Skip to content
  • Events
  • Cyber Laws
  • Case Studies
  • Contact
  • Facebook
  • Twitter
  • Youtube
  • LinkedIn

Cyber Crime Awareness Society

Harbinger of war against cyber crime

Primary Menu
  • Cyber Crime News
  • Trending Frauds
  • Case Studies
  • Definitions
  • Tutorials
  • Laws
    • Cyber Laws
    • IPC
  • Events
Exclusive
Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala What is phishing? What is phishing? Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification. Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.
Cyber Crime News

Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala

By CCAS / January 22, 2022
Cyber Crime News

What is phishing?

By CCAS / January 10, 2022
Cyber Crime News

Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.

By CCAS / January 6, 2022
of
Cyber Crime News

Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala

By CCAS / January 22, 2022
Cyber Crime News

What is phishing?

By CCAS / January 10, 2022
Section 72A: Punishment for Disclose of information in breach of lawful contract (Inserted Vide ITAA-2008)
Cyber Laws

Section 72A: Punishment for Disclose of information in breach of lawful contract (Inserted Vide ITAA-2008)

Save as otherwise provided in this Act or any other law for the time being

By CCAS / April 13, 2020
Section 72: Breach of confidentiality and privacy
Cyber Laws

Section 72: Breach of confidentiality and privacy

Save as otherwise provided in this act or any other law for the time being

By CCAS / April 13, 2020
Section 70B: Indian computer Emergency Response Team to serve as national agency for incident response
Cyber Laws

Section 70B: Indian computer Emergency Response Team to serve as national agency for incident response

The Central Government shall, by notification in the official Gazette, appoint an agency of the

By CCAS / April 13, 2020
Section 70A: National nodal agency. (Inserted Vide ITAA 2008)
Cyber Laws

Section 70A: National nodal agency. (Inserted Vide ITAA 2008)

The central Government may, by notification published in the official Gazette, designate any organization of

By CCAS / April 13, 2020
Section 70: Protected system (Amended Vide ITAA-2008)
Cyber Laws

Section 70: Protected system (Amended Vide ITAA-2008)

The appropriate Government may by notification in the official Gazette, declare any computer resource which

By CCAS / April 13, 2020
Section 69B: Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber security
Cyber Laws

Section 69B: Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber security

The Central Government may, to enhance Cyber security and for identification, analysis and prevention of

By CCAS / April 13, 2020
Section 69A: Power to issue directions for blocking for public access of any information through any computer resource
Cyber Laws

Section 69A: Power to issue directions for blocking for public access of any information through any computer resource

Where the Central Government or any of its officer specially authorized by it in this

By CCAS / April 13, 2020
Section 69: Powers to issue directions for interception or monitoring or decryption of any information through any computer resource (Substituted Vide ITAA 2008):
Cyber Laws

Section 69: Powers to issue directions for interception or monitoring or decryption of any information through any computer resource (Substituted Vide ITAA 2008):

Where the central Government or a state Government or any of its officer specially authorized

By CCAS / April 13, 2020
Section 67C: Preservation and Retention of information by intermediaries
Cyber Laws

Section 67C: Preservation and Retention of information by intermediaries

Intermediary shall preserve and retain such information as may be specified for such duration and

By CCAS / April 13, 2020
Section 67B: Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form
Cyber Laws

Section 67B: Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form

Whoever,- Publishes or transmits or causes to be published or transmitted material in any electronic

By CCAS / April 13, 2020

Posts navigation

Older posts
Newer posts

Recent Posts

  • Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala
  • What is phishing?
  • Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.
  • Remote hacking is possible for Garrett walk-through metal detectors.
  • Code Signing Certificates are being used by new BLISTER malware to avoid detection.

Categories

  • Case Studies
  • Cyber Crime News
  • Cyber Laws
  • Definitions
  • IPC
  • Laws
  • Trending Frauds
  • Tutorials
  • Uncategorized

Categories

  • Case Studies (3)
  • Cyber Crime News (53)
  • Cyber Laws (37)
  • Definitions (17)
  • IPC (3)
  • Laws (9)
  • Trending Frauds (15)
  • Tutorials (20)
  • Uncategorized (1)
  • Popular
  • Latest
  • Trending
  • Definitions

    Cyber Defamation

    By CCAS / February 4, 2020
  • Cyber Crime News

    Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala

    By CCAS / January 22, 2022
  • Cyber Crime News

    British Charity Loses Over $1m in Domain Spoofing Scam

    By CCAS / February 3, 2020
  • Cyber Laws

    Laws for Cyber Defamation

    By CCAS / February 4, 2020
  • Cyber Crime News

    ALERT: ‘Martinelli’ hoax reappeared

    By CCAS / March 26, 2020
  • Cyber Crime News

    Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala

    By CCAS / January 22, 2022
  • Cyber Crime News

    What is phishing?

    By CCAS / January 10, 2022
  • Cyber Crime News

    Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.

    By CCAS / January 6, 2022
  • Cyber Crime News

    Remote hacking is possible for Garrett walk-through metal detectors.

    By CCAS / December 28, 2021
  • Cyber Crime News

    Code Signing Certificates are being used by new BLISTER malware to avoid detection.

    By CCAS / December 27, 2021

How to do sms bombing or spamming? How to secure ourselves from spamming?

https://www.youtube.com/watch?v=e6hYGGm5QG0&t=5s

How to create Whatsapp with fake numbers? How to track person using whatsapp with fake number?

https://www.youtube.com/watch?v=98wODnI1U04&t=14s

Categories Cloud

Case Studies (3) Cyber Crime News (53) Cyber Laws (37) Definitions (17) IPC (3) Laws (9) Trending Frauds (15) Tutorials (20) Uncategorized (1)

Direct links

  • Careers
  • Contact

Cyber Crime Awareness Society

Harbinger of war against cyber crime

  • Facebook
  • Twitter
  • Youtube
  • LinkedIn
Copyright © All rights reserved. | Designed by Avenging Security Pvt Ltd.