Author: rescue@crimefire.in

  • Dismal conviction rate in cyber crime cases, chargesheet couldn’t be filed in most instances: Rajasthan Govt data – The Indian Express

    The Rajasthan police failed to file a chargesheet in over half of the cyber crime cases in the state that came up in the last three years, data from the state Home Department has revealed.
    The Congress government led by Ashok Gehlot recently provided this information in reply to a question put up in the Assembly by BJP MLA from Kota South Sandeep Sharma.
    According to the reply, the Home Department, which is under CM Gehlot, has stated that in the past three years, 4,405 cases of cyber crime were registered but chargesheet was filed in only 1,443 cases.
    The data reveals that a final report has been submitted in 2,278 of these cases, which is more than 51 per cent of the total cases.
    Similarly, the state government stated that while 2,427 cases of online fraud were registered in the last three years, in 1,841 cases — which is 75 per cent of the total online fraud cases — a final report has been submitted and no chargesheet could be filed.
    In reply to another question by BJP MLA from Ajmer South BJP MLA Anita Bhadel, the Home Department stated that convictions from court have taken place in only 10 cases in the last four years, while the arrest of accused could not be made in 904 cases.
    Police say that technical challenges pose big hurdles in cracking cyber crime cases and arresting the accused.
    “When it comes to cyber fraud, at times when money gets deducted from a bank, and there is a delay in the complaint, it becomes very difficult to trace the account. We have managed to retrieve the money for the complainant in several online fraud cases. Last year we could recover around Rs 10 crore. But still, this is only 10 per cent of the amount cheated. This is a technical challenge,” Rajasthan ADG Crime Ravi Prakash Meharda told The Indian Express.
    Meharda added that cyber criminals often use new techniques, at times in sync with current happenings, to lure gullible people and cheat them by sending false links.
    “The government is opening cyber police stations in every district. There is a need for capacity building and training, which is being conducted. It is a process that will take time. At times, social media sites don’t share all information, which again results in a challenge for the police to provide all evidence to the court for ensuring conviction,” said ADG Meharda.
    New Zealand declares National State of Emergency as Cyclone Gabrielle causes havoc


    Deep MukherjeeDeep Mukherjee is a senior correspondent based in Jaipur. He covers Ra… read more

    source

  • Fortinet helps launch Cybercrime Atlas global knowledgebase – iTWire

    Equinix GXI EN Scale 728x90
    Leaderboard Small 2023
    Network and security product provider Fortinet has announced the launch of the Cybercrime Atlas, a joint initiative between it, Microsoft, PayPal, and Banco Santander to aid industry, law enforcement, and government agencies by providing a first-of-its-kind visibility to help take down cybercriminals and their infrastructure around the world.
    The Cybercrime Atlas was launched this month in Davos at the organisation’s Annual Meeting by the World Economic Forum (WEF) and is aimed to disrupt cybercrime at a global scale, by mapping and fighting the cybercrime landscape, and covering criminal operations, structures, and networks.
    FortiGuard Labs chief security strategist and VP of global threat intelligence Derek Manky said, “disrupting global cybercriminal organisations requires a global effort with strong, trusted relationships and collaboration across public and private organisations and industries. It is part of Fortinet’s mission to secure people, devices, and data everywhere, and Fortinet is proud to be one of the founding members of the World Economic Forum Centre for Cybersecurity and an active contributor as part of its Partnership against Cybercrime(PAC). The Cybercrime Atlas initiative is about driving real impact and is a coordinated effort to create a chain of disruption in the world of cybercrime. We are excited to continue our work with private and public sector leaders to help make our digital world a safer place.”
    Cybercrime impacts everyone, from individuals to multinational corporations, as well as governments and critical infrastructure. It causes immense damage, even if not always visible, to economies and societies. The Cybercrime Atlas was first conceptualised by the Forum’s PAC community, which has over 40 private and public sector members.

