Cyber crime up four-fold in three years in India – report

cyberIn India, there has been a surge of approximately 350% in cybercrime cases registered under the Information Technology (IT) Act, 2000 from the year of 2011 to 2014, a ASSOCHAM-PwC joint study said.

The Indian Computer Emergency Response Team (CERT-In) has also reported a surge in the number of incidents handled by it, with close to 50,000 security incidents in 2015, noted the study titled ‘Protecting interconnected systems in the cyber era’.

The study highlighted that Operational systems are increasingly subject to cyberattacks, as many are built around legacy technologies with weaker protocols that are inherently more vulnerable.

The continued and regular sharing of cyber security intelligence and insights is essential to improving the resiliency of these systems and processes from emerging cyber risks.

“Cyberattacks around the world are occurring at a greater frequency and intensity. Not only individuals but also businesses and governments are being targeted. The profile and motivation of cyber attackers are fast changing”, highlighted the joint study.

With an increase in the usage of information and operational technology (OT) and consumer technology (CT) in critical infrastructure, overall effectiveness has increased. However, these elements have also become the target of choice for attackers since they recognise the impact of disrupting the routine way of life.

Attackers can gain control of vital systems such as nuclear plants, railways, transportation or hospitals that can subsequently lead to dire consequences such as power failures, water pollution or floods, disruption of transportation systems and loss of life, noted the study.

In the US alone, there has been an increase of nearly 50% in reported cyber incidents against its critical infrastructure from 2012 to 2015, adds the paper.

“Cyberattacks around the world are occurring at a greater frequency and intensity. Not only individuals but also businesses and governments are being targeted. The profile and motivation of cyber attackers are fast changing. A new breed of cybercriminals has now emerged, whose main aim is not just financial gains but also causing distruption and chaos to businesses in particular and the nation at large,” Assocham said.

The National Critical Information Infrastructure Protection Centre (NCIIPC) has been identified as the nodal agency under the National Technical Research Organisation for the protection of critical information infrastructure. The formal roles and responsibilities of NCIIPC include cooperation strategies, issuing guidelines, advisories and coordination with CERTIn.

NCIIPC has defined controls for the critical infrastructure sectors—power and energy; banking, financial services and insurance (BFSI); ICT; transportation; and e-governance and strategic public enterprises.

“The continuous research and development can help in capacity building and coming up with effective solutions, adds the study. A cross-sector knowledge database inclusive of all the past incidents and threats needs to be maintained and analysed to strengthen protection measures.

“Relevant, properly configured technology Investment in the right technology is another key characteristic of resilient OT and CT networks. Using the right detection, prevention, monitoring and reporting tools will help organisations to prevent attacks and facilitate informed decision-making in relation to possible cyber security threats.

“A strong collaboration between well-equipped IT, OT and CT teams is also necessary for a unified approach to risk management and incident response. Monitoring OT and CT must be brought under the ambit of security monitoring, as in the case for IT networks. The periodic monitoring programme should include log monitoring, vulnerability assessments and audits of these interconnected systems. Central monitoring through nodal bodies will help in institutionalising the efforts.”

With regard to security incidents in critical infrastructure, organised efforts are required to reduce the potential cascading impact and response time. Incident response for critical infrastructures requires a partnership between public and private organisations to perform analysis, issue early warnings and coordinate response efforts, it added.

“Accordingly, they should build a forward-looking cyber security programme that is based on the right balance of technologies, processes and people skills—all supplemented with an ample measure of innovation. With these components in place, organisations are likely to be better prepared for the future of cyber security.”

The study revealed that in the past attacks have been mostly initiated from the countries such as US, Turkey, China, Brazil, Pakistan, Algeria, Turkey, Europe, and the UAE, and with the growing adoption of internet and smartphone India has emerged as one of the most favorite countries among cyber criminals.



