Skip to main content

Over 270 govt websites hacked till July this year


Over 270 govt websites hacked till July this year


Over 270 govt websites hacked till July this year
New Delhi: Over 270 government websites have been hacked by cyber criminals between January and July this year.

As per information tracked and made available to Indian Computer Emergency Response Team (CERT-In), 201, 303, 308 and 273 government websites were hacked during the year 2009, 2010, 2011 and 2012 (till July) respectively, an official statement today said.

Based on the threat assessment, CERT-In regularly issues alerts for internet users and operators on vulnerabilities.

Five alerts were issued during May and June, 2012 to prominent organisations in the government and private sector about targetting websites for carrying out cyber attacks by the hacker groups, the statement said.

CERT-In also issued advisory providing counter measures to safeguard the websites and network infrastructure against such attacks, it added.

All the organisations were advised to report such incidents to CERT-In along with network logs and relevant data for analysis.

National Informatics Centre (NIC), which hosts a majority of government websites, has deployed state-of-the-art technology solutions including firewalls and intrusion prevention systems.

NIC performs periodic security audits of their network infrastructure followed by subsequent hardenings, besides round-the-clock monitoring of security events for taking remedial measures against cyber attacks, the statement quoted Minister of State for Communications and IT Sachin Pilot as saying.

It added that CERT-In is keeping a close watch on the Distributed Denial of Service (DDoS) attacks through active co-operation with the Internet Service Providers (ISPs) in the country.

Security awareness training programmes on 'Security measures against DDoS attacks' are also organised by CERT-In for the network administrators in the government and private sector organisations, it added.

PTI 

Comments

Popular posts from this blog

Proxy list

* http://www.proxy4free.com * http://www.publicproxyservers.com * http://www.anonymitychecker.com * http://www.proxz.com * http://www.digitalcybersoft.com/ProxyList/ * http://www.checker.freeproxy.ru * http://tools.rosinstrument.com/proxy/ * http://www.samair.ru/proxy/ * http://www.multiproxy.org/anon_proxy.htm * http://www.atomintersoft.com/product...xy/proxy-list/ [/b]

Useful & Valuable Sites

For Urgent Blood Requirements call +91888704898 Learn online Udemy Coursera Khan Openculture W3Schools Buy online Flipkart Amazon Myntra shopclues freekaamaal Online App Ajio Craftvilla Mirraw Limeroad Voonik Travel Booking Railway Paytm Redbus goibibo Trivago Sales OLX Justdail Quikr carwale 2ndhandbazar Jobs Search Bank Jobs BJS Glassdoor LinkedIn Freelancer S/W Downloads Filehippo Softpedia Download.com SourceForge BrotherSoft Flight Booking Qatar Singapore Makeytrip goindgo Emirates Status Enquiry Passport Panind Aadhar voter PF Yoga Acupoints Acupuncture Prachina Yoga Ayurveda Learn Cloud AWS Azure IBM VMware Redhat Search Engines Google yahoo amazon dogpile aol
Top 10 Most Common Cyber Attacks Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks A denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A DDoS attack is also an attack on system’s resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker. Unlike attacks that are designed to enable the attacker to gain or increase access, denial-of-service doesn’t provide direct benefits for attackers. For some of them, it’s enough to have the satisfaction of service denial. However, if the attacked resource belongs to a business competitor, then the benefit to the attacker may be real enough. Another purpose of a DoS attack can be to take a system offline so that a different kind of attack can be launched. One common example is session hijacking, which I’ll describe later. There are different types of DoS and DDoS attacks; the most common are ...