You need to provide the following possible information, along with an application letter addressing the head of cyber crime investigation cell when filing a complaint: • Your name, • Your mailing address, • Your telephone number, • Specific details on how the offence was committed, along with the names and addresses of suspects and any […]
What are the laws concerning Cybercrimes in India?
Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000. The Act […]
What is Cybersquatting?
.Cybersquatting is the practice by means of which a person or legal entity books up the trade mark, business name or service mark of another as his own domain name for the purpose of holding on to it and thereafter selling the same domain name to the other person for valuable premium and consideration. Cyber […]
What happen if there is a conflict between an internet domain name and an existing trade mark?
Even if a company owns a registered trademark, someone else may still have the right to the domain name. Sometimes a person (known as a “cyber squatter”) registers a trademark as a domain name hoping to later profit by reselling the domain name back to the trademark owner. If you believe that someone has taken […]
Can we register the Domain name? And where.
Yes, today anyone can register a domain name that is vailable for purchase and doses not infringe any third party’s rights. The domain names were initially registered by Network Solutions only, that had the sole monopoly to register the said TLDs (Top Level Domain Name). This monopoly of Network Solutions continued for many years and […]
What is a domain name?
Since it is not possible to remember each and every numerical value of an IP address, the system of domain names evolved. Domain names are the alphabetic names used to refer to computers on the Internet. A web site address, including a suffix such as .com, .org, .gov or .edu comprises a domain name. The suffix […]
What do you mean by phishing?
Phishing is the criminal and fraudulent act of attempting to acquire sensitive information such as usernames, password and credit card details by masquerading as a trustworthy entity or person in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure […]
What is an IP spoofing?
A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and […]
What is an I.P address?
The word I.P stands for Internet Protocol Address. It is a unique number consisting of four parts separated by dots, e.g. 151.164.1.6. Every machine that is on the Internet has a unique IP number, if a machine does not have an IP number; it is not really on the Internet. The IP address is just […]
What are the various types of cyber crimes?
Cyber crimes can be classified into 3 major categories such as a) Crime against government such as cyber terrorism. b) Crime against persons such as cyber pornography, cyber stalking, cyber defamation c) Crime against property such as online gambling, intellectual property infringement, phishing, credit card frauds.