Wednesday, April 30, 2008

Indian Websites defacement figures UP

Amid the recent mass SQL Injection hack and targeted attacks, the series of defacements on Indian websites have also increase from 612 in March 2008 from 214 in Feb. 2008. But this should not come as a surprise because the recent waves of attacks had a lot of websites kneeling.

The Recent DOS attack on CNN.com by Chinese hackers then comes the Mass SQL injection attack which even compromised Department of Home Land Security website and we have the lovely Hannaford breach.

While the number of defacements in India is quite small compared to the Global attack stats but it does show that how vulnerable Indian websites are, most of the website suffer some form of SQL Injection and even Cross site scripting works most of the time, there is a lot more to do than just patching the servers which they don't understand.

-abhiz

Indian Websites defacement figures UP

Amid the recent mass SQL Injection hack and targeted attacks, the series of defacements on Indian websites have also increase from 612 in March 2008 from 214 in Feb. 2008. But this should not come as a surprise because the recent waves of attacks had a lot of websites kneeling.

The Recent DOS attack on CNN.com by Chinese hackers then comes the Mass SQL injection attack which even compromised Department of Home Land Security website and we have the lovely Hannaford breach.

While the number of defacements in India is quite small compared to the Global attack stats but it does show that how vulnerable Indian websites are, most of the website suffer some form of SQL Injection and even Cross site scripting works most of the time, there is a lot more to do than just patching the servers which they don't understand.

-abhiz

Indian Websites defacement figures UP

Amid the recent mass SQL Injection hack and targeted attacks, the series of defacements on Indian websites have also increase from 612 in March 2008 from 214 in Feb. 2008. But this should not come as a surprise because the recent waves of attacks had a lot of websites kneeling.

The Recent DOS attack on CNN.com by Chinese hackers then comes the Mass SQL injection attack which even compromised Department of Home Land Security website and we have the lovely Hannaford breach.

While the number of defacements in India is quite small compared to the Global attack stats but it does show that how vulnerable Indian websites are, most of the website suffer some form of SQL Injection and even Cross site scripting works most of the time, there is a lot more to do than just patching the servers which they don't understand.

-abhiz

Indian Websites defacement figures UP

Amid the recent mass SQL Injection hack and targeted attacks, the series of defacements on Indian websites have also increase from 612 in March 2008 from 214 in Feb. 2008. But this should not come as a surprise because the recent waves of attacks had a lot of websites kneeling.

The Recent DOS attack on CNN.com by Chinese hackers then comes the Mass SQL injection attack which even compromised Department of Home Land Security website and we have the lovely Hannaford breach.

While the number of defacements in India is quite small compared to the Global attack stats but it does show that how vulnerable Indian websites are, most of the website suffer some form of SQL Injection and even Cross site scripting works most of the time, there is a lot more to do than just patching the servers which they don't understand.

-abhiz

Indian Websites defacement figures UP

Amid the recent mass SQL Injection hack and targeted attacks, the series of defacements on Indian websites have also increase from 612 in March 2008 from 214 in Feb. 2008. But this should not come as a surprise because the recent waves of attacks had a lot of websites kneeling.

The Recent DOS attack on CNN.com by Chinese hackers then comes the Mass SQL injection attack which even compromised Department of Home Land Security website and we have the lovely Hannaford breach.

While the number of defacements in India is quite small compared to the Global attack stats but it does show that how vulnerable Indian websites are, most of the website suffer some form of SQL Injection and even Cross site scripting works most of the time, there is a lot more to do than just patching the servers which they don't understand.

-abhiz

Indian Websites defacement figures UP

Amid the recent mass SQL Injection hack and targeted attacks, the series of defacements on Indian websites have also increase from 612 in March 2008 from 214 in Feb. 2008. But this should not come as a surprise because the recent waves of attacks had a lot of websites kneeling.

The Recent DOS attack on CNN.com by Chinese hackers then comes the Mass SQL injection attack which even compromised Department of Home Land Security website and we have the lovely Hannaford breach.

While the number of defacements in India is quite small compared to the Global attack stats but it does show that how vulnerable Indian websites are, most of the website suffer some form of SQL Injection and even Cross site scripting works most of the time, there is a lot more to do than just patching the servers which they don't understand.

-abhiz

Indian Websites defacement figures UP

Amid the recent mass SQL Injection hack and targeted attacks, the series of defacements on Indian websites have also increase from 612 in March 2008 from 214 in Feb. 2008. But this should not come as a surprise because the recent waves of attacks had a lot of websites kneeling.

The Recent DOS attack on CNN.com by Chinese hackers then comes the Mass SQL injection attack which even compromised Department of Home Land Security website and we have the lovely Hannaford breach.

While the number of defacements in India is quite small compared to the Global attack stats but it does show that how vulnerable Indian websites are, most of the website suffer some form of SQL Injection and even Cross site scripting works most of the time, there is a lot more to do than just patching the servers which they don't understand.

-abhiz

Indian Websites defacement figures UP

Amid the recent mass SQL Injection hack and targeted attacks, the series of defacements on Indian websites have also increase from 612 in March 2008 from 214 in Feb. 2008. But this should not come as a surprise because the recent waves of attacks had a lot of websites kneeling.

