Search This Blog

Saturday, August 13, 2011

Zango and kaspersky case

Zango, an online media company, came up short in its attempt to force an anti-virus company to reclassify its "spyware" tag for the company's adware.

The U.S. District Court for the Western District of Washington ruled in favor of Kaspersky Lab, granting the security company immunity from liability in a suit filed by Zango. According to Kaspersky, Zango sued them to force the company to reclassify Zango's programs as "non-threatening" and to prevent Kaspersky's security software from blocking Zango's programs. 
"Kaspersky Lab's mission is, and has always been, to make the Internet a safer place for all," said Steve Orenberg, president of Kaspersky Lab, USA, in a statement. "We are thrilled with the outcome of this case because it supports the key message of the information security industry -- consumer protection comes first."

The judge threw out Zango's lawsuit on the grounds that Kaspersky was immune from liability under the Communications Decency Act, part of which states that a provider or user of an interactive computer service shall not be held liable on account of any action voluntarily taken in good faith to restrict access to material that the provider or user considers to be "obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable."
Kaspersky noted that the ruling protects the consumer's right to determine what information and software is allowed on their computer, and gives anti-malware vendors the right to identify and label software programs that may be potentially unwanted and harmful to a user's computer as they see fit.

India phishing case

One financial Institute registered a crime stating  that some persons (“perpetrators”) have perpetrated certain acts through misleading emails ostensibly emanating from ICICI Bank’s email ID. Such acts have been perpetrated with an intent to defraud the Customers.
The Investigation was carried out with help of those emails received by the customers of that financial Institute and arrested the accused , the place of offence at Vijaywada  was searched for the evidence . There one Lap Top and Mobile Phone was seized which was used for the commission of the crime
The arrested accused had used open source code email application software for sending spam emails. He has down loaded the same software from net and then used it as it is.
He used only VSNL emails to spam the email to customers of financial Institute because VSNL email service provider do not have spam box to block the unsolicited emails.
After spamming emails to financial Institute customers he got the response from around 120 customers of which 80 are genuine and others are not correct because it do not have debit card details as required for e-banking.
The financial Institute customers those who have received his email felt that the email was originated from the financial Institute bank. When they filled the confidential information and submitted that time said information was directed to accused. This was possible because the dynamic link was given in the first page (Home page) of the fake web site. The dynamic link means when people click on the link provided in spamming email that time only the link will be activated. The dynamic link was coded by handling the Internet Explorer onclick() event and the information of the form  will be submitted to the web server (Where the fake web site is hosted). Then server will send he data to configured email address and in this case email configured was to the accused email .  So on submission of the confidential information the information was directed to email ID accused email .The all the information after fishing (user name, password, Transaction password, Debit card Number and PIN, mothers maiden name) which he had received through Wi-Fi internet connectivity of Reliance.com which was available on his Acer Lap Top.

Egypt and US. phishing case

The US and Egyptian fraudsters were accused of using phishing scams to steal account details from hundreds, possibly thousands, of people, and transferring about $1.5 million into fake accounts they controlled.

The group of fraudsters were accused of targeting US financial institutions and victimising a number of account holders by fraudulently using their personal financial information after they were successfully phished.

The arrests were the result of an investigation called ‘Operation Phish Phry’. Starting in 2007, FBI agents worked with US financial institutions to “identify and disrupt” criminal phishing gangs.

“This international phishing ring had a significant impact on two banks and caused huge headaches for hundreds, perhaps thousands of bank customers,” said Acting US Attorney George S. Cardona, in a statement.

“Organised, international crime rings can only be confronted by an organised response by law enforcement across international borders, which we have seen in this case.”