Resources by Pavan Duggal


The following are the various resources collated by Pavan Duggal the Conference Director.


  1. The Current State of Cybercrime 2014
  2. Security Threat Report 2014
  3. TREND MICRO | TrendLabs 1Q 2014 Security Roundup
  4. Security Threat Report 2014
  5. Security Threat Report 2013
  6. Fortinet 2013 Cybercrime Report
  7. 2013 Norton Report
  8. Freedom on Net Report 2013
  10. 2013 Cost of Cyber Crime Study: United States
  12. 2013 Data Breaches Investigations Report
  14. Key findings from the 2013 US State of Cybercrime Survey
  15. Cyber crime: A review of the evidence – Summary of key findings and implications (2013)
  16. Cybercriminals Target Android Platforms (2013)
  17. Juniper networks Mobile threat Center third annual Mobile threats report: MarCh 2012 through March 2013
  20. C Y B E R C R I M E & S E C U R I T Y SURVEY REPORT 2012
  21. 2013 Internet Crime Report
  22. Cyber Crime and Security Survey Report 2012-Australia
  24. IAB Internet Advertising Revenue Report FY 2013
  25. Ofcom Report on Internet Safety
  26. RBI-Report on Internet Banking
  27. StatCounter-Internet-Wars-Report
  28. The State of the Internet-Akamai
  29. Europol issued 2014 iOCTA report on evolution of cybercrime
  30. 2014 Internet Security Threat Report, Volume 19
  31. Symantec Intelligence Report: September 2014
  32. The continued rise of DDoS attacks by Symantec
  33. Report: Cybercrime costs US $12.7M a year
  34. Governance survey for 2014- Thomson Reuters
  35. The Ponemon Institute completed their annual look at how well companies are coping with cyber attacks. Cybercrime is up 10.4% over the previous year
  36. Security 2015: Targeted attacks to become more widespread


  1. An Investigative Study of Banking Cyber Frauds with Special Reference to Private and Public Sector Banks
  2. Project 2020
  3. Case Studies on Cyber Crimes: Regional Training Institute
  4. Study of Indian Banks Websites for Cyber Crime Safety Mechanism
  5. Legal Issues Relating to Outsourcing in India
  6. Internet Monitor 2013: Reflections on the Digital World (2013)
  7. Harmonizing cyberlaws and regulations: the experience of  the East African Community (2013)
  9. cyberdialogue 2012 hathaway-savage
  10. Digital Sweden
  11. The Ghost In The Browser
  12. Use of Social Networking Sites in Online Sex Crimes Against Minors
  13. women and the web
  14. There Is No Constitutional Right to Harass Women Online
  15. WordPress most targeted CMS by hackers?
  16. Microsoft Ready With Nine Bulletins, New Critical IE Patches
  17. U.K. Businesses Don’t Share Cybercrime Intel With Police, Met Chief Says
  18. How Anonymous United Around the Cult of Namelessness
  19. British writer to explore the dark side of the internet
  20. Study considers Computer Security Incident Response
  21. Smartphone effect? Cybercafes take the exit route as losses mount
  22. Cost of cyber attacks increases by 10.4% in 2014
  23. Cyber risks evolving faster than business capabilities, says accountancy body
  24. Most cyber attacks now come from outside
  25. Six types of killer use Facebook to commit crimes, says study

Cyber law

  1. Judiciary to Get Lessons in Cyber Law
  2. Lawmakers push cyber law after JPMorgan hack
  3. Cyberlaw adoption in Latin America moves forward
  4. Media Watchdog Says Qatar Cyber Law Threatens Freedoms
  5. Facebook Tells the DEA That Fake Accounts and Covert Ops Are Not Welcome
  6. Skills set a priority over legacy prejudices, experts say
  7. Chief Judicial Magistrate orders to probe Saritha clippings
  8. Businessman defamed on website, FB
  9. Socializing with a virtual wallet
  10. A federal robotics agency? Law professor makes the case
  11. Who Should Be Unmasked on the Internet?
  12. Can a company stop you from writing a negative online review? Not if Congress passes this bill
  13. Social media has its highs, but is it becoming a weapon for riot-mongers?
  14. Europe’s police need data law changes to fight cybercrime – Europol
  15. $42 million to strengthen Singapore’s cyber infrastructure against threats: DPM Teo Chee Hean
  16. Facebook slur against Shastri couple’s daughter – two Math supporters held
  17. Kiss of Love Facebook Page Vanished, Say Organisers
  18. Netizens Hit by Cyberpolicing
  19. Cyber security: Security awareness can’t be just a one off
  20. Australian State Imposes Up To Two-Year Sentences For ‘Sexting’ Without Consent
  21. New rules in China for smartphone apps
  22. Korea needs to clarify data transfer rules
  23. Overseas Cambodians told cyber law applies
  24. The Law Needs To Keep Up With Technology But Not At The Expense Of Civil Liberties
  25. Due Diligence in a Big Data World
  26. The Morning Risk Report: Lawsuit Could Define Scope of Cyber Liability Coverage
  27. Cyber laws must explain how businesses can collaborate on risk protection, says expert
  28. India must rethink its cyber laws to allow free expression on social media
  29. Tighten cyber laws to protect citizens, says RBI official
  30. Mumbai cops go to class, give youths tips on staying safe on Net
  31. Police must stop frivolous arrests, keep up with changes in law: Experts
  32. Cyber law cases: Grey area where judge takes final call
  33. Cyber bullying rampant in India, legal vacuum persists
  34. Cyber law takes bite at first victim

