For Appointment | Consulting
  • +91 9911417772
  • Mon-Sat 10:00 am to 7:00 pm

Welcome To Cyber Complaints

Computer Forensics

Mobile Forensics

Web Forensics

Latest Complaints


  • Abusive Email
  • Banking Fraud
  • Copyright Infringement
  • Credit Card Fraud
  • Cyber Stalking
  • Domain Hacking
  • E-commerce frauds
  • Email Hacking
  • Email Threat
  • Net Extortion
  • Obscene Email
  • Online Defamation
  • Phishing
  • Pornography
  • Social Profile Hacking
  • Software Piracy
  • Spoofing
  • Trademark Abuse
  • Virus or Trojan attack
  • Website Hacking

Abusive Email

Abuse is a situation where you're violated and simultaneously trapped, without options to escape. Abusive e-mails happen when individuals or groups use a company's e-mail to send abusive messages to an employee or spread malicious rumours about that employee with racist, sexist, homophobic intent or with any other form of intolerance or discrimination.

Banking Fraud

The act of using illegal means to obtain money or other assets held by a financial institution The act of obtaining money from people by posing as a financial institution

Copyright Infringement

Copyright is a bundle of rights given by the law to the creators of literary, dramatic, musical and artistic works and the producers of cinematograph films and sound recordings.[6]The rights provided under Copyright law include the rights of reproduction of the work, communication of the work to the public, adaptation of the work and translation of the work.[6] The scope and duration of protection provided under copyright law varies with the nature of the protected work.

Credit Card Fraud

Credit card fraud is a form of identity theft in which an individual uses someone else's credit card information to charge purchases, or to withdraw funds from the account. Credit card fraud also includes the fraudulent use of a debit card, and may be accomplished by the theft of the actual card, or by illegally obtaining the cardholder's account and personal information, including the card number, the card's security number, and the cardholder's name and address. Policing agencies from the local police department, to the U.S. Secret Service are on the job enforcing fraud laws as they related to credit card fraud. To explore this concept, consider the following credit card fraud definition.

Cyber Stalking

Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization.It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten or harass.

Cyberstalking is often accompanied by realtime or offline stalking.Both are criminal offenses.Both are motivated by a desire to control, intimidate or influence a victim.A stalker may be an online stranger or a person whom the target knows. He may be anonymous and solicit involvement of other people online who do not even know the target.

Cyberstalking is a criminal offense under various state anti-stalking, slander and harassment laws. A conviction can result in a restraining order, probation, or criminal penalties against the assailant, including jail.

Domain Hacking

A domain hack is a domain name that suggests a word, phrase, or name when concatenating two or more adjacent levels of that domain. For example, "bir.ds" and "examp.le", using the fictitious country-code domains .ds and .le, suggest the word birds and example respectively. In this context, the word hack denotes a clever trick (as in programming), not an exploit or break-in (as in security).

Domain hacks offer the ability to produce short domain names. This makes them potentially valuable as redirectors, paste bins, base domains from which to delegate subdomains and URL shortening services.

E-commerce frauds

With dozens of benefits to ecommerce and credit card transactions in general, it is unfortunate that modern society is plagued with cases of fraud and deceit. After all, where there is money to be made, cybercriminals will follow. This became even more apparent after the numerous data breaches that occurred in 2014. And if this year seemed chock-full of threats to corporate security and personal information, just look at 2013. According to EMC's security division, RSA, one out of every seven payment cards used in the United States in 2013 was exposed in a data breach. With the sheer number of credit and debit cards utilized by citizens, that statistic is quite staggering.

Email Hacking

OPSEC warning military personnel not to use email accounts with weak security. Email hacking is the unauthorized access to, or manipulation of, an email account or email correspondence.

Overview

Email is a widely used communication mechanism that can be categorized into two basic types of web-based service: open and closed. Open web-based services provide email accounts to anyone, either for free or for a fee. Closed web-based services are managed by organizations who provide email accounts only to their members. Email is used by commercial and social websites because of its security. Email is an increasingly common tool used to communicate. The main reason email accounts are hacked is to access the personal, sensitive, or confidential information that they might contain. This is very harmful for the user and could cause damage to profiles on certain websites, bank accounts, and personal life.

Attacks

There are a number of ways in which a hacker can illegally gain access to an email account, and the majority of them rely on the behaviour of the account's user.

Email Threat

An email threat is an email message that includes a running list of all the succeeding replies starting with the original email. The replies are arranged visually near the original message, usually in chronological order from the first reply to the most recent. This order is useful for the readers following the conversation because it is arranged in some hierarchical structure and may be arranged from top to bottom or vice versa depending on the email client or email provider used. Usually, the topmost email is the latest one

Net Extortion

Net extortion is when an individual or group who uses email as an offensive force. The group or individual usually sends a company a threatening email stating that they have received confidential information about their company and will exploit a security leak or launch an attack that will harm the company's network. The message sent through the email usually demands money in exchange for the prevention of the attack

Obscene Email

Dolores perspiciatis unde omnis iste natus error sit voluptatem accUKntium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo. Nemo enim ipsam voluptatem quia voluptas sit voluptatem aspernatur aut odit aut fugit, sed quia fugit magni dolores eos qui ratione sequi nesciunt. Neque porro quisquam est, qui dolorem ipsum quia dolor sit amet.

Voluptatem, adipisci velit, sed quia non numquam eius modi tempora incidunt ut labore et dolore voluptatem. Ut enim ad minima veniam, quis nostrum exercitationem ullam corporis suscipit laboriosam, nisi magnam aliquam quaerat ut aliquid ex ea commodi consequatur.