The Recent DOS attack on CNN.com by Chinese hackers then comes the Mass SQL injection attack which even compromised Department of Home Land Security website and we have the lovely Hannaford breach.

While the number of defacements in India is quite small compared to the Global attack stats but it does show that how vulnerable Indian websites are, most of the website suffer some form of SQL Injection and even Cross site scripting works most of the time, there is a lot more to do than just patching the servers which they don't understand.

-abhiz

Indian Websites defacement figures UP

Amid the recent mass SQL Injection hack and targeted attacks, the series of defacements on Indian websites have also increase from 612 in March 2008 from 214 in Feb. 2008. But this should not come as a surprise because the recent waves of attacks had a lot of websites kneeling.

The Recent DOS attack on CNN.com by Chinese hackers then comes the Mass SQL injection attack which even compromised Department of Home Land Security website and we have the lovely Hannaford breach.

While the number of defacements in India is quite small compared to the Global attack stats but it does show that how vulnerable Indian websites are, most of the website suffer some form of SQL Injection and even Cross site scripting works most of the time, there is a lot more to do than just patching the servers which they don't understand.

-abhiz

Indian Websites defacement figures UP

Amid the recent mass SQL Injection hack and targeted attacks, the series of defacements on Indian websites have also increase from 612 in March 2008 from 214 in Feb. 2008. But this should not come as a surprise because the recent waves of attacks had a lot of websites kneeling.

The Recent DOS attack on CNN.com by Chinese hackers then comes the Mass SQL injection attack which even compromised Department of Home Land Security website and we have the lovely Hannaford breach.

While the number of defacements in India is quite small compared to the Global attack stats but it does show that how vulnerable Indian websites are, most of the website suffer some form of SQL Injection and even Cross site scripting works most of the time, there is a lot more to do than just patching the servers which they don't understand.

-abhiz

Thursday, April 17, 2008

Social Engineer defense for Receptionists

Receptionists are prime target for Social engineer's because receptionists know more about people, they have access to their data like phone number, department they work, home location, etc. here are some tips for your receptionist to so that they dont fall prey to a social engineer.
1. Don't trust strangers.

Social engineering scams -- where crooks extract information from victims through interaction and by building trust -- is on the rise, according to Bill Nichols, an information security consultant at Control Risks Group Ltd. in Washington. Receptionists represent a prime target because they have access to employees' phone numbers and home addresses and, in some cases, to company systems. The scammer gathers bits of information over time, becomes increasingly credible and eventually gains access or passwords. "That's a real situation that we see all the time," Nichols says.

IT's response: A clearly written policy should classify what information shouldn't be distributed. Access to financial or human resources databases, as well as to sensitive customer information, should be restricted. Receptionists should also be trained with real-world scenarios to learn how to respond to information requests.
2. Social networking sites can hold dangers.

Receptionists might kill some time by browsing their Facebook or MySpace accounts, watching an online video or downloading music. But malicious code can now be hidden in video streams, downloaded from YouTube or embedded in songs streamed from social-networking Web sites.

What's more, Web users often have no control over the audio or video they browse. "You can embed these media types directly into Web pages," said David Thiel, a consultant at iSec Partners Inc., an applications security consulting company in San Francisco, in a February webcast. "So for anybody who browses to a Web page, a lot of different media file types are launched automatically as background music or embedded video" without the user clicking on anything.

IT's response: Install a filtering proxy. IT departments can block access to social networking sites completely with firewall software. "But if you want to be more liberal and allow [access], use a filtering proxy to check what's coming across and get rid of the known nasty stuff," says Avishai Wool, chief technology officer at Algorithmic Security Inc., a firewall management company in Reston, Va. "You could also include mail filters on incoming and outgoing e-mail to strip out executable attachments. You don't want to be the deliverer of malware, either."
3. Peer-to-peer software creates legal risks.

For many employees, their PCs at work are more powerful than their home computers, and receptionists might want to take advantage of the ample bandwidth to download or share large files using peer-to-peer software like eMule, Kazaa and BitTornado. Problem is, that opens up the organization to potential legal risk.

"A lot of the content is either pirated, illegal, inappropriate or copyrighted," Wool says. "So the organization is opening itself up to legal problems by hosting the content on their servers -- even inadvertently."

On the IT side, peer-to-peer products are resource hogs and can easily drain significant chunks of bandwidth meant for company business. The adware they distribute can bombard systems with advertisements and pop-ups, hijack Web browsers and even slow computers to a grinding halt.

IT's response: Block access and train employees. IT staffs are almost uniformly against using P2P services, and they take measures to block access to them. Individual employees should be aware that company policies prohibit viewing or downloading pirated or indecent material.
4. Keep your personal e-mail account personal.

Receptionists who access their personal Yahoo, Hotmail or Gmail accounts at work open up the network to potential malware attacks. What's more, they may be violating the company's compliance requirements.

At regulated companies, sending company files to a home computer could violate corporate guidelines. "If the file that you sent to yourself goes through [the Web mail provider's] network, then they have a copy of what you sent, and they don't throw it away -- so you personally lose control of that information," Wool says.

