the subscribers/users.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2011/09/cyber-cops-india-launches-free-sms.html</link><author>noreply@blogger.com (neelabhrai)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-4017396583236468493</guid><pubDate>Fri, 09 Sep 2011 15:34:00 +0000</pubDate><atom:updated>2011-09-09T22:53:35.720+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">critical infrastructure</category><category domain="http://www.blogger.com/atom/ns#">cyber sabotage</category><category domain="http://www.blogger.com/atom/ns#">cyber terrorism</category><category domain="http://www.blogger.com/atom/ns#">patent</category><category domain="http://www.blogger.com/atom/ns#">protection</category><category domain="http://www.blogger.com/atom/ns#">validy technology</category><title>Validy Technology: A program protection method that really works</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Validy Technology (VT) is a program protection method.&lt;/b&gt; It uses a&amp;nbsp;secure coprocessor and manipulates variables mandatory for the&amp;nbsp;correct execution of the program inside this coprocessor.&lt;br /&gt;&lt;br /&gt;The secure coprocessor uses a silicon chip which can take several&amp;nbsp;different form factors:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;USB key,&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;SIM Module,&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;MMC Card,&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;Smart&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;card,&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;SMD device...&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;&lt;b&gt;VT is effective against software piracy as well as against&amp;nbsp;software and data tampering&lt;/b&gt;: it not only &lt;b&gt;prevents illicit&amp;nbsp;program execution &lt;/b&gt;but can &lt;b&gt;also ensure that program execution&amp;nbsp;is not altered and that program data is not copied or modified,&amp;nbsp;even when execution is taking place in an hostile environment&lt;/b&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;VT is based on a &quot;subtractive&quot; protection method&lt;/b&gt;, hiding&amp;nbsp;&quot;critical portions&quot; of the program in the coprocessor, but&lt;b&gt;&amp;nbsp;instead of securely executing &quot;Remote Procedure Calls&quot;, it&amp;nbsp;secures part of the program state&lt;/b&gt;. In other words, it permanently&amp;nbsp;keeps some of the program variables into the coprocessor and&amp;nbsp;during execution of the program the values of the variables&amp;nbsp;residing into the coprocessor are modified. &lt;b&gt;VT ensures secure&amp;nbsp;execution of the modifications by sending encrypted instructions&amp;nbsp;to the coprocessor (instructions are encrypted at compilation time).&amp;nbsp;&lt;/b&gt;Only when absolutely necessary, the value of one of the variables&amp;nbsp;residing inside the coprocessor, or even better, information&amp;nbsp;derived from one or several of those variables, is transmitted&amp;nbsp;back to the main part of the program. VT security is based on the&amp;nbsp;extreme difficulty for an attacker to regenerate correct values&amp;nbsp;during those transmissions.&lt;br /&gt;&lt;br /&gt;For added security, the coprocessor continuously monitors the&amp;nbsp;instruction flow conformance to what was planned at program&amp;nbsp;compile time. To this means, the coprocessor architecture and&lt;br /&gt;instruction set are designed with the addition of special fields&amp;nbsp;allowing automatic real-time monitoring of the chaining of the&amp;nbsp;instructions.&amp;nbsp;&lt;b&gt;This security mechanism is simple to implement yet extremely&amp;nbsp;powerful. If the coprocessor detects an anomaly, it can take&lt;br /&gt;retaliation measures forcing the program to stop: if the&amp;nbsp;coprocessor stops working, part of the program state is suddenly&amp;nbsp;missing and the program cannot continue working.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;With the execution of a few coprocessor &quot;XOR&quot; instructions or&amp;nbsp;with the execution of a specially designed coprocessor&amp;nbsp;&quot;MutualCheck&quot; instruction, this security mechanism is simply&amp;nbsp;extended to mutually protect several different computations&amp;nbsp;executed inside the coprocessor i.e. &lt;i&gt;if one computation is&amp;nbsp;modified or suppressed, another-one will fail.