Online Defamation

There are two main types of defamation: libel, or written defamation, and slander, or verbal defamation. When a potentially defamatory statement is made online or through social media -- such as via Facebook or LinkedIn -- that involves the written (or "posted") word, and so it is considered libel.

In this article, we'll discuss key legal issues related to online defamation, and we'll look at some real-life examples. (For in-depth information on defamation law, check out all of the articles in Nolo's Defamation, Libel & Slander section.

Problem of Online Defamation

The internet and social media are certainly a great thing for people and society in general, but they are also a uniquely effective breeding ground for potentially libelous statements. Many people have learned (to their dismay) that the internet allows people to speak their mind almost too easily. The internet is chock-full of interesting web sites where someone could intentionally or accidentally leave a potentially defamatory comment or post.

Phishing

Phishing is a type of cyber-attack that involves emails that appear to be from legitimate businesses that the user may be associated with. As these phishing emails are scams they are designed to look as though they come from the claimed entity. These messages ask for verification of personal information, such as an account number, a password, or a date of birth. Twenty percent of unsuspecting victims respond, which may result in stolen accounts, financial loss, or even identity theft. It is best not to respond to unsolicited emails as they may be attacks of this kind. If one deems it necessary to respond to an unsolicited email, they should be sure to check it for misspellings or odd phrasings as these can be a giveaway of illicit activity. It is also not a good idea to open email attachments from senders one does not trust.

Pornography

Pornography (often abbreviated as "porn" or "porno" in informal usage) is the portrayal of sexual subject matter for the purpose of sexual arousal. Pornography may be presented in a variety of media, including books, magazines, postcards, photographs, sculpture, drawing, painting, animation, sound recording, film, video, and video games. The term applies to the depiction of the act rather than the act itself, and so does not include live exhibitions like sex shows and striptease. The primary subjects of pornographic depictions are pornographic models, who pose for still photographs, and pornographic actors or porn stars, who perform in pornographic films. If dramatic skills are not involved, a performer in a porn film may also be called a model.

Social Profile Hacking

Social hacking describes the act of attempting to manipulate outcomes of social behaviour through orchestrated actions. The general function of social hacking is to gain access to restricted information or to a physical space without proper permission. Most often, social hacking attacks are achieved by impersonating an individual or group who is directly or indirectly known to the victims or by representing an individual or group in a position of authority. This is done through pre-meditated research and planning to gain victims' confidence. Social hackers take great measures to present overtones of familiarity and trustworthiness to elicit confidential or personal information. Social hacking is most commonly associated as a component of "social engineering".

Although the practice involves exercising control over human behaviour rather than computers, the term "social hacking" is also used in reference to online behaviour and increasingly, social media activity. The technique can be used in multiple ways that affect public perception and conversely, increase public awareness of social hacking activity. However, while awareness helps reduce the volume of hacks being carried out, technology has allowed for attack tools to become more sophisticated.

Software Piracy

Software piracy is the illegal copying, distribution, or use of software. It is such a profitable "business" that it has caught the attention of organized crime groups in a number of countries. According to the Business Software Alliance (BSA), about 36% of all software in current use is stolen. Software piracy causes significant lost revenue for publishers, which in turn results in higher prices for the consumer.

Spoofing

Spoofing is a type of scam where an intruder attempts to gain unauthorized access to a user's system or information by pretending to be the user. The main purpose is to trick the user into releasing sensitive information in order to gain access to one's bank account, computer system or to steal personal information, such as passwords. BREAKING DOWN 'Spoofing'

There are several kinds of spoofing including email, caller ID, and uniform resource locator (URL) spoof attacks.

Email spoofing (or phishing), used by dishonest advertisers and outright thieves, occurs when email is sent with falsified "From:" entry to try and trick victims that the message is from a friend, their bank, or some other legitimate source. Any email that claims it requires your password or any personal information could be a trick.

Trademark Abuse

Trademark Abuse is a violation of the exclusive rights attached to a trademark without the authorization of the trademark owner or any licensees (provided that such authorization was within the scope of the licence). Infringement may occur when one party, the "infringer", uses a trademark which is identical or confusingly similar to a trademark owned by another party, in relation to products or services which are identical or similar to the products or services which the registration covers. An owner of a trademark may commence civil legal proceedings against a party which infringes its registered trademark. In the United States, the Trademark Counterfeiting Act of 1984 criminalized the intentional trade in counterfeit goods and services.[1]:485–486

Virus or Trojan attack

In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent. The term is derived from the Ancient Greek story of the wooden horse that was used to help Greek troops invade the city of Troy by stealth.

Trojans are generally spread by some form of social engineering, for example where a user is duped into executing an e-mail attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.[6]this infection allows an attacker to access users' personal information such as banking information, passwords, or personal identity (IP address).

Website Hacking

Website hacking is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. Defacement is generally meant as a kind of electronic graffiti and, as other forms of vandalism, is also used to spread messages by politically motivated "cyber protesters" or hacktivists.

Common methods

The most common method of defacement is using SQL injections which allows gaining administrative access. Another method of defacement is through FTP once the username and password are obtained.

Harassed.in

Copyright © 2017 cybercomplaint.in | All rights reserved.

Disclaimer : Thanks for having faith in us. You are on your way to find solution to your complaint resolution !

Complainant who publish evidence with the complaint gets more attention hence get resolved early.


To get attention and take advantage of our portal you are requested.
Attach Picture : JPEG or PNG , Video : MP4, Audio : MP3 or any form of communication like Email, offer document convert that in picture formate.
In case your file is big please send it : cybercrimecomplaintind@gmail.com
,
Our Number : 9911417772 | 9911437772 | 9911547772