IT's response: Block access to known personal e-mail providers and train employees.
5. Beware the messy desk.

Incoming and outgoing postal mail containing corporate information crosses the receptionist's desk daily. "Clean desk" policies are often not enforced, and a lot of information that can be readily used by scammers may be in plain sight. Even worse, passwords are often left under keyboards or even taped to computer monitors.
IT's response: Tighten up paper security. Keep the reception desk clear of visible mail and papers. And have a strong policy that outlines when to shred company documents.

-Abhi

Social Engineer defense for Receptionists

Receptionists are prime target for Social engineer's because receptionists know more about people, they have access to their data like phone number, department they work, home location, etc. here are some tips for your receptionist to so that they dont fall prey to a social engineer.
1. Don't trust strangers.

Social engineering scams -- where crooks extract information from victims through interaction and by building trust -- is on the rise, according to Bill Nichols, an information security consultant at Control Risks Group Ltd. in Washington. Receptionists represent a prime target because they have access to employees' phone numbers and home addresses and, in some cases, to company systems. The scammer gathers bits of information over time, becomes increasingly credible and eventually gains access or passwords. "That's a real situation that we see all the time," Nichols says.

IT's response: A clearly written policy should classify what information shouldn't be distributed. Access to financial or human resources databases, as well as to sensitive customer information, should be restricted. Receptionists should also be trained with real-world scenarios to learn how to respond to information requests.
2. Social networking sites can hold dangers.

Receptionists might kill some time by browsing their Facebook or MySpace accounts, watching an online video or downloading music. But malicious code can now be hidden in video streams, downloaded from YouTube or embedded in songs streamed from social-networking Web sites.

What's more, Web users often have no control over the audio or video they browse. "You can embed these media types directly into Web pages," said David Thiel, a consultant at iSec Partners Inc., an applications security consulting company in San Francisco, in a February webcast. "So for anybody who browses to a Web page, a lot of different media file types are launched automatically as background music or embedded video" without the user clicking on anything.

IT's response: Install a filtering proxy. IT departments can block access to social networking sites completely with firewall software. "But if you want to be more liberal and allow [access], use a filtering proxy to check what's coming across and get rid of the known nasty stuff," says Avishai Wool, chief technology officer at Algorithmic Security Inc., a firewall management company in Reston, Va. "You could also include mail filters on incoming and outgoing e-mail to strip out executable attachments. You don't want to be the deliverer of malware, either."
3. Peer-to-peer software creates legal risks.

For many employees, their PCs at work are more powerful than their home computers, and receptionists might want to take advantage of the ample bandwidth to download or share large files using peer-to-peer software like eMule, Kazaa and BitTornado. Problem is, that opens up the organization to potential legal risk.

"A lot of the content is either pirated, illegal, inappropriate or copyrighted," Wool says. "So the organization is opening itself up to legal problems by hosting the content on their servers -- even inadvertently."

On the IT side, peer-to-peer products are resource hogs and can easily drain significant chunks of bandwidth meant for company business. The adware they distribute can bombard systems with advertisements and pop-ups, hijack Web browsers and even slow computers to a grinding halt.

IT's response: Block access and train employees. IT staffs are almost uniformly against using P2P services, and they take measures to block access to them. Individual employees should be aware that company policies prohibit viewing or downloading pirated or indecent material.
4. Keep your personal e-mail account personal.

Receptionists who access their personal Yahoo, Hotmail or Gmail accounts at work open up the network to potential malware attacks. What's more, they may be violating the company's compliance requirements.

At regulated companies, sending company files to a home computer could violate corporate guidelines. "If the file that you sent to yourself goes through [the Web mail provider's] network, then they have a copy of what you sent, and they don't throw it away -- so you personally lose control of that information," Wool says.

IT's response: Block access to known personal e-mail providers and train employees.
5. Beware the messy desk.

Incoming and outgoing postal mail containing corporate information crosses the receptionist's desk daily. "Clean desk" policies are often not enforced, and a lot of information that can be readily used by scammers may be in plain sight. Even worse, passwords are often left under keyboards or even taped to computer monitors.
IT's response: Tighten up paper security. Keep the reception desk clear of visible mail and papers. And have a strong policy that outlines when to shred company documents.

-Abhi

Social Engineer defense for Receptionists

Receptionists are prime target for Social engineer's because receptionists know more about people, they have access to their data like phone number, department they work, home location, etc. here are some tips for your receptionist to so that they dont fall prey to a social engineer.
1. Don't trust strangers.

Social engineering scams -- where crooks extract information from victims through interaction and by building trust -- is on the rise, according to Bill Nichols, an information security consultant at Control Risks Group Ltd. in Washington. Receptionists represent a prime target because they have access to employees' phone numbers and home addresses and, in some cases, to company systems. The scammer gathers bits of information over time, becomes increasingly credible and eventually gains access or passwords. "That's a real situation that we see all the time," Nichols says.

IT's response: A clearly written policy should classify what information shouldn't be distributed. Access to financial or human resources databases, as well as to sensitive customer information, should be restricted. Receptionists should also be trained with real-world scenarios to learn how to respond to information requests.
2. Social networking sites can hold dangers.

