A Denial of Service attack is made to deny access to authorised users of a particular website or server or database. It is a made with a malicious intent by hackers in order to prevent access to the website ranging from few hours to days. A Denial of service attack is done by a hacker with one single system by exploiting the TCP/IP of the server. In a DoS attack the resources of the server are used up to such an extent that it crashes the whole server and prevents any authorised user from access...

Read More

Social Engineering is extracting the personal information by the users effort like creating a situation to them to give their personal information.  Social engineering is obtaining direct access to the particular website without hacking or breaking the security system. Social engineering is simply called Human hacking. It is like they can handle the people and they gain their trust and get their sensitive information from them. It cannot be hacked by any particular code. It just need a phon...

Read More

Plagiarists are those whose steal and pass off the creativity of others as their own creation where there has been copyright given to the particular site .there are different forms of plagiarism which are the potluck paper where the writer use different sources and compile them up to create a new article where only few sentences and paragraphs are changed, the photocopy is where some particular portion are taken exactly without making any alteration, the self-stealer isn’t a offence but th...

Read More

Cyber embezzlement is a theft of assets by a person who stands in the position of trust over that assets which mostly occurs in a corporate sector between a employer and employee. Accounting embezzlement is a common form of crime where the accounting records are hidden to hide the theft of money. If a person is given access to someone’s property or money for the purpose of managing, using the money into best use but then the trusted person frauds the money for his personal gain it is known...

Read More

Morphing means changing smoothly from one image to another image without any corrections using morphing tools available on internet . usually girls are affected due to these type of morphing who download girls pictures from various social websites through fake or real profiles and then morph them .these morphed images may be used to blackmail the girl or her family by threatening to publish the morphed images. according to the study ,there is an increasing rate for these crimes which is committe...

Read More

In internet ,email bomb is a form of abuse which sends a huge number of email to an address in an attempt to overflow the mailbox or diffuse the  server where the email address is subjected to denial of service attack. the three types of email bombing are mass mailing, list linking and zip bombing. Mass mailing consists of sending a several duplicate mails to the same email address. These mail are in simple design but can be easily detected as spam. The mass mailing use botnet to send out m...

Read More
Viewing 25 - 30 of 137 Articles

About Us

We speak the language of Technology & Internet. We understand how the law interacts with Technology & Internet. Cyber Crime Chambers is a boutique firm specializing in internet laws and digital forensic evidence.

image
Karthikeyan.N

B.A., B.L., (Hons) IPDP., (London)
Pgd IPR., Pgd Cyber Law., Msc., (IT)
CCI., CFA., IPCL.,
Advocate, Madras High Court

Karthikeyan, is a renowned cyber law expert, who is also the Managing Partner of Law Office of Karthikeyan, a reputed law firm based in Chennai.

More About Us

Popular Posts

Report

Report an Incident

Send us information about your case, we will respond to you promptly

SUBMIT ONLINE