Cyber Stalking is now a days most emerging crime on Internet which possess a serious threat to all people who uses Internet in their daily life specially I want to involved Teenagers and Young Generations age between 15 to 30. As normally from the last year survey and Traffic reports suggest that Facebook and many social networking websites is viewed more time than any educational website or even Facebook is used more than Google. Cyber Stalking may refer to the false internet accusations, harassing them,fake Love or even cheat or post something online threats creates the vulgar impressions on any other person,Online Harassment is found normally against woman for making their personal information publically available on internet,uploading the personal images through which a woman/girl comes under depression/tension mentally.I would also like to talk about the partners like girlfriend/boyfriend,wife/
Categories of Cyber stalkers
1) Obesessed lovers.
2) Delusional people who often believe that a stranger is or can fall in love with them…as in the case of fans stalking celebrities.
3) Vengeful cyber stalkers are those who have a grudge against his victim due to some minor or imagined reason.
4) Racist stalkers who target particular communities
5) Egoistic aggressors who want to show-off to their friends.
According to the Laws its being illegal and stated in IT (Information Technology Act 2008) under Section 72(Breach of Confidentiality and Privacy). There are some lots of cases yet to be registred but due to lack of knowledge of cyber crime and Cyber Laws people do not registers FIR or another reason may be they don't want to lose their image or reputation in the society.
The US Justice Department and other sources, Carll said 850,000 American adults, mostly women, are targets of cyberstalking each year, 40 per cent of women have experienced dating violence delivered electronically, including harassing text messages and disturbing information about them posted on social media sites.20 per cent of online stalkers use social networking to keep tabs on their victims. 34 per cent of female college students and 14 per cent of male students have broken into a romantic partner's email.Cyber Stalking causes many harmful effects like suicide,defamation,threatened earning,Lost Revenue,Emotional Damage.famous Hollywood film Odd Girl Out is a film based on Bullying.
I would like to suggest to do the following
1) No to sharing personal information online
2) No to filling out profiles on websites
3) Don't reply to people whom you don't know until and unless you don't have any prior info about him
4) No to flirting or arguing online
5) No to sharing your passwords
8. No to replying to cyberstalkers
9) Yes to saving all communications on your computer
10) And yes to reporting cyberstalking to your nearby police station !
Friday, January 13, 2012
Cyber Stalking - emerging cyber crime in india
Labels:
cyber crime,
cyber stalking,
facebook,
friends,
india
Monday, January 2, 2012
Looking for Web Security then look at to OWASP
from last few years i have been watching that every hacker or Noob calling himself as Hacker used to find out only sql injection or XSS only but this is not only the Hacking.
If you want to be a Real Ethical Hacker, Good Developer, Penetration Tester than you muct follow many modules and Procedures and OWASP is one of the best to improve your skills.
If you want to learn the basics and to become an experts
If you want to learn the basics and to become an experts
Basics are for winner not for looser :) Start from Here ....
https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series
I have Learned lot from this now Don't look at the illegal hacking websites or any noob Tutorials
https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project
https://www.owasp.org/index.php/OWASP_Appsec_Tutorial_Series
I have Learned lot from this now Don't look at the illegal hacking websites or any noob Tutorials
https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project
Labels:
Ethical,
Falgun,
Hacker,
OWASP,
Penetration Tester,
Rathod,
Web Security
Subscribe to:
Posts (Atom)