Monthly Archives: May 2013

Security Breach reported at Naavi.org Server end

It has been reported that due to a security breach at the server end, three unauthorized URLs had been hosted under the domain of naavi.org for some time during the last week. The URLs hosted/intended to host malicious codes. There … Continue reading

Posted in Cyber Law, ITA 2008 | Leave a comment

Cyber Criminals Rejoice in Karnataka

It is a black day in the State of Karnataka. For some time now, Cyber Criminals in Karnataka can rejoice that no case can be booked against them under ITA 2008 for hacking of a Bank or any Company systems. … Continue reading

Posted in Bank, Cyber Crime, ITA 2008 | Leave a comment

Drawing Attention of Media on this Karnataka High Court hearing

On 27th May 2013, an interesting writ petition is coming up before the Karnataka High Court (WP 21049/2013 at Court Hall No 9, #54). This petition has been filed by Axis Bank Ltd against the Adjudicator of Karnataka as the first respondent and Gujarat Petrosynthese Ltd as … Continue reading

Posted in Cyber Crime, Cyber Law, ITA 2008, Netizen's Forum | Tagged , , , , , | Leave a comment

Regulating the Ethical Hacking Training in India

The views expressed here and elsewhere on the need to regulate the “Ethical hacking Training” in India has evoked some responses which need to be debated. I will try to present some of these views and my perceptions about them. … Continue reading

Posted in Cyber Law | Leave a comment

Punjab National Bank Customers at Special Risk

A client of Punjab National Bank in Chennai has reported that the Bank has suspended sending of SMS alerts for Internet Banking transactions as is required under RBI guidelines. The reason is reported to be some malfunctioning of some software. … Continue reading

Posted in Cyber Law | Leave a comment

Positive use of Ethical Hacking Skills

While in the long run Naavi.org would like a proper regulatory regime to be set up for regulating Ethical Hacking trainings in India,  it is necessary for  Ethical Hackers who have already been trained to be guided properly to use … Continue reading

Posted in Cyber Crime, Cyber Law, Uncategorized | Leave a comment