  35. Sharing of lewd content rises with smartphone

  36. Area no bar, new cyber cells to handle cases anywhere in Mumbai

  37. India ranked 2nd in cyber attacks through social media in 2014 

  38. Freedom of expression on internet should not be a license to bully girls

  39. U.S. Senate fails to advance law on cyber attacks

  40. Report Highlights Fears of Impending Cyber-Law in Cambodia

  41. The Country That Could Reshape Cyber Law

  42. US Army website hacked as Obama demands cyber law

  43. China’s Draft National Security Law Stresses Cyber-Sovereignty And Protecting Socialist Values, Increases Pressure On Hong Kong

  44. Kuwait passes tough new cyber, terror law

  45. Report Highlights Fears of Impending Cyber-Law

  46. The power of e-will

  47. Retailers Urge Senate to Pass Cyber Intelligence Sharing Bill

  48. Cyber security measure blocked in Senate

  49. Kuwait passes tough new cyber, terror law

  50. This app will help crack cyber crime cases

  51. Cyber law to protect against ‘vicious’ bullying

  52. Robotics and the law: When software can harm you

  53. Another Post 9/11 Police State Law: The Cybersecurity Information Sharing Act (CISA) Targets Fundamental Civil Liberties

  54. New Chinese law reinforces government control of cyberspace

  55. When the intelligence community is exposed

  56. Report: What is the U.S. Government’s Role in Cybersecurity?

  57. FTC’s Authority in Cybersecurity Cases Resoundingly Confirmed

  58. Social media misuse and Indian cyber law
  59. Proposed Cyber Law Wants To Bring Your Email Password Under Police Lens
  60. India encryption policy draft faces backlash
  61. Group Content Is Your Headache, Says Law
  62. Legislators urge gov’t to implement cyber laws
  63. How aware are UAE residents of cyber crime laws?
  64. Spl cybercrime court is city’s need of the hour
  65. Cyber Legislation Coming Soon to the Senate Floor