&amp;nbsp;&lt;/i&gt;Mutual protection, in turn, greatly enhance VT protection&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;abilities:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;Mutual protection prevents an attacker to use a &quot;divide and&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;conquer&quot; approach to gradually remove protections.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;Mutual protection allows the coprocessor to verify program&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;integrity during execution by executing integrity checks that&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;cannot be removed. One very effective such check is to verify&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;that the calling graph of the program is not modified.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;Mutual protection allows a background thread to protect real time&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;threads.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;Mutual protection allows protected programs to mutually protect&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;the others. For instance, to attack a client program, one must&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;also attack the server program.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;Mutual protection allows data protection by permitting effective&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;generation/check of data authentication information or by&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white;&quot;&gt;permitting effective encryption/decryption of data.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;VT rests on well-known computer science principles. &lt;b&gt;Its&amp;nbsp;implementation doesn&#39;t present major stumbling blocks and doesn&#39;t&amp;nbsp;require secret know-how. VT doesn&#39;t require a secure machine to&amp;nbsp;execute but just a secure coprocessor. It can work with any&amp;nbsp;operating system or even with embedded systems.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;i&gt;Protection of a program must be done by the software publisher&amp;nbsp;creating or maintaining the program. &lt;/i&gt;&lt;/b&gt;During the protection of a&amp;nbsp;program, &lt;b&gt;most of the protection work is automatic&lt;/b&gt; because moving&amp;nbsp;variables to the coprocessor and modifying them here is a&amp;nbsp;classical compilation problem similar to the use of an arithmetic&amp;nbsp;coprocessor. Also most of the program integrity&amp;nbsp;verification&amp;nbsp;(for instance verifying the chaining of the instructions&amp;nbsp;&amp;nbsp;or&amp;nbsp;protecting the calling graph) can be automated with a compiler.&lt;br /&gt;&lt;br /&gt;Several manufacturers already build secure microcontrollers that&amp;nbsp;can be used for VT. Those components are generally designed for&amp;nbsp;&lt;i&gt;&lt;b&gt;banking cards applications&lt;/b&gt;&lt;/i&gt;; they &lt;b&gt;&lt;i&gt;have a low price tag and a high&amp;nbsp;security level&lt;/i&gt;&lt;/b&gt;. With an appropriate program runtime and&amp;nbsp;microcontroller firmware, the microcontroller can be seen by the&amp;nbsp;program as a &quot;loosely coupled&quot; coprocessor, plugged for instance&amp;nbsp;on the USB bus, without requiring any hardware change to the&amp;nbsp;machine.&lt;br /&gt;&lt;br /&gt;Despite the lose coupling between the main processor and the&amp;nbsp;coprocessor, the execution inside the coprocessor takes place&amp;nbsp;concurrently with the execution of the main part of the program&lt;br /&gt;and the program slowdown is minimal.&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #990000;&quot;&gt;We have gone all the path from inventing the concepts, protecting&amp;nbsp;the intellectual property, implementing a USB coprocessor and the&amp;nbsp;associated runtime for Windows, implementing two compilers (one for&lt;b&gt;&amp;nbsp;Java&lt;/b&gt; and one for&lt;b&gt; .NET&lt;/b&gt;) to finally demonstrating that protected&amp;nbsp;programs are running with acceptable performance.&lt;/span&gt; &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;We now intend&amp;nbsp;to grant licenses to interested parties.&lt;/span&gt;&lt;/b&gt; If anyone is interested in the Validy Technology, then feel free to contact. CYBER COPS India will be happy to provide expert services with the original inventors and the patent holders - &lt;b&gt;&lt;a href=&quot;http://www.validy.com/&quot; target=&quot;_blank&quot;&gt;Validy Net Inc.