A man in the middle attack is a type of cyber stack where a malicious person inserts himself into a conversation between two parties and gain access to the information that two parties were trying to send to each other. MIM tries to send and receive the data without the knowledge of the victims .this type of attack exploits the secrecy between the victims who transfers the data to others. MIM involves himself as a proxy between the communication of two persons. the hacker tries to gain funds or ...

Read More

A Denial of Service attack is made to deny access to authorised users of a particular website or server or database. It is a made with a malicious intent by hackers in order to prevent access to the website ranging from few hours to days. A Denial of service attack is done by a hacker with one single system by exploiting the TCP/IP of the server. In a DoS attack the resources of the server are used up to such an extent that it crashes the whole server and prevents any authorised user from access...

Read More

Social Engineering is extracting the personal information by the users effort like creating a situation to them to give their personal information.  Social engineering is obtaining direct access to the particular website without hacking or breaking the security system. Social engineering is simply called Human hacking. It is like they can handle the people and they gain their trust and get their sensitive information from them. It cannot be hacked by any particular code. It just need a phon...

Read More

Plagiarists are those whose steal and pass off the creativity of others as their own creation where there has been copyright given to the particular site .there are different forms of plagiarism which are the potluck paper where the writer use different sources and compile them up to create a new article where only few sentences and paragraphs are changed, the photocopy is where some particular portion are taken exactly without making any alteration, the self-stealer isn’t a offence but th...

Read More

Cyber embezzlement is a theft of assets by a person who stands in the position of trust over that assets which mostly occurs in a corporate sector between a employer and employee. Accounting embezzlement is a common form of crime where the accounting records are hidden to hide the theft of money. If a person is given access to someone’s property or money for the purpose of managing, using the money into best use but then the trusted person frauds the money for his personal gain it is known...

Read More

Morphing means changing smoothly from one image to another image without any corrections using morphing tools available on internet . usually girls are affected due to these type of morphing who download girls pictures from various social websites through fake or real profiles and then morph them .these morphed images may be used to blackmail the girl or her family by threatening to publish the morphed images. according to the study ,there is an increasing rate for these crimes which is committe...

Read More
Viewing 85 - 90 of 198 Articles

About Us

We speak the language of Technology & Internet. We understand how the law interacts with Technology & Internet. Cyber Crime Chambers is a boutique firm specializing in internet laws and digital forensic evidence.

image
Karthikeyan.N

B.A., B.L., (Hons) IPDP., (London)
Pgd IPR., Pgd Cyber Law., Msc., (IT)
CCI., CFA., IPCL.,
Advocate, Madras High Court

Karthikeyan, is a renowned cyber law expert, who is also the Managing Partner of Law Office of Karthikeyan, a reputed law firm based in Chennai.

More About Us
Report

Report an Incident

Send us information about your case, we will respond to you promptly

SUBMIT ONLINE