    The Cybercrime Atlas is a collaborative effort to build an action-orientated, global knowledge base​ of the cybercriminal landscape to enable mitigation and disruption of cybercrime. Building on the expertise of the Forum’s PAC, the Cybercrime Atlas initiative will provide a platform for leading cybercrime investigators, national and international law enforcement agencies, and global businesses to share knowledge, generate policy recommendations and identify opportunities for coordinated action to fight cyberthreats.
    The Cybercrime Atlas aims to build a comprehensive picture of the cybercrime landscape that covers criminal operations, shared infrastructure, and networks. The links between the information gathered about threat actors will help the security industry more effectively disrupt the cybercriminal ecosystem, more efficiently allocate resources in the fight against them, and make their unlawful efforts more cost prohibitive.
    The Cybercrime Atlas has benefited from a year of analysis into 13 criminal groups by specialised analysts and cybercrime investigators, using only publicly available information. The accumulated knowledge from the Cybercrime Atlas efforts will ultimately help to identify and disrupt the cybercrime ecosystem. The analysis will shed light on cybercriminal artifacts to aid industry, law enforcement, and government agencies to create a chain of disruption. The approach and initial findings of the group have been welcomed by law enforcement agencies. The uncovering of these non-traditional artifacts will help aid in the capture and successful prosecution of cybercrime gang members.
    Fortinet’s FortiGuard Labs’ leadership in the threat intelligence community over the last decade has helped take the fight to adversaries and improve protections for customers, partners, and governments around the world. By sharing threat intelligence and working with other threat intelligence organisations, it helps improve protections for customers and enhances the effectiveness of the entire cybersecurity industry.
    FortiGuard Labs is committed to partnership and cooperation with global law enforcement, government organisations, and industry organisations. In addition to the work with WEF Centre for Cybersecurity and being a contributor to PAC, Fortinet also invests meaningful resources in further global partnerships, including the MITRE Engenuity Center for Threat Informed Defense (CTID). Fortinet is also a long-standing member of the NATO Industry Cyber Partnership (NICP), is an active contributor and member of INTERPOL Gateway, is a founding member of the Cyber Threat Alliance (CTA), and more.
    International Criminal Police Organisation INTERPOL secretary-general Jürgen Stock, said, “this initiative underlines the need for an enhanced multi-sector approach to combat the increasing cybercrime threat. A global solution must include private sector insights to enable law enforcement to prevent, detect, investigate and disrupt cybercrime.”
    Microsoft president and vice-chair Brad Smith said, “Cybercriminals work in the shadows to exploit vulnerabilities and inflict attacks. The Cybercrime Atlas provides an effective forum that brings the public and private sectors together to share and put data to use to disrupt cybercrime quickly, and at scale.”
    World Economic Forum managing director Jeremy Jurgens said, “The Cybercrime Atlas is a collaborative research initiative that gathers and collates information about the cybercriminal ecosystem and major threat actors operating today. The insights generated will help promote opportunities for greater cooperation between the private sector and law enforcement to address cybercrime.”

    DOWNLOAD NOW!

    PROMOTE YOUR WEBINAR ON ITWIRE

    It’s all about Webinars.

    Marketing budgets are now focused on Webinars combined with Lead Generation.

    If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

    The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

    Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

    We look forward to discussing your campaign goals with you. Please click the button below.

    MORE INFO HERE!

    MORE INFO HERE!

    David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.
    Election propaganda!!!!!
    What a rip off!!!! Backed by a dubious survey by the promoters themselves.I say liar, liar pants on fire.I expect[…]
    This wouldn’t be a self serving report from a provider of anti-malware VPN programs would it by any chance?Are they[…]
    Many years ago there was a guy called Bob Ansett who started a car rental company. He required that phone[…]
    The article lists external factors — what other people do to you. However, internal factors must be considered. That is[…]