&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2011/09/validy-technology-program-protection.html</link><author>noreply@blogger.com (neelabhrai)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-3905890508711156252</guid><pubDate>Mon, 01 Aug 2011 07:39:00 +0000</pubDate><atom:updated>2011-08-01T17:16:26.327+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">botnet</category><category domain="http://www.blogger.com/atom/ns#">chart</category><category domain="http://www.blogger.com/atom/ns#">map</category><category domain="http://www.blogger.com/atom/ns#">messagelabs intelligence</category><category domain="http://www.blogger.com/atom/ns#">symantec</category><title>Global Botnet Activity / Infection Map for later 2010</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Botnet is a network of private computers infected with malicious software and controlled as a group without the owners&#39; knowledge, e.g. to send spam messages or to carry out Distributed Denial of Service (DDoS) attacks.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;According to &lt;a href=&quot;http://www.digitalactivist.net/&quot;&gt;Digital Activism&lt;/a&gt;, a&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 21px;&quot;&gt;&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;botnet&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 21px;&quot;&gt;&amp;nbsp;is a&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 21px;&quot;&gt;network of automated software controlled and manipulated by a third party, that is, neither the owner of the machine running the bot nor the target of the attack. A botnet can refer to a legitimate group of computers that share program processing. However, the term generally refers to computers running malicious software that was downloaded without the consent of the computer’s owner and is used to make attacks against other systems.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 21px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 21px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Botnet &lt;/span&gt;=&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt; &lt;/span&gt;Ro&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;bot + Net&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 21px;&quot;&gt;&lt;b&gt;work&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Arial, Helvetica, sans-serif; line-height: 17px;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Arial, Helvetica, sans-serif; line-height: 17px;&quot;&gt;&lt;b&gt;&lt;i&gt;Symantec&#39;s MessageLabs Intelligence&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Arial, Helvetica, sans-serif; line-height: 17px;&quot;&gt; (MLI) regularly reviews global botnet activity to identify and characterize the top spam-sending botnets. As part of this analysis MLI also collect the IP addresses of computers under the control of each botnet as they are used to send spam. Using all available data, MLI had plotted the geographical locations of these individual bots that make up the major botnets.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; line-height: 17px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; line-height: 17px;&quot;&gt;This map shows these locations, aggregated to within one degree latitude by one degree longitude grid; the &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 17px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;darker red the dot indicates that more bots are active from that location&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; line-height: 17px;&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Arial, Helvetica, sans-serif; line-height: 17px;&quot;&gt;The top locations are identified as follows:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; line-height: 17px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;a &lt;b&gt;black outline&lt;/b&gt; indicates the locations of the top 10 most active bots;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; line-height: 17px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;a &lt;b&gt;gold outline&lt;/b&gt; indicates locations where the top 11-50 most active bots are found.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; line-height: 17px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The percentage of spam sent from each group is also highlighted on the chart.