Cyber crime

  1. Maharashtra leads in cyber crimes in 2012!
  2. India arrested over 1,600 for cybercrimes in 2011
  3. Draconian penalties are on the rise in India… And the punishment doesn’t seem to fit the crime
  4. In midnight drama, two AI crew members were held under IT Act
  5. India 5th in cyber crime affected countries’ list
  6. The Great Indian Robbery: Cyber crime costs India 8 billion USD
  7. Cyber crime wing registers case against Facebook user
  8. ‘System hangs’ at first cyber crime police station
  9. ‘Indian police not capable of solving hi-tech cyber crimes’
  10. Cybercrime to go mobile, social in India in 2013
  11. Cyber crime: Fake accounts face action in Pune
  12. India lost Rs 34,200 crore to cybercrime last year 
  13. Cyber crime on the rise; but what about arrest?
  14. More children fall prey to cyber crime as web users get younger
  15. Schools to sensitise kids on cyber crime
  16. Kapil Sibal rules out changes in cyber law
  17. CBMs in Cyber Space: What should be India’s Approach?
  18. After Websites, Anonymous India to Hit Streets Against Cyber Laws
  19. No need for censorship of internet: Cyber law experts
  20. Cyber laws: Loopholes aplenty
  21. Cyber crime to be a bigger security concern in 2013
  22. How the 45 million dollar ATM heist poses danger to India’s IT industry
  23. Britain and India to agree cyber crime joint taskforce
  24. Gurgaon: Over 700 cyber crime complaints received
  25. 2,464 cases of cyber-crimes were registered in 2012: Milind Deora
  26. Gurgaon officer given ‘Cyber Cop of the Year 2013’ award by DSCI
  27. India to propose Indo-American Alert, Watch and Warn Network to combat cyber-crime
  28. PNB customers targeted by phishing email scam to steal passwords: Websense
  29. Ransomware blackmails you to pay, steals your data and never leaves your computer
  30. Reliance Capital files complaint against fake website
  31. Software techie held for harassing woman by fake Facebook posts
  32. Ahmedabad police offer ‘Help in Emergency’ app on cell-phones
  33. Hands-on training to Andhra Pradesh police officers to probe cyber-crimes
  34. Five-star hotel gets bomb threat through email
  35. Comprehensive Study on Cybercrime
  36. E-crime
  37. Cyber-Crimes and their Impacts: A Review
  38. Cybercrimes A Financial Sector View
  39. Invading privacy: Cyber crimes on the rise
  40. Criminal money flows on the Internet
  41. Automating Online Banking Fraud
  42. CYBER CRIMES – National Crime Records Bureau
  43. Combating Computer Crime: An International Perspective
  44. Cyber Crime and Cyber Security
  45. Cybercrime Attribution: An Eastern European Case Study
  46. Cybercriminal Activity
  47. CYBERCRIME – United Nations Office on Drugs and Crime
  48. PWC Nigeria Cybercrime Event
  49. Cyber-crime, securities markets and systemic risk (IOSCO Research Department and World Federation of Exchanges) (2013)
  50. International Comparison of Cyber Crime
  51. Cybercrime – Security Risks and Challenges Facing Business (2013)
  52. Organizations and Cybercrime (2013)
  54. Cyber Crime – A Growing Challenges for Government
  55. Cyber crime A review of the evidence
  56. EY-Beating-Cybercrime
  57. Indian Audit and Account department-CaseStudiesonCyberCrimes
  58. Organized Cyber Crime and Bank Account Takeovers
  59. The 10 Most Mysterious Cyber Crimes
  64. Why cyber criminals are winning: The secret weapon of the black hats
  65. Putin Says Will Boost Internet Security Without ‘Total Control’
  66. Europol Analyzes Cybercrime Services Industry
  67. Malvertising Threats Underscore the Need for an Approach to Security that Addresses the Full Attack Continuum
  68. DDoS Attacks Decline in Q2: Akamai
  69. Research Examines Twitter Abuse by Attackers
  70. Hackers Charged in Software Theft from U.S. Army, Others
  71. S. Authorities Indict Maker of Mobile Spy App ‘StealthGenie’
  72. New Data Breaches Hit Supervalu, Albertson’s
  73. FBI Launches Malware Investigator Tool
  74. New Interpol Complex in Singapore to Boost Fight Against Cybercrime
  75. JPMorgan: Info on 76 Million Households Hit in Data Breach
  76. China Cybercrime Costing US Billions: FBI Chief
  77. Feedback Friday: 83 Million Account Holders Hit by JPMorgan Breach – Industry Reactions
  78. K. Invests Heavily in ICS Cyber Security Research
  79. Data breaches rise as cyber criminals continue to outwit IT
  80. Shellshocked: Yes, it’s a huge threat, and here’s why
  81. Monica Lewinsky Speaks Against Cyber Bullies…and Gets Cyber Bullied
  82. ‘Citizenfour’ Is Mesmerizing (If You Don’t Mind the Omissions)
  83. Vietnam police hunt hackers behind mass outage
  84. Dimon urges joint attack on hacking
  85. Stop cyber business built on stolen property
  86. Beyond bullying: Local teens share their stories of being bullied
  87. China Police arrest 30,000 in cyber crime crackdown
  88. Indo-Pak tension flares on cyberspace: Press Club of India’s website hacked
  89. Indian hacker hacks Pak railways website, says keep dreaming about Kashmir
  90. Dairy Queen Customer Data Compromised by Backoff Malware
  91. China angered after FBI head says Chinese hacking costs billions
  92. Cyberattacks trigger talk of ‘hacking back’
  93. Devices being remotely wiped in police custody
  94. Hackers Leap from Dark Basements to World Stage
  95. Social Media: More Hindrance Than Help in Banks’ Cybercrime Fight
  96. Cybercrime: The Next Entrepreneurial Growth Business?
  97. Bitcoin will do nicely — the state of Russian cyber crime
  98. Cybercrime Costing the US Billions: FBI Chief
  99. Interpol opens Singapore center to fight cyber crime
  100. Madras High Court seeks details of cyber crime complaints
  101. European banks team up with Europol in cybercrime fightback
  102. Couple sues Japanese, others for estafa, cybercrime
  103. Revenge Porn Is Malicious and Reprehensible. But Should It Be a Crime?
  104. FBI identified hackers which stolen intellectual property of Xbox One
  105. Tanzania: Cyber Criminals Deprive Country of Sh10 Billion
  106. Benton County Cyber Crimes Division Targets Sexual Predators
  107. Russian cybercrime group compromised half a million computers
  108. When it comes to cybercrime, we are the weak link
