Skip to content
  • Events
  • Cyber Laws
  • Case Studies
  • Contact
  • Facebook
  • Twitter
  • Youtube
  • LinkedIn

Cyber Crime Awareness Society

Harbinger of war against cyber crime

Primary Menu
  • Cyber Crime News
  • Trending Frauds
  • Case Studies
  • Definitions
  • Tutorials
  • Laws
    • Cyber Laws
    • IPC
  • Events
Exclusive
Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala What is phishing? What is phishing? Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification. Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.
Cyber Crime News

Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala

By CCAS / January 22, 2022
Cyber Crime News

What is phishing?

By CCAS / January 10, 2022
Cyber Crime News

Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.

By CCAS / January 6, 2022
of
Cyber Crime News

Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala

By CCAS / January 22, 2022
Cyber Crime News

What is phishing?

By CCAS / January 10, 2022
Section 67A: Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form (Inserted Vide ITAA 2008)
Cyber Laws

Section 67A: Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form (Inserted Vide ITAA 2008)

Whoever publishes or transmits or causes to be published or transmitted in the electronic form

By CCAS / April 13, 2020
Section 67: Punishment for publishing or transmitting obscene material in electronic form (Amended Vide ITAA 2008)
Cyber Laws

Section 67: Punishment for publishing or transmitting obscene material in electronic form (Amended Vide ITAA 2008)

Whoever publishes or transmits or causes to be published in the electronic form, any material

By CCAS / April 13, 2020
Section 66F: Punishment for cyber terrorism
Cyber Laws

Section 66F: Punishment for cyber terrorism

Whoever,- With intent to threaten the unity, integrity, or security or sovereignty of India or

By CCAS / April 13, 2020
Section 66E: Punishment for violation of privacy. (Inserted Vide ITA 2008)
Cyber Laws

Section 66E: Punishment for violation of privacy. (Inserted Vide ITA 2008)

Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of

By CCAS / April 13, 2020
Section 66D: Punishment for cheating by personation by using computer resource (Inserted Vide ITA 2008):
Cyber Laws

Section 66D: Punishment for cheating by personation by using computer resource (Inserted Vide ITA 2008):

Whoever, by means of any communication device or computer resource cheats by personation, shall be

By CCAS / April 13, 2020
Section 66C: Punishment for identity theft. (Inserted Vide ITA 2008):
Cyber Laws

Section 66C: Punishment for identity theft. (Inserted Vide ITA 2008):

Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique

By CCAS / April 13, 2020
Section 66B: Punishment for dishonestly receives or retains any stolen computer resource or communication device (Inserted Vide ITA 2008)
Cyber Laws

Section 66B: Punishment for dishonestly receives or retains any stolen computer resource or communication device (Inserted Vide ITA 2008)

Whoever dishonestly receives or retain any stolen computer resource or communication device knowing or having

By CCAS / April 13, 2020
Section 66A: Punishment for sending offensive messages through communication service, etc. (Introduced vide ITAA 2008)
Cyber Laws

Section 66A: Punishment for sending offensive messages through communication service, etc. (Introduced vide ITAA 2008)

Any person who sends, by means of a computer resource or a communication device,- Any

By CCAS / April 13, 2020
Section 66: Computer related offences
Cyber Laws

Section 66: Computer related offences

If any person, dishonestly, or fraudulently, does any act referred to in section 43, he

By CCAS / April 13, 2020
Section 65: Tampering with computer source documents
Cyber Laws

Section 65: Tampering with computer source documents

Whoever knowingly or intentionally conceals, destroy or alters or intentionally or knowingly causes another to

By CCAS / April 13, 2020

Posts navigation

Older posts
Newer posts

Recent Posts

  • Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala
  • What is phishing?
  • Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.
  • Remote hacking is possible for Garrett walk-through metal detectors.
  • Code Signing Certificates are being used by new BLISTER malware to avoid detection.

Categories

  • Case Studies
  • Cyber Crime News
  • Cyber Laws
  • Definitions
  • IPC
  • Laws
  • Trending Frauds
  • Tutorials
  • Uncategorized

Categories

  • Case Studies (3)
  • Cyber Crime News (53)
  • Cyber Laws (37)
  • Definitions (17)
  • IPC (3)
  • Laws (9)
  • Trending Frauds (15)
  • Tutorials (20)
  • Uncategorized (1)
  • Popular
  • Latest
  • Trending
  • Definitions

    Cyber Defamation

    By CCAS / February 4, 2020
  • Cyber Crime News

    Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala

    By CCAS / January 22, 2022
  • Cyber Crime News

    British Charity Loses Over $1m in Domain Spoofing Scam

    By CCAS / February 3, 2020
  • Cyber Laws

    Laws for Cyber Defamation

    By CCAS / February 4, 2020
  • Cyber Crime News

    ALERT: ‘Martinelli’ hoax reappeared

    By CCAS / March 26, 2020
  • Cyber Crime News

    Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala

    By CCAS / January 22, 2022
  • Cyber Crime News

    What is phishing?

    By CCAS / January 10, 2022
  • Cyber Crime News

    Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.

    By CCAS / January 6, 2022
  • Cyber Crime News

    Remote hacking is possible for Garrett walk-through metal detectors.

    By CCAS / December 28, 2021
  • Cyber Crime News

    Code Signing Certificates are being used by new BLISTER malware to avoid detection.

    By CCAS / December 27, 2021

How to do sms bombing or spamming? How to secure ourselves from spamming?

https://www.youtube.com/watch?v=e6hYGGm5QG0&t=5s

How to create Whatsapp with fake numbers? How to track person using whatsapp with fake number?

https://www.youtube.com/watch?v=98wODnI1U04&t=14s

Categories Cloud

Case Studies (3) Cyber Crime News (53) Cyber Laws (37) Definitions (17) IPC (3) Laws (9) Trending Frauds (15) Tutorials (20) Uncategorized (1)

Direct links

  • Careers
  • Contact

Cyber Crime Awareness Society

Harbinger of war against cyber crime

  • Facebook
  • Twitter
  • Youtube
  • LinkedIn
Copyright © All rights reserved. | Designed by Avenging Security Pvt Ltd.