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;object height=&quot;400&quot; width=&quot;650&quot;&gt; &lt;param name=&quot;movie&quot; value=&quot;http://www.cybercops.in/images/flash/Botnetmap_later_2010.swf&quot;&gt;&lt;/object&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #999999; font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Reference: Symantec Cloud&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #999999; font-family: &#39;Trebuchet MS&#39;, sans-serif; font-size: x-small;&quot;&gt;URL:&amp;nbsp;&lt;a href=&quot;http://www.symanteccloud.com/globalthreats&quot; target=&quot;_blank&quot;&gt;http://www.symanteccloud.com/globalthreats&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2011/08/global-botnet-activity-infection-map.html</link><author>noreply@blogger.com (neelabhrai)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-4725373970193023930</guid><pubDate>Mon, 01 Aug 2011 06:52:00 +0000</pubDate><atom:updated>2011-08-01T17:29:34.247+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">CIP</category><category domain="http://www.blogger.com/atom/ns#">critical infrastructure</category><category domain="http://www.blogger.com/atom/ns#">cyber sabotage</category><category domain="http://www.blogger.com/atom/ns#">cyber terrorism</category><category domain="http://www.blogger.com/atom/ns#">cyber war</category><category domain="http://www.blogger.com/atom/ns#">iran</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">natanz</category><category domain="http://www.blogger.com/atom/ns#">nuclear reactor</category><category domain="http://www.blogger.com/atom/ns#">protection</category><category domain="http://www.blogger.com/atom/ns#">stuxnet</category><title>The Journey of Stuxnet - The Cyber Missile for Cyber Sabotage of Critical Infrastructure</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Stuxnet&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt; is a computer worm discovered in July 2010. It targets Siemens industrial software and equipment running on Microsoft Windows. While it is not the first time that crackers have targeted industrial systems, it is the first discovered malware that spies on and subverts industrial systems, and the first to include a programmable logic controller (PLC) rootkit.&lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;http://cybercopsindia.blogspot.com/2011/08/journey-of-stuxnet-cyber-missile-for.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2011/08/journey-of-stuxnet-cyber-missile-for.html</link><author>noreply@blogger.com (neelabhrai)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-4135947372373182930</guid><pubDate>Fri, 29 Jul 2011 17:10:00 +0000</pubDate><atom:updated>2011-07-30T23:03:44.689+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">bluecoat</category><category domain="http://www.blogger.com/atom/ns#">botnet</category><category domain="http://www.blogger.com/atom/ns#">Chris Larsen</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">network</category><category domain="http://www.blogger.com/atom/ns#">top 10</category><title>A Deeper Look at Malware Networks</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Malware and malicious software have been around for years. &lt;b&gt;&lt;i&gt;Malware Networks&lt;/i&gt;&lt;/b&gt; don’t traditionally come with names, as one might expect, but the security industry has now been tracking the biggest malware offenders for long enough that they’ve been able to identify trends. Traditionally, malware has been identified by particular attacks (and named accordingly), but the reality, is that some networks have grown so large that they have their hands in many different scams at once.&amp;nbsp;And they need names, because these networks are fast, and they’re slippery. The average number of unique host names per day for the top 10 malware delivery networks is 4,107, and an average of over 40,000 users make unwitting requests to malware networks each day.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Read on to get an idea of some of the size, shape and growing threat of larger Malware networks, their points of entry and a list of prevention techniques.&amp;nbsp;This is created by Blue Coat&#39;s Senior malware researcher Chris Larsen has pulled data from the company&#39;s Mid-Year Security Report, 2011.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfRXwhH-ujSL7zLjzUlz8Iv4B4ZN59P4yOv-1Lz6_J17MTdLyXp-OFVsi-jnmfyNea9x25b5A-qAxBMv8yOTR9b5jeXpD2R5MOKTdUYiHJrIr8Te9DjuzC4AHAtKTLHNYpEXKpe4dAF6bj/s1600/bluecoat-malware_-networks.