  109. Britain threatens Internet ‘trolls’ with two years in jail
  110. McAfee Next generation firewall empowers enterprises to more effectively fight cybercrime with expanded threat defense ecosystem
  111. Hacked: The escalating arms race against cybercrime
  112. Cybercrime now becoming a serious problem for many Britons
  113. Cyber crime: NIE principal’s email account hacked
  114. Businesses underestimating threat cybercrime poses to profitability, cashflow and reputation, according to experts
  115. MMS Sparks Rally for Curb on Cyber Crime
  116. Hacker sentenced to 21 months in U.S. prison for $15 mln scheme
  117. Cybercrime fighters to target kingpins, says top EU cyber cop
  118. Edward Snowden is hampering the war on cybercrime, says Europol
  119. Connected Cars Vs. Cybercrime: Tough Fight
  120. DTCC urges greater collaboration on cyber-crime threats
  121. Christian Slater Joins USA’s Cyber Crime Pilot ‘Mr. Robot’
  122. Nigeria Senate Passes Cybercrime Bill
  123. Retailers prepare for cybercrime offensive
  124. Rising cyber crimes have magnified challenges: Rajnath Singh
  125. Navi Mumbai witnesses spurt in cyber crime cases
  126. Police vs cartels in the high-tech battle to stop cybercrime
  127. Business needs to take cyber crime seriously, says top EU cyber cop Troels Oerting
  128. Police Minister Announces Plan to Combat Cyber-Crime
  129. Cybercrime genius jailed after £6.3m theft from RBS
  130. Why International Cybercrime Is Going To Keep Getting Worse
  131. Tanzania: Cyber Crime – ICT Experts Grapple With Thefts, Online Piracy
  132. Get to know Voxis, the cybercrime platform for evading fraud detection
  133. The Right and the Wrong Way to Tackle Corporate Cyber Crime
  134. Nigeria Will Imprison Cyber Criminals for 7 Years
  135. IBM puts big data tools in the cloud and unleashes rapid cybercrime fighting software
  136. ‘Be aware of cyber crime’ – plea after thousands hit by Peter Pan virus
  137. 2 MINUTES ON: ‘Cybercrime-as-a-service’
  138. ‘Every day is a challenge’ – Inside Europol’s fight against cybercrime
  139. Students contacting Legal Aid over cyber bullying charges
  140. Cyber Crimes Cell Detects Nation Wide Tax Returns Fraud
  141. Cyber Crimes Cell detects nation-wide tax returns fraud
  142. Dangerous Hacking Threat: “Cyber Murders”
  143. Pirate Bay co-founder arrested in Thailand
  144. Law targeting cyber-bullies raises civil liberties concerns
  145. Holland asks India to join global cyber crime control initiative
  146. Cyber crime: First online murder will happen by end of year, warns US firmКопирано от
  147. More than half of UK citizens hit by online crime, shows Get Safe Online survey
  148. Urgent need to strengthen global counter terrorism architecture: Rajnath at Interpol meet
  149. Third of advisers targeted by cyber crime
  150. Playing for Keeps: How Cyber-Criminals are Following the Money to Video Games
  151. Why are Teens Searching for the Term “How to Kill Yourself”, NoBullying Investigates in an article released Today
  152. Patna police’s cybercrime cell still defunct
  153. Navi Mumbai witnesses spurt in cyber crime cases
  154. Cybercrimes rise nearly 3-fold in 1 year
  155. Dedicated squad at each police station to probe cyber crimes
  156. Cyber Crimes Cell detects nation-wide tax returns fraud 
  157. Indian organisations lack skills to combat cybercrime: Report
  158. Ethical hackers step in to solve cyber crimes
  159. Strategy to prevent cyber crime on anvil: Rajnath Singh
  160. Thirty percent of Indian school-goers face cyber crime
  161. India faces talent crunch to fight cybercrime: NTRO
  162. Small-town India turns out to be hub of cybercrime
  163. ‘Bank executive’ calls Mumbai lawyer to verify credit card details, robs him
  164. Email ID hacked, Rs 1.13 crore withdrawn from NRI’s account
  165. Conmen trick film scholar
  166. Bizarre revenge plot in cyber space
  167. Nerul woman fraudulently withdraws 40,000 using brother-in-law’s cloned debit card, booked
  168. Cyber crimes on the rise in India, Maharashtra, AP, Karnataka top list
  169. Cyber crimes alone cost India Rs.24,630 cr in 2013
  170. India Takes Down Its First Cyber Criminal
  171. Amrita-Digvijaya leak shows Delhi police’s failure to curb cyber crime
  172. Hackers deface Hazrat Nizamuddin Dargah website, case registered
  173. Cybercrime cases shot up in last 10 years: Telecom minister Ravi Shankar Prasad
  174. Experts favour PPP projects to arrest rise in cyber crimes
  175. Data theft threat sees rise in cyber security insurance policies
  176. Needed: full-fledged cyber crime police station
  177. Cyber crimes increase by 51 per cent
  178. Holland asks India to join global cyber crime control initiative
  179. Mumbai cyber crime cell sends takedown request to TwoCircles
  180. Ill-equipped Samta Nagar police transfer debit card fraud to cyber crime cell of Mumbai police
  181. Children prey to cyber-crime; majority of parents don’t feel so 
  182. Man cheated of Rs 29 lakh by cyber criminals
  183. ‘Actors an easy target for cybercrimes’
  184. Engineering Student Arrested for Debit Card Fraud in Hyderabad
  185. Madras High Court Seeks Details of Cybercrime Complaints
  186. How India’s First Wildlife Cyber Crime Cell Helped Nab Tiger Poachers
  187. Kerala’s CyberDome to Fight Cyber Crime
  188. Crime Branch officers undergo training in cyber crime probe
  189. Need to re-look at IT Act to counter cyber crime: Govt
  190. Sony makes cybercrime even more dangerous
  191. Indian Government agency received almost 100k cybercrime complaints till September 2014
  192. Cyber crime cases rise by 39% in Pune this year
  193. Mumbai sees 170% jump in cyber crimes over 4 yrs
  194. India, Japan can work together for cybercrime, ICT development: Prasad
  195. Cyber crime: Hackers can easily access your webcam, capture your private pics to blackmail you
  196. Uber cab rape: Cyber crime experts call for guidelines for apps
  197. Soon, file cybercrime complaints at any police station in Mumbai
  198. PNP partners with Microsoft against cybercrime
  199. Sony breach moves cybercrime into new realm of attacks
  200. Cyber crime police investigations reach record levels
  201. Qatar moves to tackle cyber crime