Receptionists might kill some time by browsing their Facebook or MySpace accounts, watching an online video or downloading music. But malicious code can now be hidden in video streams, downloaded from YouTube or embedded in songs streamed from social-networking Web sites.

What's more, Web users often have no control over the audio or video they browse. "You can embed these media types directly into Web pages," said David Thiel, a consultant at iSec Partners Inc., an applications security consulting company in San Francisco, in a February webcast. "So for anybody who browses to a Web page, a lot of different media file types are launched automatically as background music or embedded video" without the user clicking on anything.

IT's response: Install a filtering proxy. IT departments can block access to social networking sites completely with firewall software. "But if you want to be more liberal and allow [access], use a filtering proxy to check what's coming across and get rid of the known nasty stuff," says Avishai Wool, chief technology officer at Algorithmic Security Inc., a firewall management company in Reston, Va. "You could also include mail filters on incoming and outgoing e-mail to strip out executable attachments. You don't want to be the deliverer of malware, either."
3. Peer-to-peer software creates legal risks.

For many employees, their PCs at work are more powerful than their home computers, and receptionists might want to take advantage of the ample bandwidth to download or share large files using peer-to-peer software like eMule, Kazaa and BitTornado. Problem is, that opens up the organization to potential legal risk.

"A lot of the content is either pirated, illegal, inappropriate or copyrighted," Wool says. "So the organization is opening itself up to legal problems by hosting the content on their servers -- even inadvertently."

On the IT side, peer-to-peer products are resource hogs and can easily drain significant chunks of bandwidth meant for company business. The adware they distribute can bombard systems with advertisements and pop-ups, hijack Web browsers and even slow computers to a grinding halt.

IT's response: Block access and train employees. IT staffs are almost uniformly against using P2P services, and they take measures to block access to them. Individual employees should be aware that company policies prohibit viewing or downloading pirated or indecent material.
4. Keep your personal e-mail account personal.

Receptionists who access their personal Yahoo, Hotmail or Gmail accounts at work open up the network to potential malware attacks. What's more, they may be violating the company's compliance requirements.

At regulated companies, sending company files to a home computer could violate corporate guidelines. "If the file that you sent to yourself goes through [the Web mail provider's] network, then they have a copy of what you sent, and they don't throw it away -- so you personally lose control of that information," Wool says.

IT's response: Block access to known personal e-mail providers and train employees.
5. Beware the messy desk.

Incoming and outgoing postal mail containing corporate information crosses the receptionist's desk daily. "Clean desk" policies are often not enforced, and a lot of information that can be readily used by scammers may be in plain sight. Even worse, passwords are often left under keyboards or even taped to computer monitors.
IT's response: Tighten up paper security. Keep the reception desk clear of visible mail and papers. And have a strong policy that outlines when to shred company documents.

-Abhi

Social Engineer defense for Receptionists

Receptionists are prime target for Social engineer's because receptionists know more about people, they have access to their data like phone number, department they work, home location, etc. here are some tips for your receptionist to so that they dont fall prey to a social engineer.
1. Don't trust strangers.

Social engineering scams -- where crooks extract information from victims through interaction and by building trust -- is on the rise, according to Bill Nichols, an information security consultant at Control Risks Group Ltd. in Washington. Receptionists represent a prime target because they have access to employees' phone numbers and home addresses and, in some cases, to company systems. The scammer gathers bits of information over time, becomes increasingly credible and eventually gains access or passwords. "That's a real situation that we see all the time," Nichols says.

IT's response: A clearly written policy should classify what information shouldn't be distributed. Access to financial or human resources databases, as well as to sensitive customer information, should be restricted. Receptionists should also be trained with real-world scenarios to learn how to respond to information requests.
2. Social networking sites can hold dangers.

Receptionists might kill some time by browsing their Facebook or MySpace accounts, watching an online video or downloading music. But malicious code can now be hidden in video streams, downloaded from YouTube or embedded in songs streamed from social-networking Web sites.

What's more, Web users often have no control over the audio or video they browse. "You can embed these media types directly into Web pages," said David Thiel, a consultant at iSec Partners Inc., an applications security consulting company in San Francisco, in a February webcast. "So for anybody who browses to a Web page, a lot of different media file types are launched automatically as background music or embedded video" without the user clicking on anything.

IT's response: Install a filtering proxy. IT departments can block access to social networking sites completely with firewall software. "But if you want to be more liberal and allow [access], use a filtering proxy to check what's coming across and get rid of the known nasty stuff," says Avishai Wool, chief technology officer at Algorithmic Security Inc., a firewall management company in Reston, Va. "You could also include mail filters on incoming and outgoing e-mail to strip out executable attachments. You don't want to be the deliverer of malware, either."
3. Peer-to-peer software creates legal risks.

For many employees, their PCs at work are more powerful than their home computers, and receptionists might want to take advantage of the ample bandwidth to download or share large files using peer-to-peer software like eMule, Kazaa and BitTornado. Problem is, that opens up the organization to potential legal risk.

"A lot of the content is either pirated, illegal, inappropriate or copyrighted," Wool says. "So the organization is opening itself up to legal problems by hosting the content on their servers -- even inadvertently."

