Author Archives: Admin

Sudheer Kabeer – Unprofessional Behavior

This is an example of the unprofessional behavior I experienced from Mr. Sudheer Kabeer, who describes himself as “an extremely competent IT professional, Hypnotist, and Mentalist” on his WhatsApp profile.

It all started when I suddenly began receiving continuous WhatsApp messages from him. Since I don’t knowingly share my phone number publicly to avoid spam and misuse, I asked him how he got my number so I could be more cautious. Instead of answering, he ignored my question and kept spamming me with self-promotional messages. When I repeatedly asked how he got my number, instead of answering, he asked for my name. This made me wonder if he was sending unsolicited advertisements without even knowing who he was messaging. He then started mocking my genuine concern about how he obtained my contact details.

Upon checking further, I found that he works in IT and runs a YouTube channel (https://www.youtube.com/@IamSudheerKabeer) with a significant number of subscribers. It was surprising to see someone in his position act so unprofessionally. It turned out that he stole my number from a group I had joined and was using it for advertising purposes without consent. Just as he stole my number, it’s possible he also took other people’s numbers from WhatsApp groups without permission and used them for illicit business or marketing purposes. This is a clear violation of your privacy and could be considered misuse of your personal information.

Full message conversation can be viewed in the below video

If you receive unsolicited messages from unknown contacts, especially for promotional purposes, it’s important to protect your privacy. Avoid sharing your phone number publicly and always be cautious about who you share it with. If someone messages you unexpectedly, ask how they obtained your number; a genuine professional will provide a clear response. If the person continues spamming or fails to answer your questions, block and report them. Additionally, be aware of privacy laws in your region that protect against unauthorized use of your contact information. If the misuse continues, especially for commercial purposes without your consent, you could file a complaint under data protection laws or cybercrime laws. Stay vigilant and share your experiences to help others avoid similar situations.

If you perform activities like this, it is important that you understand the legal implications outlined below:

IT Act, 2000:
Section 66C: Identity theft, including using someone else’s information without consent.
ection 43 — Unauthorized Access and Data Theft, including accesses, extracts, or misuses data (such as phone numbers) without authorization, they may be liable to pay compensation up to ₹5 crore to the affected person.

Bharatiya Nyaya Sanhita (BNS), 2023:
Section 302: Punishment for theft, applicable in cases involving unauthorized access and extraction of data.
Section 354: Addresses acts intended to insult the modesty of a person, particularly applicable if the communication is harassing or inappropriate.
Section 354E (Stalking): Sending repeated messages without consent can be considered stalking, punishable with imprisonment or a fine.

TCCCPR, 2018:
Sending unsolicited commercial communications (spam) without consent is illegal, and penalties can be imposed on the sender.

Violation of Privacy (Article 21 of the Indian Constitution)
Collecting personal data (like phone numbers) without consent breaches this right.

WhatsApp’s Terms of Service
Violates WhatsApp’s terms and policies, which could lead to account suspension or banning.

Article Written by:
Gem


Report any policy violation at contact@techipick.com


AI and ML in Cybersecurity: How to Harness the Power of Technology for Better Protection

Tags :

Category : AI Technology

As technology continues to advance, so does the threat of cyber attacks. Artificial intelligence (AI) and machine learning (ML) have the potential to revolutionize cybersecurity by providing new ways to detect and respond to threats. In this blog post, we’ll explore some of the key ways AI and ML are being used in cybersecurity, and discuss best practices for harnessing their power to improve protection.

Detection and Response

  • AI and ML can be used to analyze large amounts of data in real-time, making it possible to detect and respond to threats that would have been missed by traditional security systems.
  • Advanced algorithms can be used to identify patterns and anomalies in network traffic, making it possible to detect intrusions and other malicious activity.
  • Machine learning models can be trained on historical data to detect anomalies and predict future threats.
  • Some AI-based systems can also be configured to automatically respond to threats, such as by blocking malicious traffic or quarantining infected devices.