  202. Cyber Crime Clouds Holiday Marketing Efforts
  203. Kenya arrests 77 Chinese nationals in cybercrime raids
  204. London joins coalition of cybercrime-fighting cities
  205. Facing Up to Online Murder and Other Cyber Crimes
  206. Microsoft’s futuristic cybercrime computer lets you see and hear botnet activity
  207. Cybercrime Group Preys on Wall Street Insider Information
  208. ACORN launched to call out Australian cybercrime
  209. Kenyan raid exposes hive of cybercrime
  210. Tech chief of cybercrime bank gets five year prison sentence
  211. Target for online cartels, Mumbai sees 4-fold rise in cyber crimes in a year
  212. Cyber bullying is a crime, but open to interpretation: Expert
  213. Only small number of Indian youth join ISIS: Govt
  214. Bill in RS to provide for death penalty for hijackers
  215. Parents warned: Beware of Internet code words for cyber-porn
  216. Cyber crime cases under IT Act continue to rise, shows govt data
  217. US urges companies to do more to fight cyber crime
  218. Secret Service Agent: Digital Currencies Fueling Cybercrime
  219. U’khand among leading states in cyber crime detection
  220. Dozens arrested in cybercrime ‘strike week’
  221. Policy needed to protect citizens against cyber crime: RBI ED
  222. Rise in cybercrime targets online buyers
  223. The ongoing war against cybercrime
  224. Cyber criminals target financial professionals involved in deal-making
  225. Cyber crime thrives on cost-cutting culture
  226. Man who made obscene calls to college girl held by cyber crime police
  227. 56 hackers arrested in anti-cybercrime operations
  228. Cybercrime could become more lucrative than drugs, police chief warns
  229. New Cyber Forensics Section to fight rising cyber crimes in Bangalore
  230. Fighting cyber crime in Nigeria
  231. What you should do if your business is the victim of cybercrime
  232. Experts, Researchers Working Towards Cybercrime Prevention
  233. A call to toughen cyber crime laws 
  234. Cyber crime: What every business needs to know
  235. 57 Arrested in Cybercrime Clampdow
  236. Financial cybercrime landscape changing, experts say
  237. Stronger cybercrime policies need of the hour: RBI
  238. CID issues advisory on cyber crime
  239. Cyber criminals use social media to cooperate with each other on executing major attacks
  240. Hackers are ahead in the cyberwar – businesses need to wake up
  241. How to tackle cyber crime before people even know they’re a victim
  242. Government To Up Cyber Crime Fighting Efforts, Civil Servants Training Planned
  243. Cyber Criminals Use Hybrid Tactics Of Ransomware And Catfishing To Extort Mobile Users
  244. India and Japan to join hands to check cyber crime
  245. No Specialists to Deal With Cyber Crime Cases
  246. Traditional crooks including violent offenders turn to cyber crime
  247. ‘Sensitise people to cyber crime’
  248. Experts warn on critical shortage of cybercrime specialists
  249. Govt and Trai looking to clearly outline rules for Net Neutrality law in India: report
  250. Cyber Crime Bill or Cyber Censorship Bill
  251. Cyber crime: two Nigerians held
  252. Use data to fight industrialised cyber crime, says RSA fraud head
  253. Cybercrime now ‘number one’ threat: Europol chief
  254. Why India Inc needs to wake up to cyber crime
  255. Cyber Crime Still on the Rise, Using Nine Basic Attack Methods
  256. Hi-tech lab to help fight cyber crimeEC report: Cyber-crime demands a new approach to law enforcement
  257. Internal Revenue Service Joins Cybercrime Hunt With New Investigation Team
  258. Cybercrime Sees New Scams
  259. Cyber crime victims wait for months for justice
  260. New cybercrime group, Joint Cybercrime Action Taskforce, takes down Beebone botnet
  261. New cybercrime bill to criminalise spam mail, text messages?
  262. ISPs, entrepreneurs and IT stakeholders come out in opposition to proposed cybercrime legislation
  263. Interpol World 2015: Cybercrime increasingly challenging for law enforcement
  264. Commission submits plan to fight terrorism, cybercrime
  265. RBI plans IT wing to deal with cyber crime
  266. Why Is Fighting Cybercrime So Hard?
  267. Cybercrime now ‘number one’ threat: Europol chief
  268. Innovation’s dark side: $2 trillion in annual cybercrime losses projected for businesses by 2019
  269. India, Japan partner to crack down on cybercrime
  270. India saw 60,000 ransomware attacks in 2014, third largest in Asia: report
  271. City to get CERT centre to tackle cyber crimes
  272. FBI, Europol and NCA want global approach to fight cyber-crime
  273. Cyber Crime: Minister for New Law
  274. 500 Cyber Crime Cases in Hyderabad
  275. Experts warn on critical shortage of cybercrime specialists
  276. Report: Cyber Crime Fast Emerging Risk for Companies Around the World
  277. Attacking cybercrime through infrastructure, not individuals
  278. ‘Cyber crime cases may touch 3-lakh mark this year
  279. Cyber crime on a global scale
  280. Cybercrime initiative aimed at solving crimes faster
  281. Netizen Report: The Spring of Cybercrime Laws
  282. APWG eCrime 2015 Explores Cybercrime Threatening Bitcoin and Cryptocurrencies
  283. Cyber crime is the new drug
  284. Cyber Criminal Forum Taken Down Members Arrested in 20 Countries
  285. Polish airline, hit by cyber attack, says all carriers are at risk
  286. Europol tackles ZeuS, SpyEye banking Trojan cybercrime ring
  287. Sanctioning China for Cybercrime Would Be Very Naive
  288. Global drug-dealing cyber crime web was centred on … Aberdovey
  289. Hackers used stolen press releases to make $100m
  290. Six UK Teens Arrested in Connection With Lizard Squad
  291. Accused Turkish mastermind of $55 million cyber spree extradited to U.S.
  292. Cybercrime on the rise
  293. New wave of cyber crime against women in India
  294. Cost of cyber crime per organisation reaches $15 million
  295. Study cites cybercrime’s rising costs to corporations
  296. Data Security and GDPR: How to Mitigate Both Cybercrime and Legal Risk
  297. How police ‘ignore cybercrime’: Just one in 100 cases is investigated despite the number of online fraud cases rocketing in recent years
  298. Expert group suggests dedicated body to tackle cyber crimes