On the IT side, peer-to-peer products are resource hogs and can easily drain significant chunks of bandwidth meant for company business. The adware they distribute can bombard systems with advertisements and pop-ups, hijack Web browsers and even slow computers to a grinding halt.

IT's response: Block access and train employees. IT staffs are almost uniformly against using P2P services, and they take measures to block access to them. Individual employees should be aware that company policies prohibit viewing or downloading pirated or indecent material.
4. Keep your personal e-mail account personal.

Receptionists who access their personal Yahoo, Hotmail or Gmail accounts at work open up the network to potential malware attacks. What's more, they may be violating the company's compliance requirements.

At regulated companies, sending company files to a home computer could violate corporate guidelines. "If the file that you sent to yourself goes through [the Web mail provider's] network, then they have a copy of what you sent, and they don't throw it away -- so you personally lose control of that information," Wool says.

IT's response: Block access to known personal e-mail providers and train employees.
5. Beware the messy desk.

Incoming and outgoing postal mail containing corporate information crosses the receptionist's desk daily. "Clean desk" policies are often not enforced, and a lot of information that can be readily used by scammers may be in plain sight. Even worse, passwords are often left under keyboards or even taped to computer monitors.
IT's response: Tighten up paper security. Keep the reception desk clear of visible mail and papers. And have a strong policy that outlines when to shred company documents.

-Abhi

Social Engineer defense for Receptionists

Receptionists are prime target for Social engineer's because receptionists know more about people, they have access to their data like phone number, department they work, home location, etc. here are some tips for your receptionist to so that they dont fall prey to a social engineer.
1. Don't trust strangers.

Social engineering scams -- where crooks extract information from victims through interaction and by building trust -- is on the rise, according to Bill Nichols, an information security consultant at Control Risks Group Ltd. in Washington. Receptionists represent a prime target because they have access to employees' phone numbers and home addresses and, in some cases, to company systems. The scammer gathers bits of information over time, becomes increasingly credible and eventually gains access or passwords. "That's a real situation that we see all the time," Nichols says.

IT's response: A clearly written policy should classify what information shouldn't be distributed. Access to financial or human resources databases, as well as to sensitive customer information, should be restricted. Receptionists should also be trained with real-world scenarios to learn how to respond to information requests.
2. Social networking sites can hold dangers.

Receptionists might kill some time by browsing their Facebook or MySpace accounts, watching an online video or downloading music. But malicious code can now be hidden in video streams, downloaded from YouTube or embedded in songs streamed from social-networking Web sites.

What's more, Web users often have no control over the audio or video they browse. "You can embed these media types directly into Web pages," said David Thiel, a consultant at iSec Partners Inc., an applications security consulting company in San Francisco, in a February webcast. "So for anybody who browses to a Web page, a lot of different media file types are launched automatically as background music or embedded video" without the user clicking on anything.

IT's response: Install a filtering proxy. IT departments can block access to social networking sites completely with firewall software. "But if you want to be more liberal and allow [access], use a filtering proxy to check what's coming across and get rid of the known nasty stuff," says Avishai Wool, chief technology officer at Algorithmic Security Inc., a firewall management company in Reston, Va. "You could also include mail filters on incoming and outgoing e-mail to strip out executable attachments. You don't want to be the deliverer of malware, either."
3. Peer-to-peer software creates legal risks.

For many employees, their PCs at work are more powerful than their home computers, and receptionists might want to take advantage of the ample bandwidth to download or share large files using peer-to-peer software like eMule, Kazaa and BitTornado. Problem is, that opens up the organization to potential legal risk.

"A lot of the content is either pirated, illegal, inappropriate or copyrighted," Wool says. "So the organization is opening itself up to legal problems by hosting the content on their servers -- even inadvertently."

On the IT side, peer-to-peer products are resource hogs and can easily drain significant chunks of bandwidth meant for company business. The adware they distribute can bombard systems with advertisements and pop-ups, hijack Web browsers and even slow computers to a grinding halt.

IT's response: Block access and train employees. IT staffs are almost uniformly against using P2P services, and they take measures to block access to them. Individual employees should be aware that company policies prohibit viewing or downloading pirated or indecent material.
4. Keep your personal e-mail account personal.

Receptionists who access their personal Yahoo, Hotmail or Gmail accounts at work open up the network to potential malware attacks. What's more, they may be violating the company's compliance requirements.

At regulated companies, sending company files to a home computer could violate corporate guidelines. "If the file that you sent to yourself goes through [the Web mail provider's] network, then they have a copy of what you sent, and they don't throw it away -- so you personally lose control of that information," Wool says.

IT's response: Block access to known personal e-mail providers and train employees.
5. Beware the messy desk.

Incoming and outgoing postal mail containing corporate information crosses the receptionist's desk daily. "Clean desk" policies are often not enforced, and a lot of information that can be readily used by scammers may be in plain sight. Even worse, passwords are often left under keyboards or even taped to computer monitors.
IT's response: Tighten up paper security. Keep the reception desk clear of visible mail and papers. And have a strong policy that outlines when to shred company documents.

