Don't fall for that elusive e-mail with an enticing subject line asking for your personal details. It's a cyber criminal who is using a facade to lure you into a trap. Don't just delete the mail, report it to the cyber cell
Cyber stalking:
Cyber stalking is a repeated act of harassment or threatening behavior of the cyber criminal towards the victim through the internet. A vast majority ofu00a0 stalkers are dejected lovers or jilted ex-lovers, who intend to harass the victim because they failed to satisfy their secret desires. Many a time, the stalker posts phone numbers or email address of the victim as willing to solicit sexual favours. The stalker even uses filthy and obscene language to incite the person.
Virus Dissemination:
Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium. These are malicious viruses
u00a0
Phishing:
This is an act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs users to visit a website where they are asked to update personal information, such as passwords and credit card details, social security and bank account numbers, already available to the legitimate organisation. The website, however, is bogus and set up only to steal user information.u00a0
Tips for children and teens:
1. Do not give out identifying information such as name, home address, school name or telephone number in a chat room.
2. Do not send your photograph to any one on the Net without initially checking with the parent or guardian.
3. Do not respond to messages that are obscene or threatening.
4. Never arrange a meeting without informing your parents.
5. Remember that people online may not be who they seem to be
what you need to register a complaint
If you are a victim of hacking
Bring the following information:
* Server Logs
* Copy of defaced web page in soft copy as well as hard copy format, if your website is defaced
* If data is compromised on your server or computer or any other network equipment, keep a soft copy of original data and soft copy of compromised data.
* Access control mechanism details i.e. who had what kind of the access to the compromised system
* List of suspects - if the victim suspects anyone
If your are a victim of e-mail abuse, vulgar e-mail
Bring the following information-
* Extract the extended headers of the offending e-mail
* Bring a soft copy as well hard copy of the offending e-mail. Do not delete the offending e-mail from your inbox.
* Save the copy of the offending e-mail on your computer's hard drive.
Where to complain
Cyber Crime Investigation cell
Annex III, 1st floor, Office of the Mumbai Commissioner of Police,
DN Road, Mumbai 400001
How to safeguard yourself
1. Ensure your passwords have both letters and numbers, and are at least eight characters long. Avoid common words. Some hackers use programs that can try every word in the dictionary.
2. Don't use your personal information, your login name or adjacent keys on the keyboard as passwords
3. Don't share your passwords online or over the phone
4. Protect yourself from viruses by installing anti-virus software and updating it regularly
5. Use different passwords for different websites.
6. Send credit card information only to secure sites.