Cyber Security

  1. What you need to know about new zero day that hits most supported Windows versions
  2. Cyber security spend by Indian firms down 17%: PwC
  3. Baltimore Artist, Claire Girodie, to Create New Work for Inaugural Women in Cyber Security Event, 11/12
  4. Security pros forgetting the basics, complains expert
  5. IT Security Stories to Watch: POODLE Vulnerability, TD Bank Settlement
  6. China criticizes US over cyber security accusations
  7. IT Security Workforce Reaches New High
  8. Home Depot Confirms Payment Systems Hack in US, Canada Stores
  9. Erdogan Approves Law Tightening Turkey’s Internet Controls
  10. NSA Chief Says Monitoring Tech-Savvy Islamic State
  11. Ex-NSA director Alexander calls for new cybersecurity model
  12. eBay Seeks Dismissal of Breach Lawsuit
  13. Mobile Malware: Small Numbers, but Growing
  14. How RAM Scrapers Work: The Sneaky Tools Behind the Latest Credit Card Hacks
  15. Insider threat cases on the rise, IC3 warns
  16. Google stops malicious advertising campaign that could have reached millions
  17. Israeli expertise on cybersecurity for India
  18. Private telephone conversations: Dynamic encryption keeps secrets
  19. New bracelet strengthens computer security
  20. New web privacy system could revolutionize the safety of Internet surfing
  21. Signature Systems Breach Expands
  22. ID Theft Service Customer Gets 27 Months
  23. Huge Data Leak at Largest U.S. Bond Insurer
  24. $1.66M in Limbo After FBI Seizes Funds from Cyberheist
  25. Jimmy John’s Confirms Breach at 216 Stores
  26. Why Startups Are The New Super Heroes Of Cyber Security
  27. Apple’s Shellshock patch for Macs is incomplete, says security researcher
  28. Apple, Google encryption of phone data is ‘worrisome,’ could jeopardize ‘catching kidnappers and sexual predators’: US Attorney General
  29. Fappening 4 archive leaked online, the controversy continues
  30. Romanian Hackers exploited Bash Bug flaw to hack Yahoo servers
  31. Europol warning on the risks related to the Internet of Everything (IoE)
  32. ATM hacking easily with RM100 chip and a free malware
  33. A new Mac botnet exploits the Reddit platform
  34. Ello Social Network knocked down by a cyber attack
  35. FBI opens its Malware Investigator portal to the private industry
  36. Analyze VirusTotal Metadata to profile hackers
  37. South Africa: Security Firm Warns Companies on Safeguarding Data
  38. FDA Strengthens Cybersecurity in Medical Devices
  39. Your phone & TV set may be spying on you: cyber security expert
  40. Is Cybersecurity Using Education As An Excuse?
  41. Exploring the ‘insecure by design’ blind spot in industrial systems
  42. Stock turbulence is worrying for IPOs
  43. Obama Signs Order to Secure Government Credit Cards From Data Breaches
  44. Obama signs order to tighten security for federal credit cards
  45. Cybersecurity: Turning the Tide on Hackers with Dispersive Technologies
  46. IT Security Stories to Watch: Kmart, Snapsaved Data Breach Updates
  47. China again blames US for disrupted cyber security talks
  48. Airbus Defence and Space showcases leading security portfolio at Milipol Qatar 2014
  49. How secure is Jamaica from cybercrime?
  50. The Bill for Cybersecurity: $57,600 a Year
  51. EU Holds Largest-Ever Cyber-Security Exercise
  52. Wall Street watchdog to bolster reviews of brokerage cyber security
  53. Online Security Experts Link More Breaches to Russian Government
  54. Isolated computer to be hacked with only a cellphone at Denver cybersecurity conference
  55. Why Russia and China See Eye-To-Eye on Cybersecurity
  56. Former Defense Secretary Robert Gates offers sober critique of U.S. cybersecurity posture
  57. Energy’s unclassified cybersecurity program needs strengthening, IG says
  58. Only Top Legislators Were Informed of White House Network Cyber-Attack
  59. Businesses participate in ‘biggest ever’ cyber security exercise
  60. Data Security Threats Are on the Rise in the Golden State, According to California Attorney General Kamala Harris
  61. US Urges More Government-Business Cooperation on Cyber-Security
  62. NSA director says major hurdles hinder cybersecurity
  63. 5 Ways To Reinforce Your Company’s Cybersecurity Program Today
  64. 9 Cyber Security Threats Faced by Big Businesses
  65. Congress Wants To Push Dangerous Cybersecurity Bill After The Election, Says US Economy Depends On It
  66. UK spy chief demands more access to Twitter, Facebook to thwart attacks
  67. Cybersecurity: Not Just for BigLaw and its Clients
  68. Cybersecurity inaction favors the hackers: Column
  69. Cybersecurity firm IDs new Apple-targeting malware
  70. Cybersecurity experts discover lapses in Heartbleed bug fix
  71. Blackstone Backs Cybersecurity Merger
  72. Raytheon Buys Cyber Security Firm Blackbird for $420 Million
  73. IBM’s next pivot is into cybersecurity
  74. Data Breaches Inevitable, Regular Cybersecurity Changes Necessary
  75. FDA Voices Privacy Concerns and Promotes Medical Device Cybersecurity with New Guidance, Collaborative Information-Sharing
  76. Cyber-Security Salaries on the Up as Shortages Bite
  77. Contractors struggle with ‘patchwork’ of cybersecurity regulations
  78. Cyber Security Spending Up, But Many Uninsured
  79. Cybersecurity 2014: Breaches and costs rise, confidence and budgets are low
  80. Cybersecurity spending: Here’s where the money goes
  81. Workers the key to cybersecurity: Telstra
  82. FireEye predictions for cybersecurity in 2015
  83. The Most Important Cybersecurity Story That No One Is Talking About
  84. EdgeWave Adds $2M to Extend Overhaul of Enterprise Cybersecurity
  85. ‘Sony is Snowden’ for Corporations, Cybersecurity Expert Says
  86. Iran’s Growing Cybersecurity Threat
  87. LETTER TO NAIROBI: Kenya faces intensifying threats to cybersecurity
  88. Rapid7 gets $30M to invest in new cybersecurity initiatives and expand global reach
  89. India Should Strive for Fool-proof Cyber Security
  90. Sony hack renews cybersecurity push for ‘zombie bill’