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfRXwhH-ujSL7zLjzUlz8Iv4B4ZN59P4yOv-1Lz6_J17MTdLyXp-OFVsi-jnmfyNea9x25b5A-qAxBMv8yOTR9b5jeXpD2R5MOKTdUYiHJrIr8Te9DjuzC4AHAtKTLHNYpEXKpe4dAF6bj/s1600/bluecoat-malware_-networks.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2011/07/malware-networks.html</link><author>noreply@blogger.com (neelabhrai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfRXwhH-ujSL7zLjzUlz8Iv4B4ZN59P4yOv-1Lz6_J17MTdLyXp-OFVsi-jnmfyNea9x25b5A-qAxBMv8yOTR9b5jeXpD2R5MOKTdUYiHJrIr8Te9DjuzC4AHAtKTLHNYpEXKpe4dAF6bj/s72-c/bluecoat-malware_-networks.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-2846738162650755193</guid><pubDate>Tue, 29 Mar 2011 21:00:00 +0000</pubDate><atom:updated>2011-03-30T02:32:47.365+05:30</atom:updated><title>Researchers released new attack code for exploiting SCADA vulnerabilities</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTDmAO_Oo_iYQGGH87spFvfsYmGF7ZTrnHUv8y8zh3LcbYJSPnF3azOCZmyiWngxchwMCtOrN4CmPEtGbxU1PWw5Mtr_Qzj5VwITeT4rZrENwmD2YW9ozahiPApEO9CSBwEcUARz8e1aQQ/s1600/plant_fire.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;207&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTDmAO_Oo_iYQGGH87spFvfsYmGF7ZTrnHUv8y8zh3LcbYJSPnF3azOCZmyiWngxchwMCtOrN4CmPEtGbxU1PWw5Mtr_Qzj5VwITeT4rZrENwmD2YW9ozahiPApEO9CSBwEcUARz8e1aQQ/s320/plant_fire.jpg&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;The security of software used to control hardware at nuclear plants, gas refineries and other industrial settings is coming under renewed scrutiny as researchers released attack code exploiting dozens of serious vulnerabilities in widely used programs.&lt;br /&gt;
&lt;br /&gt;
The flaws, which reside in programs sold by &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Siemens&lt;/span&gt;, &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Iconics&lt;/span&gt;, &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;7-Technologies&lt;/span&gt;, &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Datac&lt;/span&gt;, and &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Control Microsystems&lt;/span&gt;, in many cases make it possible for attackers to remotely execute code when the so-called supervisory control and data acquisition software is installed on machines connected to the internet. Attack code was released by researchers from two separate security camps over the past week.&lt;br /&gt;
&lt;br /&gt;
“SCADA is a critical field but nobody really cares about it,” Luigi Auriemma, one of the researchers, wrote in an email sent to The Register. “That&#39;s also the reason why I have preferred to release these vulnerabilities under the full-disclosure philosophy.”&lt;br /&gt;
&lt;br /&gt;
The vulnerability dump includes proof-of-concept code for at least &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;34 vulnerabilities in widely used SCADA programs sold by four different vendors&lt;/span&gt;&lt;/b&gt;. Auriemma said the &lt;b&gt;majority of the bugs allow code execution&lt;/b&gt;, while others &lt;b&gt;allow attackers to access sensitive data stored in configuration files&lt;/b&gt; and one makes it &lt;b&gt;possible to disrupt equipment that uses the software&lt;/b&gt;. He included a complete rundown of the vulnerabilities and their corresponding PoC code in a post published on Monday to the Bugtraq mail list:&amp;nbsp;&lt;a href=&quot;http://seclists.org/bugtraq/2011/Mar/187&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;http://seclists.org/bugtraq/2011/Mar/187&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
It came six days after a Moscow-based security firm called Gleg announced the availability of Agora SCADA+, which attempts to collect virtually all known SCADA vulnerabilities into a single exploit pack:&amp;nbsp;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;&lt;a href=&quot;http://gleg.net/agora_scada.shtml&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://gleg.net/agora_scada.shtml&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
The 22 modules include exploits for 11 zero-day vulnerabilities, said the company&#39;s Yuriy Gurkin in an email. It&#39;s not clear how much the package costs.&lt;br /&gt;
&lt;br /&gt;
Gurkin said Gleg&#39;s website has come under sustained web attacks shortly after releasing the SCADA exploit pack:&amp;nbsp;&lt;a href=&quot;http://gleg.net/&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;http://gleg.net/&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
