The Indian Government upholds cybersecurity through Information Technology Act, 2000. The Act prevents, controls and punishes cyber misconducts. Cybercrimes are basically unlawful acts performed by using or targeting a computer technology and therefore come under the ambit of Cyber Law. With the emergence of e-banking, e-commerce, and e-governance, such crimes are on an upsurge. In the wake of this, it was rather a necessity to encompass the world of technology with a specific law. Today, every unlawful activity such as fraud, harassing, defaming, spoofing, stalking, pornography, gambling etc. come under the ambit of cybercrime. Our expert cyber law advocates in Dehradun adopt a tactical approach while dealing in cybercrime cases.
B&B Associates LLP is the only law firm in Dehradun which has an active collaboration with private cyber forensics. This collaboration effectively helps our cyber lawyers in matters of evidence determination. Besides, our forensic partners are renowned for having worked on some of the most crucial cybercrime cases, as well as other cases of national significance.
The law firm takes up matters of cybercrimes against person, personal property, government, against the society at large, and against international subjects.
Besides, hackers pose a serious threat of damage to the intellectual property of the subject by modifying software and programs. On an extreme end, hacking can cause damage to property and lives by taking control of hardware devices and carrying out destruction and terrorist activities (as seen in sci-fi movies).
Negative tendencies such as lust and voyeuristic intent can also play as motivator behind hacking, besides, some hackers hack for the purpose of causing annoyance and satisfying their whim by being destructive. Such hackers are generally referred to as “Crackers”.
b. Black Hats
The “Black Hats” hack systems and programs purely out of an intellectual curiosity. These black hat hackers are hired by an IT companies to find errors/ lapse/ flaw/ vulnerability in programs and security systems and develop methods of making them more secure. When hired for an ethical purpose, these “black hat” hackers are referred to as “White Hat” hackers.
c. White hats:
You saw it coming didn’t you? Ironically, these hackers legally hack to prevent the abuse of a computer system ‘by an unauthorized/ wrong person’. Their work essentially is to find the vulnerability and breach into a computer program/ systems. However, the purpose of a white hat hacker does not always remain altruistic. At times, white hat hackers turn back to being back hat hackers for garnering further fame or to land even better paying jobs with top IT companies. While at other times, the white hats turn black to quench a fetish of being termed as “security experts”.
“Grey Hat” hacking:
Interestingly, as always, here too is a zone between the black and the white called the “Grey Hat” hacking. For example, hacking done for a client under an assignment of which the scope is ambiguous. Or, any hacking done with an intent of causing a benefit.
A few computer geniuses who once use to be hackers:
We do not promote hacking or idealize it. As cyber lawyers, however, we cannot rule out the chances of hacking committed by an impersonator. It is our job to make a distinction between various sorts of hacking, and ensure that an innocent person or an accused is not wrongfully tried. Besides, we ensure that the due process of law is adopted.
a. SQL Injections: A breach in an unprotected SQL Database. Hackers track down the vulnerabilities in a website’s software program and inject SQL hacking code in web-entry fields such as username and password fields. The SQL hack is an additional command which manipulates the contents of the database to enable a successful login. By this method, a hacker can take control of the backend as well as user accounts and cause serious harm by stealing and misusing valuable propriety, business, and financial information.
b. FTP Password theft: Another way of tampering with the websites, this method plays on the vulnerability of webmasters who store confidential login information on poorly protected computers. The hacker pulls FTP login details and relays it to a remote computer to log into a website to pose threat and cause damage.
c. Cross-Site Scripting: Formerly known as CSS but to avoid confusing with “Cascading Style Sheets”, Cross-Site Scripting was renamed as XSS. In absence of a firewall, it becomes easy for hackers to circumvent a security system. Hacker injects a malicious program or script onto a webpage and when a user visits the page, the script automatically gets downloaded and executed on the user’s system. To achieve this end, a hacker may use any script such as HTML, VBScript, Java, Flash, ActiveX etc.
b. Trojan horse: Borrowed from Homer’s Odyssey, the name has been rightly attributed to a kind of malware (malicious + software) which masquerades a regular file such as an email attachment from a believable source, and does not disseminate itself. A Trojan-horse can get downloaded along a program while surfing internet and accessing various games, sites, applications etc. Like other viruses, Trojan Horse can cause theft of information and damage in numerous ways.
Apart from the above-mentioned cybercrimes, our qualified and experienced cybercrime lawyers in Dehradun have an expertise in dealing matters of cyber extortion, cyberbullying, child pornography, revenge-porn, libel, and defamation, cyber fraud etc.
Overview: Technology has affected every sphere of our lives, and personal relationships aren’t untouched from it. With the increasing numb
Introduction Public Interest Litigation, as the name suggests, means litigation for the protection of the public interest. This kind of laws
Hacking is one of the types of cyber crimes in India. Cyber crimes basically are the unlawful acts that involve the use of a computer either
Overview The E-commerce sector in present days is witnessing an unprecedented rise, wherein the online buyers are no more limited to the you
Cybercrime is a broad term which is used to define a criminal activity in which computers or computer networks are either a tool or a target
Recent Landmark Judgements
#588, Sector 6
Panchkula, Haryana, 134109
#624 Sector 16-D
#52, Swastik Vihar-II MDC
Sector 5, Panchkula, 134114
360, Sector 19 ,
Faridabad Haryana 121007
501, KT – 4, Jaypee’s Wish Town,
Sector 128, Noida, NCR 201304
A-1-4 Pinnacle Residency,
Rajpur Road, Dehradun
565KA/94, Amrudhi Bagh, Singar Nagar,
Alambagh, Lucknow, Uttar Pradesh 226005
#33, Sector 2, Guru Gian Vihar,
Jawaddi Taksal, Ludhiana, Punjab 141002