    source

  • White House Committee Advocates Collaboration, Consensus in … – Nextgov

    dkfielding/Getty Images

    By Alexandra Kelley
    Consistent cybersecurity standards and presidential action are two of the several recommendations released today by the White House’s National Security Telecommunications Advisory Committee in a working draft document that looks to strengthen the U.S. communication industry’s cybersecurity posture in the face of increasing digital attacks.
    First reported by the Washington Post, the NSTAC developed a series of draft recommendations, following a request from the Executive Branch back in May 2021 to help establish a stronger national foundation of cybersecurity preparedness. This latest report focuses on previous key findings in the first three reports and spotlights challenges organizations have in adapting to increasing federal cybersecurity regulations. 
    A major theme for the NSTAC’s final report is uniformity in cybersecurity standards and requirements for critical infrastructure technologies. 
    “ICT [information and communication technology] standards for security requirements and assurance approaches developed with industry, regulators and other experts collaborating across sectors and regions are reflective of global best practices,” the report reads. “Alignment with consensus standards will deconflict, simplify and align regionally developed compliance solutions so assurance activities can be done efficiently once and reused globally.”
    Sector-specific regulations, differing general uses and resource constraints are the primary challenges to establishing universal security requirements for ICT systems.
    “These requirements often result in an increased need for organizations to prove that they are meeting their cybersecurity requirements through different assurance or certification programs, but these programs often end up diverging across sectors or countries resulting in additional cost without adding security benefit,” the report states. 
    Chief recommendations to help combat the variety of cybersecurity standards include more visible and robust actions to promote cybersecurity requirements from the White House, as well as collaboration between industry and government. Intergovernmental agency communication was also listed as an area where cybersecurity requirements consensus can falter. 
    To help combat these regulatory discrepancies, the NSTAC recommended establishing a new government office within CISA dubbed the Office of Cybersecurity Regulatory Harmonization, whose primary function would be to establish expertise on cybersecurity regulations and promote regulatory uniformity in standards development and adoption.
    “An opportunity exists for CISA to establish and resource an office with the primary mission of advancing cybersecurity regulatory harmonization and tasking it with studying existing regulations and developing resources that could define how to create harmonized regulations,” the report notes. 
    The advisory committee also noted the importance of keeping post-quantum cryptography as a priority area for cybersecurity requirements.
    “The president should direct CISA and NIST to form a large-scale partnership inclusive of the private sector, public sector and academia focusing on transition to post quantum cryptography…with the goal of speeding up the adoption and deployment of PQC,” the report said. It further clarified that post-quantum cryptographic standards should be based off of the NIST Cryptographic Standards and Guidelines Development Process, and specifically named the Department of Commerce and Department of Homeland Security as two agencies that should be tasked with creating incentives for mass adoption of quantum-resistant cryptography. 
    Fortifying the nation’s cybersecurity defenses has been a priority within the Biden administration, especially amid the onslaught of foreign and domestic cyber attacks targeting critical infrastructure networks in sectors like energy and health care.
    In 2021, President Joe Biden signed an executive order to assess and improve the federal cybersecurity defense protocols and foster better collaborative efforts for software security. 
    The White House is also expected to release a new National Cyber Strategy in the wake of escalating cyber attacks and threats from emerging technologies.
    NEXT STORY: House Dems Call for Info on Racially-Motivated Cyber Attacks
    Do Not Sell My Personal Information
    When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.
    Manage Consent Preferences
    Strictly Necessary Cookies – Always Active
    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
    Sale of Personal Data, Targeting & Social Media Cookies
    Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link
    If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.
    Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
    Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.
    If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

    Save Settings

    Cookie List
    A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:
    Strictly Necessary Cookies
    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
    Functional Cookies
    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
    Performance Cookies
    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
    Sale of Personal Data
    We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
    Social Media Cookies
    We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
    Targeting Cookies
    We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
    Help us tailor content specifically for you:

    source

  • An `apocalypse`: Report warns of a `catastrophic cyber event` in next two years – WION

    Cybercrime industry stood at $3 trillion in 2015 and is expected to grow to $10.5 trillion in 2025. Photograph:(Reuters)

    Experts at the WEF presentation said that the massive cyberattack can snowball into an apocalypse.


