Anti-Phishing, DMARC , Cyberwarfare / Nation-State Attacks , Device Identification

Why Timely Reporting of Fraud Is So Urgent

Supreme Court Advocate Dr. Seth Reviews Fraud-Fighting Priorities
Dr. Karnika Seth, cyberlaw expert and advocate, Supreme Court of India

As phishing campaigns and hacker attacks spread during the COVID-19 global pandemic, it’s more important than ever for organizations to promptly report fraud to authorities to help them crack down on cybercrime, says Dr. Karnika Seth, cyberlaw expert and advocate at Supreme Court of India.

See Also: Advanced Cyberthreat Intelligence Against The 2018 Threat Landscape

Law enforcement has designated cybercrime cells trained to investigate phishing and hacking attempts using software forensic tools to track the IP addresses of the fraudsters, she explains in a video interview with Information Security Media Group.

In the interview, she also offers insights on:

  • Understanding the Sections of IT Act that deal with identity thefts;
  • The Increasing digital threats posed by fake apps;
  • Why security practitioners need to refer to the sections of Indian Penal Code in reporting the cases.

Seth is a cyber lawyer and advocate at the Supreme Court of India. She advises government agencies and private companies on emerging public policy challenges and compliance strategy, such as curbing fake news and cybercrime related scams. She is a member of the Working Group of ICANN formed to design the policy framework impacting global domain registration services.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.