Tech Mahindra opens robotics, AI and digital services center in Dublin IT services provider Tech Mahindra opened a new facility in Dublin, Ireland to focus on emerging technologies such as Robotics and Automation, Business Analytics, Cloud Infrastructure and Digital Services.The new centre would employ around 150 engineers over the next three years and will help the company deliver technology services to clients in Ireland ...
PayTM hit by Rs 6.15 lakh fraud PayTM, India's largest wallet company, has been cheated to the extent over Rs 6.15 lakh by 48 customers claiming illegal refunds for goods they already received.A case has been registered with the Central Bureau of Investigation, which is currently looking into the matter.Besides PayTM, others such as Freecharge and MobiKwik are also present in the f...
PM Modi’s official Twitter account gets ambushed by AAP For long, the Bharatiya Janata Party held the upper hand on Twitter -- which -- along with comment boards on news websites -- forms the 'wild west' of political online campaigning in India with large-scale manipulation, 'fake' accounts, bullying and targeted attacks.Not to be outdone, the Aam Aadmi Party -- or some of its supporters -- have hit back by d...
Narendra Modi’s official Twitter account gets ambushed by AAP For long, the Bharatiya Janata Party held the upper hand on Twitter -- which -- along with comment boards on news websites -- forms the 'wild west' of political online campaigning in India with large-scale manipulation, 'fake' accounts, bullying and targeted attacks.Not to be outdone, the Aam Aadmi Party -- or some of its supporters -- have hit back by d...
Muthoot Group offers online Will generation facility under tie-up with WillJini The Muthoot Group said its broking and wealth management division, Muthoot Securities Limited, launched iWill -- a service which offers online will writing in just 30 minutes.Muthoot Securities has launched this product in association with WillJini Succession Services Private Limited.“iWill enables customers using a smart phone to make a will online ...
Cyberinc to launch malware isolation product in India Cyberinc, an Aurionpro solutions company, said it will launch a malware isolation product ‘Isla’ in India on December 1st.“Cyberinc's Isla web malware isolation system protects organizations from the most advanced web borne threats by isolating all web content outside the network perimeter,” said the company.“This approach will help eliminate the ris...
DON’T BE A VICTIM: UID Chief urges people to write purpose on Aadhaar copies The head of the Unique Identity Authority of India has urged the public to write down the purpose and date when they submit photocopies of their Aaadhar cards to exchange currency notes to prevent misuse.“Photocopies of the Aadhaar letter are being submitted by the general public to banks. We urge them to clearly indicate the purpose for which they are s...
Infosys invests TidalScale, provider of simple supercomputing software Technology provider Infosys said it made investment in TidalScale, a provider of software-defined server.No details about the financial aspects of the investment were made public.TidalScale's offering, in many ways, is the opposite of virtualization. While virtualization allows you to split a single hardware-based server into several virtual serv...
Income Tax Dept website now shows your bank accounts with cash transactions Thanks to technology, the Income Tax department is now able to track all your bank accounts in all the banks in India, and show you the details on its website.The details of your accounts can be seen on incometaxindiaefiling.gov.in -- the portal used to file your income tax returns.As of now, only those accounts which have substantial cash transactio...
Mindtree opens new Salesforce facility in Germany IT services provider Mindtree said it launched a new salesforce facility in Munich, Germany.This salesforce centre of excellence is anchored by Magnet 360, a salesforce partner and wholly-owned subsidiary of Mindtree.Salesforce is the world’s leading pureplay cloud player and offers software such as those used for customer relationship management. ...
Zensar wins Oracle deal from US catalog retailer Full Beauty IT services provider ZenSar Technologies said it won a contract to implement Oracle Applications Release 12 to tranform the financial and procurement processes of e-commerce and catalog retailer Full Beauty Brands .FullBeauty Brands is a leading American plus-size women's and men's apparel and home goods company having eight proprietary brands.The ke...
Cognizant cuts FY growth guidance to 8.5%-9.0% from 8.5%-9.5% Cognizant, the low-margin, high-growth IT services company, seems to also have fallen prey to the ongoing slowness in the IT outsourcing sector.The company reported revenue growth of just 2.5% -- less than that of Infosys -- for the third quarter of this calendar year. Infosys had reported a growth of 3.5% in dollar terms, while TCS had reported an incre...
Wipro joins the Open Banking bandwagon, releases new platform Wipro Limited launched its offerings that use Open Banking API technological platform.Open Banking platform is a Europe-based standard that lets third party developers build applications and services that tap into a bank's core services and infrastructure.For example, one can build a billing or ticket booking or payment service that can then 'talk' ...
Yes Bank unveils Aadhaar-powered billing machine for small companies Yes Bank has introduced a new billing machine for small businesses tying together Card & UPI payments, Aadhaar E-KYC and Aadhaar E-signing on a ready-to-use basis.This will help small and medium businesses to do their billing and accept payments and also disburse small loans completely electronically at any time to participating merchants, said the b...
Cognizant to help transform Future Group’s consumer business Cognizant said that it has entered into a partnership with Future Group, an Indian multi-brand retailer, to transform its consumer goods business, Future Consumer Limited (FCL), into a connected enterprise.“In an era where data, insights and supply chain intelligence are crucial ingredients for turning success into market leadership, Cognizant’s technolo...