Sports betting have been popular throughout the world. Sports betting becomes an Internet gambling. Sports betting is a kind of wagering contract on a particular sport or team or player. It is nothing but predicting the results before the announcement. It can be on a sports person and it is also on a realistic events like election and reality shows and also on non athletic events like horse racing etc. Sports betting can be done legally or illegally. It can done through bookmaker legally and boo...

Read More

A man in the middle attack is a type of cyber stack where a malicious person inserts himself into a conversation between two parties and gain access to the information that two parties were trying to send to each other. MIM tries to send and receive the data without the knowledge of the victims .this type of attack exploits the secrecy between the victims who transfers the data to others. MIM involves himself as a proxy between the communication of two persons. the hacker tries to gain funds or ...

Read More

A Denial of Service attack is made to deny access to authorised users of a particular website or server or database. It is a made with a malicious intent by hackers in order to prevent access to the website ranging from few hours to days. A Denial of service attack is done by a hacker with one single system by exploiting the TCP/IP of the server. In a DoS attack the resources of the server are used up to such an extent that it crashes the whole server and prevents any authorised user from access...

Read More

Social Engineering is extracting the personal information by the users effort like creating a situation to them to give their personal information.  Social engineering is obtaining direct access to the particular website without hacking or breaking the security system. Social engineering is simply called Human hacking. It is like they can handle the people and they gain their trust and get their sensitive information from them. It cannot be hacked by any particular code. It just need a phon...

Read More

Plagiarists are those whose steal and pass off the creativity of others as their own creation where there has been copyright given to the particular site .there are different forms of plagiarism which are the potluck paper where the writer use different sources and compile them up to create a new article where only few sentences and paragraphs are changed, the photocopy is where some particular portion are taken exactly without making any alteration, the self-stealer isn’t a offence but th...

Read More

Cyber embezzlement is a theft of assets by a person who stands in the position of trust over that assets which mostly occurs in a corporate sector between a employer and employee. Accounting embezzlement is a common form of crime where the accounting records are hidden to hide the theft of money. If a person is given access to someone’s property or money for the purpose of managing, using the money into best use but then the trusted person frauds the money for his personal gain it is known...

Read More
Viewing 1 - 6 of 115 Articles

About Us

We speak the language of Technology & Internet. We understand how the law interacts with Technology & Internet. Cyber Crime Chambers is a boutique firm specializing in internet laws and digital forensic evidence.

image
Karthikeyan.N

B.A., B.L., (Hons) IPDP., (London)
Pgd IPR., Pgd Cyber Law., Msc., (IT)
CCI., CFA., IPCL.,
Advocate, Madras High Court

Karthikeyan, is a renowned cyber law expert, who is also the Managing Partner of Law Office of Karthikeyan, a reputed law firm based in Chennai.

More About Us

Popular Posts

Report

Report an Incident

Send us information about your case, we will respond to you promptly

SUBMIT ONLINE