The president gets five threatening emails
Credit card numbers and other personal information peddling for less than a dollar a record Information stealing Trojan poses as Microsoft Windows patch Russia filters Internet traffic from Georgia: Google Earth being misused by militants in Gaza strip to launch attacks on Israel: HSBC loses disk containing details of around 400,000 customers.News like above is enough to send shivers down anyone's spine, be it an enterprise, individual, or the govt. But alas, it's all true. Increasingly, the news headlines everywhere are getting filled with security incidents that are more focused and malicious. It's no longer about a script-kiddie breaking into an organization's server just for kicks or to hack a website just to leave a funny message there. Security incidents the world over are being committed with a very clear and malicious objective, which could be financial gain, plan for a terrorist attack, or propaganda. In other words, security threats have really changed and taken a much more gruesome shape than you could ever imagine. It will only get worse in the future, so you have to be ready for it. Today, terror is everywhere, and there's a dire need to combat it at all levels. This special story from PCQuest will focus on various aspects of security, strategies to adopt, and tools to combat it. We'll focus on different kinds of security threats for different types of audience, along with the strategies and tools to combat them. We'll look at cyber-terrorism, what it means for different people, and how to combat it.
1. An email is sent to IndiaTV news channel giving some information on the blasts. From the email, police was able to track the sender's IP address which is traced to some web hosting company. The web hosting company finally traced the IP Address to Waghodia Dental Institute in Vadodara.
2. A Cyberoam device is installed at the institute. The support department of the institute is told to determine the exact computer from where the mail was sent.
3. The device is able to tell which websites were surfed at the time when the mail was sent.
4. From the websites, IP addresses of the same range were matched.
5. Finally the website is identified: abdultaiyeb.com. This was a web based proxy service that the terrorists used.
6. With the help of these reports, the IP Address of the computer from where this site was viewed is identified. Interestingly, the computer had a static IP address, and belonged to one of the institute's internal labs. 3. The police seized the computer for further investigation.
--- You may write us on email@example.com