-Abhi

Social Engineer defense for Receptionists

Receptionists are prime target for Social engineer's because receptionists know more about people, they have access to their data like phone number, department they work, home location, etc. here are some tips for your receptionist to so that they dont fall prey to a social engineer.
1. Don't trust strangers.

Social engineering scams -- where crooks extract information from victims through interaction and by building trust -- is on the rise, according to Bill Nichols, an information security consultant at Control Risks Group Ltd. in Washington. Receptionists represent a prime target because they have access to employees' phone numbers and home addresses and, in some cases, to company systems. The scammer gathers bits of information over time, becomes increasingly credible and eventually gains access or passwords. "That's a real situation that we see all the time," Nichols says.

IT's response: A clearly written policy should classify what information shouldn't be distributed. Access to financial or human resources databases, as well as to sensitive customer information, should be restricted. Receptionists should also be trained with real-world scenarios to learn how to respond to information requests.
2. Social networking sites can hold dangers.

Receptionists might kill some time by browsing their Facebook or MySpace accounts, watching an online video or downloading music. But malicious code can now be hidden in video streams, downloaded from YouTube or embedded in songs streamed from social-networking Web sites.

What's more, Web users often have no control over the audio or video they browse. "You can embed these media types directly into Web pages," said David Thiel, a consultant at iSec Partners Inc., an applications security consulting company in San Francisco, in a February webcast. "So for anybody who browses to a Web page, a lot of different media file types are launched automatically as background music or embedded video" without the user clicking on anything.

IT's response: Install a filtering proxy. IT departments can block access to social networking sites completely with firewall software. "But if you want to be more liberal and allow [access], use a filtering proxy to check what's coming across and get rid of the known nasty stuff," says Avishai Wool, chief technology officer at Algorithmic Security Inc., a firewall management company in Reston, Va. "You could also include mail filters on incoming and outgoing e-mail to strip out executable attachments. You don't want to be the deliverer of malware, either."
3. Peer-to-peer software creates legal risks.

For many employees, their PCs at work are more powerful than their home computers, and receptionists might want to take advantage of the ample bandwidth to download or share large files using peer-to-peer software like eMule, Kazaa and BitTornado. Problem is, that opens up the organization to potential legal risk.

"A lot of the content is either pirated, illegal, inappropriate or copyrighted," Wool says. "So the organization is opening itself up to legal problems by hosting the content on their servers -- even inadvertently."

On the IT side, peer-to-peer products are resource hogs and can easily drain significant chunks of bandwidth meant for company business. The adware they distribute can bombard systems with advertisements and pop-ups, hijack Web browsers and even slow computers to a grinding halt.

IT's response: Block access and train employees. IT staffs are almost uniformly against using P2P services, and they take measures to block access to them. Individual employees should be aware that company policies prohibit viewing or downloading pirated or indecent material.
4. Keep your personal e-mail account personal.

Receptionists who access their personal Yahoo, Hotmail or Gmail accounts at work open up the network to potential malware attacks. What's more, they may be violating the company's compliance requirements.

At regulated companies, sending company files to a home computer could violate corporate guidelines. "If the file that you sent to yourself goes through [the Web mail provider's] network, then they have a copy of what you sent, and they don't throw it away -- so you personally lose control of that information," Wool says.

IT's response: Block access to known personal e-mail providers and train employees.
5. Beware the messy desk.

Incoming and outgoing postal mail containing corporate information crosses the receptionist's desk daily. "Clean desk" policies are often not enforced, and a lot of information that can be readily used by scammers may be in plain sight. Even worse, passwords are often left under keyboards or even taped to computer monitors.
IT's response: Tighten up paper security. Keep the reception desk clear of visible mail and papers. And have a strong policy that outlines when to shred company documents.

-Abhi

Social Engineer defense for Receptionists

Receptionists are prime target for Social engineer's because receptionists know more about people, they have access to their data like phone number, department they work, home location, etc. here are some tips for your receptionist to so that they dont fall prey to a social engineer.
1. Don't trust strangers.

Social engineering scams -- where crooks extract information from victims through interaction and by building trust -- is on the rise, according to Bill Nichols, an information security consultant at Control Risks Group Ltd. in Washington. Receptionists represent a prime target because they have access to employees' phone numbers and home addresses and, in some cases, to company systems. The scammer gathers bits of information over time, becomes increasingly credible and eventually gains access or passwords. "That's a real situation that we see all the time," Nichols says.

IT's response: A clearly written policy should classify what information shouldn't be distributed. Access to financial or human resources databases, as well as to sensitive customer information, should be restricted. Receptionists should also be trained with real-world scenarios to learn how to respond to information requests.
2. Social networking sites can hold dangers.

Receptionists might kill some time by browsing their Facebook or MySpace accounts, watching an online video or downloading music. But malicious code can now be hidden in video streams, downloaded from YouTube or embedded in songs streamed from social-networking Web sites.

What's more, Web users often have no control over the audio or video they browse. "You can embed these media types directly into Web pages," said David Thiel, a consultant at iSec Partners Inc., an applications security consulting company in San Francisco, in a February webcast. "So for anybody who browses to a Web page, a lot of different media file types are launched automatically as background music or embedded video" without the user clicking on anything.