“We have tried to switch to ddoshostingsolutions.com provider but in just 3 days were out of 500 GB traffic limit,” he said. “Currently trying to solve this.”&lt;br /&gt;
&lt;br /&gt;
The vulnerability of SCADA systems had long been theorized, but it wasn&#39;t until last year that the world got an object lesson on just how susceptible they could be to attack.&amp;nbsp;&lt;b&gt;In July, researchers reported the discovery of a computer worm that attacked SCADA software sold by Siemens&lt;/b&gt;:&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue; text-decoration: none;&quot;&gt;&lt;a href=&quot;http://scforum.info/index.php/topic,4365.0.html&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://scforum.info/index.php/topic,4365.0.html&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;a href=&quot;http://scforum.info/index.php/topic,4365.0.html&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
Research later showed that the underlying Stuxnet exploit amounted to a “search-and-destroy weapon” built to take out Iran&#39;s Bushehr nuclear reactor.&lt;br /&gt;
&lt;br /&gt;
SCADA software often runs on extremely old systems that are difficult to replace without causing disruptions to critical equipment. As a result, installing patches and upgrades is frequently avoided despite the obvious security benefits.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;To view all the SCADA Vulnerabilities, click here:&amp;nbsp;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;&lt;a href=&quot;http://aluigi.org/adv.htm&quot;&gt;http://aluigi.org/adv.htm&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #999999; font-family: Verdana, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;Ref:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://scforum.info/index.php/topic,5772.0.html&quot;&gt;http://scforum.info/index.php/topic,5772.0.html&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2011/03/researchers-released-new-attack-code.html</link><author>noreply@blogger.com (neelabhrai)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTDmAO_Oo_iYQGGH87spFvfsYmGF7ZTrnHUv8y8zh3LcbYJSPnF3azOCZmyiWngxchwMCtOrN4CmPEtGbxU1PWw5Mtr_Qzj5VwITeT4rZrENwmD2YW9ozahiPApEO9CSBwEcUARz8e1aQQ/s72-c/plant_fire.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-3309015643796041115</guid><pubDate>Mon, 21 Mar 2011 08:27:00 +0000</pubDate><atom:updated>2011-03-21T13:57:39.482+05:30</atom:updated><title>Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Everything has been said on the Stuxnet worm?&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444;&quot;&gt; Not quite.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Someday a “James Bond” or “Mission impossible” film &lt;br /&gt;
might be based on this case.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Should we stop here? &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #20124d;&quot;&gt;Clearly not!&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Such an attack asks numerous questions and must challenge certitudes.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;We might have to rethink our security paradigms.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;Report compiled by &lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #444444;&quot;&gt;Dominique Ciupa&lt;/span&gt;&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: purple;&quot;&gt;Validy: a Paradigm Switch to Ensure Code Integrity&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
During the Forum International de la Cybercriminalité,&amp;nbsp;late march 2010, Mag Securs met with Validy. We already knew this company and had looked at their technology in 2005.&amp;nbsp;Our discussions in May and June have touched&amp;nbsp;on the possibility of ensuring executable&amp;nbsp;code integrity.&lt;br /&gt;
&lt;div id=&quot;__ss_7314687&quot; style=&quot;width: 477px;&quot;&gt;&lt;strong style=&quot;display: block; margin: 12px 0 4px;&quot;&gt;&lt;a href=&quot;http://www.slideshare.net/neelabh12/magsecurs-no29-2011-validy-learning-from-the-stuxnet-case&quot; title=&quot;Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case&quot;&gt;Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case&lt;/a&gt;&lt;/strong&gt; &lt;object height=&quot;510&quot; id=&quot;__sse7314687&quot; width=&quot;477&quot;&gt; &lt;param name=&quot;movie&quot; value=&quot;http://static.slidesharecdn.com/swf/doc_player.swf?doc=magsecurs2011nb29validystuxnetcase-13005298879877-phpapp02&amp;stripped_title=magsecurs-no29-2011-validy-learning-from-the-stuxnet-case&amp;userName=neelabh12&quot; /&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;/&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;/&gt;&lt;embed name=&quot;__sse7314687&quot; src=&quot;http://static.slidesharecdn.com/swf/doc_player.swf?doc=magsecurs2011nb29validystuxnetcase-13005298879877-phpapp02&amp;stripped_title=magsecurs-no29-2011-validy-learning-from-the-stuxnet-case&amp;userName=neelabh12&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;477&quot; height=&quot;510&quot;&gt;&lt;/embed&gt; &lt;/object&gt; &lt;br /&gt;