  91. Politicians respond to Sony hack, call for cybersecurity bill
  92. Top 5 high-profile cyber security breaches that have affected millions
  93. IPO could value cybersecurity firm Veracode up to $800M
  94. House intel leaders unveil cyber-security bill
  95. The right sort of help for cyber security insurance
  96. Cybersecurity: Tackling the inasider threat
  97. Lloyd’s Supports New Government Initiatives To Make Uk World Centre In Cyber Security Insurance
  98. British cybersecurity fears ‘crypto-apocalypse’
  99. Fleishman launches global cybersecurity and privacy practice
  100. Cyber security centre in state soon
  101. The Next Cybersecurity Target: Medical Data
  102. Alert: Cybersecurity Risk Management for Communications Companies
  103. Cybersecurity: Mitigating the Legal Risks of On-Line Banking With Business Customers
  104. No more weak links – elite law firms unite to fight cyber security threat
  105. National Cyber Security Policy a Mere Paper Tiger
  106. Onus to prove security breach on customers
  107. India needs better cyber police
  108. America gave NSA permission to spy on BJP, claims whistleblower Snowden
  109. Govt gleans cyber security tips
  110. Cybersecurity Camps Teach Students
  111. Cybersecurity requires stealth, patience and resources on a global scale
  112. Cybersecurity Law Is So Ridiculously Out Of Touch
  113. Cybersecurity wake-up call
  114. Cybersecurity And The Future Digital Economy
  115. Lawmakers in cybersecurity rush
  116. With cybersecurity fears rising, Bain acquires Blue Coat
  117. Taiwan seeks stronger cyber security ties with U.S. to counter China threat
  118. Sebi to step up cyber security in markets
  119. Cybersecurity risks abound in BYOD, mobile apps
  120. Internet of Things Poses UK Cybersecurity Risk – Veracode Report
  121. The Internet Of Things Complicates Cybersecurity Efforts
  122. The #1 Cyber Security Threat To Information Systems Today
  123. DOJ Releases Cybersecurity Guidance for Breach Victims
  124. Cyber security threats are real
  125. OVERNIGHT CYBERSECURITY: NSA reform bill on the move
  126. US goes on offensive with new cyber security policy
  127. Data Breach Calls US Cybersecurity Into Question
  128. Are Cybersecurity Stocks Moving On The Government Surveillance Expiration?
  129. Federal cybersecurity efforts need clear responsibility, urgency and leadership
  130. House Passes Cybersecurity Bill After Companies Fall Victim to Data Breaches
  131. US plans Silicon Valley cybersecurity center
  132. Dod’s New ‘Transparent’ Policy On Cybersecurity Is Still Opaque
  133. Cybersecurity fears grow as defenses boosted: study
  134. The Cost of Cybersecurity Breaches Doubles in the U.K.
  135. Cybersecurity Issues Not Going Away
  136. Cybersecurity Amendment Approved by House
  137. ISRO commercial arm Antrix website hacked: Cyber expert Pawan Duggal calls it ‘cyber-war’
  138. Surfing the dark net for drugs
  139. US Army website hacked as Obama demands cyber lawData Breach Calls US Cybersecurity Into Question
  140. Hacking Linked to China Exposes Millions of U.S. Workers
  141. Cybersecurity Firm Says It Found Spyware on Government Network in April
  142. India, US to Bolster Cyber Security Partnership, Combat Crime
  143. Security Short Take: Blame for IRS data breach laid on cybersecurity cuts
  144. Several Cyber Security Layers are Needed: Pro’s React to Carphone Warehouse Data Breach
  145. Cybersecurity professionals are the new guardians of digital change, says Gartner
  146. Is China Coming Around On Cybersecurity?
  147. European organizations ‘underestimate cybersecurity risks’
  148. Cyber security market to hit $101bn in 3 years
  149. Cyber security for shipping needs unique approach
  150. Cybersecurity Becomes Life or Death Issue as Companies Add Tech to Consumer Devices
  151. A Quick Guide to the Cybersecurity Bill Passed by the U.S. Senate
  152. Millennials, Women, and Cybersecurity: New Survey Reveals an Alarming Trend
  153. Six things firms should do to improve cybersecurity
  154. Cyber Security Market Worth $170.21 Billion by 2020
  155. Google, WhatsApp and Facebook breaching user’s privacy, claims Cyber security firm Avast
  156. Lack of women in cyber security
  157. Cyber security team to be formed by next year
  158. TalkTalk’s lessons for cyber security
  159. Cybersecurity Lessons Learned From the Ashley Madison Hack
  160. Businesses need to place higher priority on cyber security
  161. California Officials Look For Ways To Improve Cybersecurity
  162. FDA issues cybersecurity guidance on medical devices
  163. FDA outlines cybersecurity recommendations for medical device manufacturers
  164. Federal Cybersecurity Information Sharing Act signed into law 
  165. ‘Hack the Pentagon’ cybersecurity test launched by U.S. Defense Department
  166. Inslee announces measures to strengthen cyber security and digital privacy 
  167. LA Hospital Ransomware Attack Worries Cybersecurity Experts 
  168. Obama names former national security adviser to cybersecurity commission
  169. Obama wants more cybersecurity funding and a federal CISO
  170. Obama’s New Cybersecurity Plan Sticks to the Most Basic Basics
  171. Only Half Of Companies Are Confident In Their Cyber-Security
  172. Opinion: Cybersecurity needs less talk, more action 
  173. Password Security Is So Bad, President Obama Weighs I
  174. Pentagon Launches Bug Bounty Program To Improve US Government Cybersecurity
  175. Pentagon seeks hackers to test Defense Department’s cybersecurity
  176. USC Launches Cybersecurity Effort to Better Protect Your Information
  177. Washington State Announces Federal Cybersecurity Partnership, Office of Privacy and Data Protection
  178. Hardware is hot in cybersecurity
  179. Majority CEOs unwilling to share cybersecurity information with outsiders
  180. Critical manufacturers under constant cyber security threat 
  181. You’re not the boss of me: Cybersecurity pros fear government overreach in iPhone fight
  182. Cyber security top priority