    Experts at the WEF presentation said that the massive cyberattack can snowball into an apocalypse.
    Cyber security has become a huge issue in the past few years with several companies and countries falling victim to  cyber attacks. Everyone who has been affected or is at risk of being affected by cyber attacks has been trying to deal with the problem. Now, a new report on cyber security has warned that in the coming two years cyber attacks might pose an unprecedented threat.  
    The World Economic Forum (WEF) Global Security Outlook Report 2023 has predicted that a “catastrophic cyber event” is on the way and will hit us in the “near future”. WEF managing director Jeremy Jurgens, during a presentation, said that “geopolitical instability makes a catastrophic cyber event likely in the next two years”. Jurgens said that the prediction comes from 93 per cent of cyber leaders, and 86 per cent of cyber business leaders. “This far exceeds anything that we’ve seen in previous surveys.”
    Talking about cyber security, Jurgens referred to a recent cyberattack that aimed to shut down Ukrainian military abilities, but unexpectedly led to closing off of parts of electricity production across Europe. 
    Secretary-General of Interpol, Jürgen Stock, was also present and called it “a global threat”. “It calls for a global response and enhanced and coordinated action.” He urged multiple bad “actors” who benefit from cybercrime to encourage world leaders to work together to thwart all such efforts. 
    Also Read | Russia accuses US of training ‘Ukrainian IT Army’
    Albania, one of the countries that fell prey to a massive cyberattack recently, has now been working with larger allies to fight cyber criminals. Edi Rama, Albania’s prime minister, came up with some shocking numbers at the presentation, saying that if cybercrime was a state, it would be the third largest global economy after the US and China. Rama said that the cybercrime industry stood at $3 trillion in 2015 and is expected to grow to $10.5 trillion in 2025. 
    Rama compared the predicted cyberattack to a virus like Covid-19 and how it can turn to an “apocalypse”.
    “Let’s imagine an exponential multitude of viruses that mutate everyday exponentially while not threatening our body, but the bodies we live in, our organisations, our countries, our system, then, you know, it could be just apocalypse. It’s about viruses that can not only block our way of living, but can control it and deviate it.”
    (With inputs from agencies)
     
    WATCH WION LIVE HERE

    You can now write for wionews.com and be a part of the community. Share your stories and opinions with us here.
    Doomsday in 2046? Asteroid as huge as an olympic swimming pool may hit Earth, says NASA
    Water on Earth may be older than the Sun itself: Study
    Ocean plastic pollution reaches 'unprecedented levels' since 2005
    Stay connected with us
    © 2022. India Dot Com Private Limited. All Rights Reserved.

    source

  • Experts To Brainstorm On Reduction Of Cyber Crime In Africa – Leadership News

     
    Experts across various sectors of economy in Africa are poised to discuss ways to reduce cybercrime that fuel technology disruption of African economies.
    The technologists who would be addressing the issues and challenges impeding growth in financial inclusion at the 2023 RegtechAfrica Conference in Africa would speak on policies that would ensure consumer protection against cyber crime is upheld in the continent.
    According to the chief executive officer, RegtechAfrica, Cyril Okoroigwe, said the conference would focus on ways to reduce cybercrime in Nigeria.
    The conference, he said, is scheduled to hold in Nigeria from 24th to 26th May, 2023, in  Lagos, would be a forum for regulators, regulated and key Industry stakeholders to engage collaborate and share knowledge around new technologies and practices that support better regulations.
    He stated that the digital revolution in financial sector has seen increasing changes with a new move towards technology driven delivery channels. This holds great promise as a means to enable financial inclusion and thus help improve citizens lives.
    Okoroigwe, however, stated that cybercrime has become a key concern in developing and emerging key countries’ financial markets and is threatening to hinder consumer trust and other global advances in building more inclusive financial sectors.
    His words, “harnessing the power of big data, artificial intelligence and even block chain, regulatory technology is poised to reduce financial risk, increase regulatory compliance and stamp out laundering and fraud, all of which contribute to an estimated $2 trillion yearly loss for the global economy.”
    The RegtechAfrica boss, assured that the  conference would therefore reveal how governments in emerging markets are raising the bar in implementation of policies and strategies with the aim of setting innovative standard for risk management aimed at providing clarify and engendering prosperity.
    Some speakers who already confirmed attendance at the event include Phillip Chitalu, Chief Executive Officer, Securities and Exchange Commission, Zambia; Kashifu Inuwa Abdullahi, Director General, National Information Technology Development Agency (NITDA); Ayisat Agbaje, Senior Special Assistant to the Governor on Development Partnership and Economic Planning, Lagos State and Yilebes Addis, CEO of EthSwitch S.C, Ethiopia.
    The conference will feature an expansive line-up of stellar speakers, case studies, panel discussions, presentations providing access to a wealth of industry-leading knowledge sharing best practices and experiences, spotlighting trends, information exchange, insights and outlooks with actionable take-aways.
    The event is focused on attracting top professionals with interest In regulations, compliance, technology, fraud, risk, monitoring, reporting, financial crime, cyber security, data management and identity management.
    Technology service providers will share their knowledge, invited agencies of government at federal and state levels will share insights and showcase use cases in their domains, while international experts will provide perspectives on international best practices and use cases.
    With 50 speakers and over 1,000 industry experts across the world, the conference is a platform to engage with the industry stakeholders to drive business growth and stay ahead of the curve.
    The maiden edition of the conference held in partnership with the Bill & Melinda Gates Foundation, was hugely successful and boasts of high-level representation of businesses and regulators across key sectors such as financial services, technology, telecommunications and Venture Capital companies.
     

