Globalization period changed the dynamics of information and communication technology, with virtual services use for IT infrastructure security, because of the rapidly re-configuration and evolving requirements limiting the request for redundant services (hardware). It’s also worth noting that cloud computing reduces the costs of providing IT services, by eliminating redundant computing power and storage, reducing support requirements
The availability of security device and software in the black market is a prerequisite for the perpetration of cybercrimes such as credit card theft, online scams or identity theft. Cybercriminals and terrorists have a great advantage to coordinate large scale attacks and crimes with the help of information and communication technologies with minimal effort such as generating funds from small value transactions in order to finance terrorist attacks (Webb & Tomalewicz, 2016). The speed and anonymity of cyber-attacks makes it distinctive among perpetrators (terrorists, criminals, and nation states). Jihadist tendencies usually require little finance, for example the United Nations evaluated London bombings in 2005 at around $14,000, while the French Finance Minister Michel Sapin evaluated that of the Paris attacks in November 2015 to approximately $32,000. Contrary to coordinated attacks of 9/11 which were reported to have cost between $400,000 and $500,000 according to the final report of the National Commission on Terrorist Attacks. There has been a large increase in the volume of cyber-attacks by organised criminal networks
Cyberattacks have been flying fast and furious around the world during these days of global uncertainty because of the coronavirus. Countries accuse each other of engaging in cyber warfare, and each of the accused also claims to be a cyber victim. International organizations dealing with the COVID-19 pandemic have also been targeted
Information and communication technology has brought a variety of non-conventional crimes. Cyber criminality is a major challenge for security officials in Sub Saharan Africa. Each seconds cyber criminals discover software and security terminal devices to operate. The language used by cybercriminals is also a barrier to the law enforcement officers and the criminal justice system. We listen to new words each day, like machine man, Ngues man (to describe scammers) and pick-up, but also mail with attach bills for ‘clients’ of cybercriminals
The investigators have claimed that the duo, along with an accomplice who often helped them and who also has been arrested, had been running a sleaze racket in the city and they had filmed 182 women in compromising positions over the last six years and used the videos to extort money from them.
After a temporary ban on the app last year by Madras High Court, the app is back in India after a fried hiatus. And if user numbers of 2019 is anything to go by, TikTok is set to become more popular
A new round of European negotiations on the proposed regulation of exports of dual-use goods is due to open on Thursday 13 February in Strasbourg. The Council of the European Union and the European Parliament must find a common position on a text which aims to tighten the restrictions on the export of this type of goods,including surveillance technologies
India is projected to have more than 730 million users by 2020 which will make it the third largest market of internet users after the United States and China. Over the last few years, internet adoption in the country has grown at almost 44 per cent annually
Despite the creation of international and regional commissions for financial crimes, the challenge keeps persisting. Financial institutions lost huge amount of money every month, money transfer are been hacked and withdrawn by cybercriminal in partnership with dishonest staffs
Criminal investigations are often challenging due to negligence and inadequate cybersecurity measures by mobile operating companies and law enforcement officers