Threat Intelligence

  • AI and ML can be used to gather and analyze threat intelligence, providing organizations with insight into the latest threats and vulnerabilities.
  • Machine learning models can be trained to identify and classify new malware, making it possible to detect previously unknown threats.
  • AI-based systems can also be used to analyze social media and other online sources to identify potential threats and vulnerabilities.

Automation

  • AI and ML can automate repetitive tasks, such as monitoring and analyzing network traffic, freeing up cybersecurity professionals to focus on more strategic tasks.
  • Automated systems can also be used to respond to threats in real-time, reducing the time it takes to contain and mitigate a breach.
  • Machine learning models can also be used to automate the process of prioritizing and triaging security alerts, reducing the number of false positives and allowing organizations to focus on the most critical threats.

Best Practices

  • It’s important to have a clear understanding of the capabilities and limitations of AI and ML-based systems to ensure they’re used effectively.
  • It’s also important to regularly update and maintain these systems to ensure they’re operating at peak performance.
  • It’s important to monitor the output of AI and ML-based systems to ensure they’re not generating false positives or false negatives.
  • It’s important to continuously train the machine learning models to ensure they are up-to-date with the latest threats and vulnerabilities.
  • It’s important to implement a robust security infrastructure to protect AI and ML systems from attacks.

The AI and ML have the potential to revolutionize cybersecurity by providing new ways to detect and respond to threats. However, organizations must approach these technologies with a clear understanding of their capabilities and limitations, and implement best practices to ensure they are used effectively. By harnessing the power of AI and ML, organizations can improve their ability to detect and respond to threats, and ultimately enhance their overall security posture.


COVID-19’s Impact on Cybersecurity: How the Pandemic Has Led to a Rise in Spear Phishing Attempts

Tags :

Category : Cyber Security

The COVID-19 pandemic has had a significant impact on the way we live and work, and this includes the field of cybersecurity. The sudden shift to remote work has resulted in an increase in cyber attacks, particularly in the form of spear phishing attempts. In this article, we’ll take a closer look at the impact of COVID-19 on cybersecurity and the ways in which spear phishing attempts have increased.

The sudden shift to remote work The COVID-19 pandemic has resulted in a sudden shift to remote work for many organizations. This has created new cybersecurity challenges, as employees are now accessing company resources from home networks that may not be as secure as office networks. Additionally, employees may be using personal devices that may not have the same level of security as company-owned devices.

These changes have created new opportunities for cybercriminals to launch attacks, as remote workers may be more susceptible to phishing and other social engineering attacks.

Increase in Spear Phishing Attempts One of the most significant impacts of COVID-19 on cybersecurity has been the increase in spear phishing attempts. Spear phishing is a type of phishing attack that targets specific individuals or organizations. The attackers typically use social engineering techniques, such as posing as a trusted authority or using personalized information, to trick the victim into providing sensitive information or clicking on a malicious link.

The COVID-19 pandemic has provided attackers with new opportunities to launch spear phishing attacks. For example, attackers may pose as health officials or government representatives and use the pretext of COVID-19 information to trick victims into providing sensitive information.

Cybersecurity Measures to Fight Spear Phishing Attempts Given the increase in spear phishing attempts, it is important for organizations to take steps to protect themselves. Some measures that can be taken include:

  • Employee education and training: Employees should be educated on the risks of phishing and social engineering attacks, and they should be trained on how to identify and respond to such attacks.
  • Email filtering: Organizations should use email filtering to block phishing emails before they reach the employees’ inboxes.
  • Two-factor authentication: Two-factor authentication can provide an additional layer of security, as it requires the user to provide a second form of authentication in addition to a password.
  • Network segmentation: Network segmentation can help to limit the damage if a phishing attack is successful, as it can prevent attackers from moving laterally across the network.

The COVID-19 pandemic has had a significant impact on cybersecurity, particularly in the form of an increase in spear phishing attempts. Remote work has created new opportunities for attackers, and organizations must take steps to protect themselves. By implementing the measures discussed in this article, organizations can help to defend against spear phishing attempts and other cyber threats. It is essential to remember that cybersecurity is an ongoing process that requires continuous improvement, regular updates and staff education to stay ahead of the constantly evolving threats.