&lt;div style=&quot;padding: 5px 0 12px;&quot;&gt;Uploaded by&amp;nbsp;&lt;a href=&quot;http://www.slideshare.net/neelabh12&quot;&gt;Neelabh Rai&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
PS:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;In Validy Technology, Verification is part of the system - a self signature without a certification authority.&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2011/03/mag-securs-no29-2011-validy-learning.html</link><author>noreply@blogger.com (neelabhrai)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-4655986105485390222</guid><pubDate>Mon, 14 Mar 2011 02:41:00 +0000</pubDate><atom:updated>2011-08-01T17:48:17.018+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">car hacking</category><category domain="http://www.blogger.com/atom/ns#">cyber sabotage</category><category domain="http://www.blogger.com/atom/ns#">patent</category><category domain="http://www.blogger.com/atom/ns#">validy technology</category><title>Could the computer in your car be hacked?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &amp;#39;Lucida Grande&amp;#39;, Verdana, Arial, sans-serif; font-size: 13px; line-height: 15px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #111111;&quot;&gt;As vehicles are increasingly computerized, researchers and industry officials consider it inevitable that cars will face the same vulnerabilities as PCs. Internal computer networks monitor and control everything from brakes, engines and transmissions to air bags and keyless-entry functions. Wireless connections, meanwhile, are becoming more common in reporting a vehicle&amp;#39;s position or providing information about the car&amp;#39;s functions. Some auto companies are creating applications to allow users to control some features in their car with their smart phone.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &amp;#39;Lucida Grande&amp;#39;, Verdana, Arial, sans-serif; font-size: 13px; line-height: 15px;&quot;&gt;&lt;br&gt;
&lt;/span&gt;&lt;br&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &amp;#39;Lucida Grande&amp;#39;, Verdana, Arial, sans-serif; font-size: 13px; line-height: 15px;&quot;&gt;On 10 March, 2011 there was a news update that &amp;quot;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Researchers had found that Cars can be hacked and remotely controlled&lt;/span&gt;&lt;/b&gt;&amp;quot;.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://cybercopsindia.blogspot.com/2011/03/could-computer-in-your-car-be-hacked.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2011/03/could-computer-in-your-car-be-hacked.html</link><author>noreply@blogger.com (neelabhrai)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8563782871693839345.post-7872526228048595828</guid><pubDate>Tue, 19 Aug 2008 13:58:00 +0000</pubDate><atom:updated>2008-09-06T09:31:35.829+05:30</atom:updated><title>News Collections</title><description>&lt;script type=&quot;text/javascript&quot; src=&quot;http://www.google.co.in/reader/ui/publisher-en.js&quot;&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot; src=&quot;http://www.google.co.in/reader/public/javascript/user/00532078278566015351/state/com.google/broadcast?n=10&amp;callback=GRC_p(%7Bc%3A%22khaki%22%2Ct%3A%22Master%20of%20Earth&#39;s%20shared%20items%22%2Cs%3A%22true%22%2Cb%3A%22false%22%7D)%3Bnew%20GRC&quot;&gt;&lt;/script&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;BR/&gt;&lt;BR/&gt;
--&lt;BR/&gt;
Neelabh Rai&lt;BR/&gt;
Independent Cyber Security Researcher&lt;BR/&gt;
CYBER COPS India&lt;BR/&gt;
&lt;A HREF=&quot;www.cybercops.in&quot; target=&quot;_blank&quot;&gt;www.cybercops.in&lt;/A&gt;&lt;BR/&gt;
&lt;I&gt;
&quot;Protect your software from Piracy, IT Systems from Sabotage by using &#39;patented&#39; Validy Technology&quot;&lt;/I&gt;&lt;/div&gt;</description><link>http://cybercopsindia.blogspot.com/2008/08/blog-post.html</link><author>noreply@blogger.com (neelabhrai)</author></item></channel></rss>