AOH :: IS1231.HTM|
Site design & layout copyright © 1986-2014 CodeGods
This message is in MIME format. The first part should be readable text,
while the remaining parts are likely unreadable without MIME-aware tools.
Content-Type: TEXT/PLAIN; CHARSET=UTF-8
Express News Service
Oct 10, 2008
Pune, October 9 First, hacking is easy, detection difficult
The recent hacking of Wi-Fi connections by terrorists has underscored
the difficulty in securing such networks. =E2=80=9CUnlike bomb blasts carried
out by terrorists, hacking is a hidden and difficult-to-trace activity.
Tampering into others=E2=80=99 computer systems does not leave any tangible
trace,=E2=80=9D said Sudam Choure, chief coordinator of Pune police=E2=80=99s cyber
=E2=80=9CThere is nothing like =E2=80=98ethical hacking=E2=80=99. People with a criminal intent
can easily get trained in =E2=80=98ethical hacking=E2=80=99 and use their knowledge for
criminal activities,=E2=80=9D Choure said.
Mansoor Asghar Peerbhoy, the IT executive arrested from the city, has
been described as the head of an Indian Mujahideen module that hacked
Wi-Fi networks to send Terror mails before and after serial blasts. He
had taken up a course in ethical hacking.
Deputy Commissioner of police (cyber crime) Rajendra Dahale agreed. =E2=80=9CUse
of Wi-Fi technology for crime is increasing, as it is difficult to trace
The police have started encouraging IT firms to secure their Wi-Fi
networks. Police Commissioner Satyapal Singh said, =E2=80=9CWe have urged them
to be alert and take measures to secure their Wi-Fi networks.=E2=80=9D
Choure suggested that audits of systems security be carried out at
regular intervals. =E2=80=9CThe intelligence of hackers can never be
underestimated. Security systems should go through a number of layers to
check the authenticity of the user. That could curb hacking to some
extent,=E2=80=9D he said.
One can hack into a system from a cyber caf=C3=A9 and the Pune Central Cyber
Caf=C3=A9 Association has tried to put a safeguard in place. Association
president Rahul Pokale said, =E2=80=9CWe don=E2=80=99t let any user inside a caf=C3=A9
without first asking for an identity proof such as a driving licence or
PAN card, with the person=E2=80=99s photograph on it. We keep a photocopy. If
anyone refuses to produce such proof, we not only deny them access but
sometimes even inform the police if the customer is adamant.=E2=80=9D
At the Balewadi sports complex, the police said the Fi connections are
well-protected. =E2=80=9CWe willl not allow visitors, expect authorised
journalists and VIPs, to carry laptops into the sports complex,=E2=80=9D the
Commissioner of Police said.
Content-Type: text/plain; charset="us-ascii"
Register now for HITBSecConf2008 - Malaysia! With
a new triple-track conference featuring 4 keynote
speakers and over 35 international experts, this
is the largest network security event in Asia and
the Middle East!