Cyber Policy

  1. One million cyber attacks a day on Deutsche Telekom network
  2. Rs 1,000 cr set aside for cyber shield
  3. Israeli cyber-security researchers remotely hack a car
  4. Cyber insurance can help companies manage cyber risks, says UK government
  5. Cyber Policy Still Stuck In The ‘90s

Domain Names

  1. Domain name report april 2014
  2. Global Phishing Survey: Trends and Domain Name Use in 2H2013
  4. Internet Governance and the Domain Name System- Issues for Congress


  1. Websense 2014 security predictions report
  2. Trend Micro Security Predictions for 2014 and Beyond
  4. How big data and IoT are changing manufacturing
  5. Welcome to Oculus XXX: In-Your-Face 3D is the Future of Porn
  6. Digital rights groups ask ITU to stay out of net neutrality debate
  7. France prepares for cyber-warfare, whilst US accuses Putin of JP Morgan attack
  8. Kaspersky Lab Broadens Co-operation With Both INTERPOL and Europol
  9. As Cyber Crime Grows, Buy This Firm?
  10. Police agency will launch website to enable reporting of cybercrime such as cyberbullying and illegal online material
  11. Why Traditional Media Isn’t Dying And Four Other Myths of the Digital Era Dispelled
  12. Cars, toasters, medical devices add to DHS’ cyber headaches
  13. The cooling wars of cyber space in a remote era

Dos & Donts

  1. 12 Do’s and Don’ts of E-mail Communication
  2. Computer Security Do’s and Don’ts
  3. IT Security Dos & Donts
  4. Data security dos and don’ts
  5. E-crime report- UK
  6. E-mail Dos and Don’ts
  7. EMAIL ETIQUETTE DO’S AND DON’TS security researcher
  8. E-Professionalism Dos and Don’t
  9. Facebook Do and Don’t Sheet
  10. McAfee Dos & Donts Online Shopping
  11. Top 11 dos and don’ts of online reputation management
  12. The “Dos” and “Don’ts” When Searching for Health InformationOnline


  1. Industrial Internet at Work WhitePaper- GE

Internet Governance

  1. Internet Governance and the Domain Name System- Issues for Congress
  2. Twitter sues US government over user data-request gag rules
  3. Data retention a boon for private investigators
  4. Government asks for more information on digital currencies

Internet Safety

  2. Internet safety tips for kids
  3. Cyber risks evolving faster than business capabilities, says accountancy body


  1. Revealed: The top ten online scams – and how one victim lost his money to fraudsters who conned all his Facebook friends too…