IT's response: Install a filtering proxy. IT departments can block access to social networking sites completely with firewall software. "But if you want to be more liberal and allow [access], use a filtering proxy to check what's coming across and get rid of the known nasty stuff," says Avishai Wool, chief technology officer at Algorithmic Security Inc., a firewall management company in Reston, Va. "You could also include mail filters on incoming and outgoing e-mail to strip out executable attachments. You don't want to be the deliverer of malware, either."
3. Peer-to-peer software creates legal risks.

For many employees, their PCs at work are more powerful than their home computers, and receptionists might want to take advantage of the ample bandwidth to download or share large files using peer-to-peer software like eMule, Kazaa and BitTornado. Problem is, that opens up the organization to potential legal risk.

"A lot of the content is either pirated, illegal, inappropriate or copyrighted," Wool says. "So the organization is opening itself up to legal problems by hosting the content on their servers -- even inadvertently."

On the IT side, peer-to-peer products are resource hogs and can easily drain significant chunks of bandwidth meant for company business. The adware they distribute can bombard systems with advertisements and pop-ups, hijack Web browsers and even slow computers to a grinding halt.

IT's response: Block access and train employees. IT staffs are almost uniformly against using P2P services, and they take measures to block access to them. Individual employees should be aware that company policies prohibit viewing or downloading pirated or indecent material.
4. Keep your personal e-mail account personal.

Receptionists who access their personal Yahoo, Hotmail or Gmail accounts at work open up the network to potential malware attacks. What's more, they may be violating the company's compliance requirements.

At regulated companies, sending company files to a home computer could violate corporate guidelines. "If the file that you sent to yourself goes through [the Web mail provider's] network, then they have a copy of what you sent, and they don't throw it away -- so you personally lose control of that information," Wool says.

IT's response: Block access to known personal e-mail providers and train employees.
5. Beware the messy desk.

Incoming and outgoing postal mail containing corporate information crosses the receptionist's desk daily. "Clean desk" policies are often not enforced, and a lot of information that can be readily used by scammers may be in plain sight. Even worse, passwords are often left under keyboards or even taped to computer monitors.
IT's response: Tighten up paper security. Keep the reception desk clear of visible mail and papers. And have a strong policy that outlines when to shred company documents.

-Abhi

Social Engineer defense for Receptionists

Receptionists are prime target for Social engineer's because receptionists know more about people, they have access to their data like phone number, department they work, home location, etc. here are some tips for your receptionist to so that they dont fall prey to a social engineer.
1. Don't trust strangers.

Social engineering scams -- where crooks extract information from victims through interaction and by building trust -- is on the rise, according to Bill Nichols, an information security consultant at Control Risks Group Ltd. in Washington. Receptionists represent a prime target because they have access to employees' phone numbers and home addresses and, in some cases, to company systems. The scammer gathers bits of information over time, becomes increasingly credible and eventually gains access or passwords. "That's a real situation that we see all the time," Nichols says.

IT's response: A clearly written policy should classify what information shouldn't be distributed. Access to financial or human resources databases, as well as to sensitive customer information, should be restricted. Receptionists should also be trained with real-world scenarios to learn how to respond to information requests.
2. Social networking sites can hold dangers.

Receptionists might kill some time by browsing their Facebook or MySpace accounts, watching an online video or downloading music. But malicious code can now be hidden in video streams, downloaded from YouTube or embedded in songs streamed from social-networking Web sites.

What's more, Web users often have no control over the audio or video they browse. "You can embed these media types directly into Web pages," said David Thiel, a consultant at iSec Partners Inc., an applications security consulting company in San Francisco, in a February webcast. "So for anybody who browses to a Web page, a lot of different media file types are launched automatically as background music or embedded video" without the user clicking on anything.

IT's response: Install a filtering proxy. IT departments can block access to social networking sites completely with firewall software. "But if you want to be more liberal and allow [access], use a filtering proxy to check what's coming across and get rid of the known nasty stuff," says Avishai Wool, chief technology officer at Algorithmic Security Inc., a firewall management company in Reston, Va. "You could also include mail filters on incoming and outgoing e-mail to strip out executable attachments. You don't want to be the deliverer of malware, either."
3. Peer-to-peer software creates legal risks.

For many employees, their PCs at work are more powerful than their home computers, and receptionists might want to take advantage of the ample bandwidth to download or share large files using peer-to-peer software like eMule, Kazaa and BitTornado. Problem is, that opens up the organization to potential legal risk.

"A lot of the content is either pirated, illegal, inappropriate or copyrighted," Wool says. "So the organization is opening itself up to legal problems by hosting the content on their servers -- even inadvertently."

On the IT side, peer-to-peer products are resource hogs and can easily drain significant chunks of bandwidth meant for company business. The adware they distribute can bombard systems with advertisements and pop-ups, hijack Web browsers and even slow computers to a grinding halt.

IT's response: Block access and train employees. IT staffs are almost uniformly against using P2P services, and they take measures to block access to them. Individual employees should be aware that company policies prohibit viewing or downloading pirated or indecent material.
4. Keep your personal e-mail account personal.