    © 2023 Leadership Media GroupAll Rights Reserved.
    © 2023 Leadership Media GroupAll Rights Reserved.

    source

  • Australia plans to reform cyber security rules, set up agency – Reuters

    SYDNEY, Feb 27 (Reuters) – The Australian government on Monday said it planned to overhaul its cyber security rules and set up an agency to oversee government investment in the field and help coordinate responses to hacker attacks.
    The move follows a rise in cyber attacks since late last year with breaches reported by at least eight companies, including health insurer Medibank Private Ltd (MPL.AX) and telco Optus, owned by Singapore Telecommunications Ltd (STEL.SI).
    Current cyber security rules, government policies and regulations "are simply not at the level that we need them to be," Prime Minister Anthony Albanese said during a meeting with industry leaders and experts.
    "This is really fast moving. It's a rapidly evolving threat, and for too many years Australia has been off the pace," Albanese said.
    The government will set up a coordinator for cyber security, supported by a national office within the department of home affairs, tasked with ensuring government agencies work together during cyber incidents.
    View 2 more stories
    The coordinator will also oversee the government's investment strategies on cyber security and help lead the response when hackers attack.
    The government has published a discussion paper on a new cyber security strategy, which it aims to implement next year, and is seeking feedback on how businesses can improve their cyber security in partnership with the government.
    Though the government and the private sector are undertaking critical security measures, the current rules do not ensure smooth coordination during cyber incidents, Minister for Home Affairs, Clare O'Neil said, blaming the previous government for implementing them.
    "That law was bloody useless, like not worth being printed on the paper when it came to actually using it in a cyber incident," O'Neil told ABC Radio in an interview. "They're not fit for purpose at the moment, and I do think they need reform."
    Our Standards: The Thomson Reuters Trust Principles.
    Reuters, the news and media division of Thomson Reuters, is the world’s largest multimedia news provider, reaching billions of people worldwide every day. Reuters provides business, financial, national and international news to professionals via desktop terminals, the world's media organizations, industry events and directly to consumers.
    Build the strongest argument relying on authoritative content, attorney-editor expertise, and industry defining technology.
    The most comprehensive solution to manage all your complex and ever-expanding tax and compliance needs.
    The industry leader for online information for tax, accounting and finance professionals.
    Access unmatched financial data, news and content in a highly-customised workflow experience on desktop, web and mobile.
    Browse an unrivalled portfolio of real-time and historical market data and insights from worldwide sources and experts.
    Screen for heightened risk individual and entities globally to help uncover hidden risks in business relationships and human networks.
    All quotes delayed a minimum of 15 minutes. See here for a complete list of exchanges and delays.
    © 2023 Reuters. All rights reserved

    source

  • With memes and movies, Rajasthan Police warns youth against cyber crimes – The Hindu

    To enjoy additional benefits
    CONNECT WITH US
    February 12, 2023 01:47 pm | Updated 04:03 pm IST – Jaipur
    COMMents
    SHARE
    READ LATER
    A social media post warning people against fake social media profiles.
    From quoting iconic Bollywood songs and dialogues to sharing memes, the Rajasthan Police is using popular culture as a tool to raise awareness among youngsters about online luring and fake social media profiles during the ongoing Valentine's week.
    डिजिटल वर्ल्ड में हैकर्स कभी भी आपके 'गले पड़' सकते हैं। #Hackers के बचने के लिए एंटीवायरस और ऑपरेटिंग सिस्टम रखें अपडेट।

