ALL POLICE STATION
Saturday, August 19th
MATIGARA P.S CASE NO 520/17 DATED 19.08.17 U/S 20
Sunday, July 16th
Bagdogra PS Case No- 190/17 DT. 16.07.2017 U/S- 36
Thursday, July 13th
NJP PS Case No. 578/17 Dt. 13.07.2017 U/S 240/465/
Monday, July 3rd
Bagdogra PS Case No. 171/17 Dtd. 03.07.2017 U/S- 2
Sunday, April 2nd
SAFE DRIVE SAVE LIFE
There are no precise, reliable statistics on the amount of computer crime and the economic loss to victims, partly because many of these crimes are apparently not detected by victims, many of these crimes are never reported to authorities, and partly because the losses are often difficult to calculate.
Internet fraud takes many forms. The Internet's promise of substantial consumer benefits is coupled with the potential for fraud and deception. Fraud operators are opportunists who are among the first to appreciate the potential of a new technology. There is nothing new about Internet fraud, however, the size and potential market, relative ease, low cost, and speed with which a scam can be perpetrated has increased tremendously.
Nevertheless, in this section we have posted some Tips for Avoiding Computer Crime, which includes suggestions for increasing the security and reliability of personal computers, as well as protection against cyber crime.
Causes of Computer Crime
Sharing Identification numbers and passwords
Unauthorised access from remote location (hacking)
Unauthorised access by non-authorised employee
Security system by-passed
Poor physical security
Poor system security
Abuse of legitimate access
Viruses etc or other willful damage by disgruntled employee or competitor
Appropriate computer security changes not done when employees with access leave or are transfered.
Data files and listings not held under proper security
Hacking, Computerized Fraud And Other Computer Crimes
A "hacker" is a dedicated programming expert who believes in sharing his expertise and experiences with other hackers. A hacker does not believe in vandalizing or maliciously destroying data, or in stealing data of any kind. He may find your credit card number stored there from buying online, or use the information gleaned from your computer to use your ISP account for illegal activity, like distributing child pornography