    किसी भी #App से निजी जानकारी साझा ना करें। #Hug करें लेकिन सुरक्षा को हैकर्स को नहीं। #HugDay#ValentineWeek#RajasthanPolicepic.twitter.com/lXzLvKZ3co
    The creative messages, with a twist of humour, are being shared by the State police force on its official Facebook account and Twitter handle to grab the attention of youngsters who might easily fall prey to scamsters.
    The social media posts are also being used to desist the youth from following gangsters on social media.
    A tweet shared on 'Chocolate Day' (February 9) was the iconic poster from the blockbuster film '3 Idiots'.
    राजस्थान पुलिस का डिजिटल चॉकलेट डे

    इंटरनेट की दुनिया चॉकलेट सी लुभाती है। इसकी मिठास खटास में ना बदलें, यह आप पर निर्भर है।

    ऑनलाइन फ्रॉड से बचना है तो, रखिए साइबर सेफ्टी का ध्यान। #ChocolateDay#ChocolateDay2023#ValentinesWeek#RajasthanPolicepic.twitter.com/WncXGUhTTK
    Captioned "jahapanah tussi great ho, chocolate kubool karo," a famed dialogue from the film, it alerted people to stay away from "digital chocolate" and adopt cyber safety to ensure "all is well" — a catchphrase of one of the lead protagonists as well as a hit song from the 2009 movie.
    Warning people against sharing their OTPs with anyone, a post on 'Rose Day' (February 7) had the image of a WhatsApp inbox with two people chatting about how one of them lost all savings due to an online scam.
    A caption at the bottom of the image read, "roz roz tum jo sanam aisa karoge, paise lut jayenge to aahen bharoge (If you keep on doing this, you will lose all your money)" — a parody of a song from the 1996 Bollywood blockbuster "Saajan Chale Sasural".
    And for girls, Police came up with a creative message to caution them about how fake profiles on social media can harm them.
    "Kal aaj aur kal, kabhi bhi aa sakta hai fake proposal," the post read.
    कल, आज या कल~
    आपके पास भी आ सकता है कोई #FakeProposal.

    ध्यान रखें,#Proposal देने वाला कहीं फेक आइडेंटिटी तो नहीं कर रहा यूज।

    रहें #Alert, लुभावने प्रस्ताव से ना हों #Confuse.#proposeday2023#Propose_day#ValentinesWeek#K3G#KKKG#RajasthanPolicepic.twitter.com/lPN6nqIheB
    Additional Director General (Technical Services) Sunil Dutt said the plans of cyber criminals can be thwarted if there is awareness among the masses.
    And linking Valentine's week with cyber crime is an effort in that direction, he said.
    Though it is a long-term campaign of Rajasthan Police to make people aware about cyber crimes, we picked Valentine's week to reach out to youngsters, Mr. Dutt said.
    Talking about the force’s latest post shared on ‘Promise Day’ on Saturday, the officer said a poster from the cult film ‘Gangs Of Wasseypur’ has been used to desist people from getting influenced by gangsters through social media posts.
    "Hazrat, hazrat, hazrat, aaj ka pakka promise, na gansgters ko karenge follow na kisi ko karne denge (let's promise not to follow gangsters and discourage others from doing so)," read the caption accompanying the poster depicting actor Manoj Bajpayee.
    According to officials, the social media team of the Rajasthan Police has been quite active for some time now and similar creative campaigns have been launched from time to time over the last one-and-a-half years.
    Film songs, poetry, punchlines, and dialogues from popular Hindi movies are being used in the campaigns, they said.
    Interesting messages are easily understood by the common man. Earlier, on occasions like Holi, and New Year's Eve, such campaigns were launched and proved to be very popular, the officer said.
    Meanwhile, people too are appreciating the innovative initiative albeit with some suggestions.
    "It is a humble request to put a ban on all kinds of songs and events that promote gun culture. Also, instructions should be given to You Tube and Instagram to not encourage them," tweeted Dharm Bainada.
    Another social media user, Vishwadeep said, "Rajasthan Police is doing a great job to reform youngsters who have deviated from the path of goodness. I would like to thank the officers running this campaign and also the entire Police department."
    COMMents
    SHARE
    Rajasthan / cyber crime / India / police
    BACK TO TOPBack to Top
    Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.
    We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.

    source