Receptionists who access their personal Yahoo, Hotmail or Gmail accounts at work open up the network to potential malware attacks. What's more, they may be violating the company's compliance requirements.

At regulated companies, sending company files to a home computer could violate corporate guidelines. "If the file that you sent to yourself goes through [the Web mail provider's] network, then they have a copy of what you sent, and they don't throw it away -- so you personally lose control of that information," Wool says.

IT's response: Block access to known personal e-mail providers and train employees.
5. Beware the messy desk.

Incoming and outgoing postal mail containing corporate information crosses the receptionist's desk daily. "Clean desk" policies are often not enforced, and a lot of information that can be readily used by scammers may be in plain sight. Even worse, passwords are often left under keyboards or even taped to computer monitors.
IT's response: Tighten up paper security. Keep the reception desk clear of visible mail and papers. And have a strong policy that outlines when to shred company documents.

-Abhi

Social Engineer defense for Receptionists

Receptionists are prime target for Social engineer's because receptionists know more about people, they have access to their data like phone number, department they work, home location, etc. here are some tips for your receptionist to so that they dont fall prey to a social engineer.
1. Don't trust strangers.

Social engineering scams -- where crooks extract information from victims through interaction and by building trust -- is on the rise, according to Bill Nichols, an information security consultant at Control Risks Group Ltd. in Washington. Receptionists represent a prime target because they have access to employees' phone numbers and home addresses and, in some cases, to company systems. The scammer gathers bits of information over time, becomes increasingly credible and eventually gains access or passwords. "That's a real situation that we see all the time," Nichols says.

IT's response: A clearly written policy should classify what information shouldn't be distributed. Access to financial or human resources databases, as well as to sensitive customer information, should be restricted. Receptionists should also be trained with real-world scenarios to learn how to respond to information requests.
2. Social networking sites can hold dangers.

Receptionists might kill some time by browsing their Facebook or MySpace accounts, watching an online video or downloading music. But malicious code can now be hidden in video streams, downloaded from YouTube or embedded in songs streamed from social-networking Web sites.

What's more, Web users often have no control over the audio or video they browse. "You can embed these media types directly into Web pages," said David Thiel, a consultant at iSec Partners Inc., an applications security consulting company in San Francisco, in a February webcast. "So for anybody who browses to a Web page, a lot of different media file types are launched automatically as background music or embedded video" without the user clicking on anything.

IT's response: Install a filtering proxy. IT departments can block access to social networking sites completely with firewall software. "But if you want to be more liberal and allow [access], use a filtering proxy to check what's coming across and get rid of the known nasty stuff," says Avishai Wool, chief technology officer at Algorithmic Security Inc., a firewall management company in Reston, Va. "You could also include mail filters on incoming and outgoing e-mail to strip out executable attachments. You don't want to be the deliverer of malware, either."
3. Peer-to-peer software creates legal risks.

For many employees, their PCs at work are more powerful than their home computers, and receptionists might want to take advantage of the ample bandwidth to download or share large files using peer-to-peer software like eMule, Kazaa and BitTornado. Problem is, that opens up the organization to potential legal risk.

"A lot of the content is either pirated, illegal, inappropriate or copyrighted," Wool says. "So the organization is opening itself up to legal problems by hosting the content on their servers -- even inadvertently."

On the IT side, peer-to-peer products are resource hogs and can easily drain significant chunks of bandwidth meant for company business. The adware they distribute can bombard systems with advertisements and pop-ups, hijack Web browsers and even slow computers to a grinding halt.

IT's response: Block access and train employees. IT staffs are almost uniformly against using P2P services, and they take measures to block access to them. Individual employees should be aware that company policies prohibit viewing or downloading pirated or indecent material.
4. Keep your personal e-mail account personal.

Receptionists who access their personal Yahoo, Hotmail or Gmail accounts at work open up the network to potential malware attacks. What's more, they may be violating the company's compliance requirements.

At regulated companies, sending company files to a home computer could violate corporate guidelines. "If the file that you sent to yourself goes through [the Web mail provider's] network, then they have a copy of what you sent, and they don't throw it away -- so you personally lose control of that information," Wool says.

IT's response: Block access to known personal e-mail providers and train employees.
5. Beware the messy desk.

Incoming and outgoing postal mail containing corporate information crosses the receptionist's desk daily. "Clean desk" policies are often not enforced, and a lot of information that can be readily used by scammers may be in plain sight. Even worse, passwords are often left under keyboards or even taped to computer monitors.
IT's response: Tighten up paper security. Keep the reception desk clear of visible mail and papers. And have a strong policy that outlines when to shred company documents.

-Abhi

Social Engineer defense for Receptionists

Receptionists are prime target for Social engineer's because receptionists know more about people, they have access to their data like phone number, department they work, home location, etc. here are some tips for your receptionist to so that they dont fall prey to a social engineer.
1. Don't trust strangers.

Social engineering scams -- where crooks extract information from victims through interaction and by building trust -- is on the rise, according to Bill Nichols, an information security consultant at Control Risks Group Ltd. in Washington. Receptionists represent a prime target because they have access to employees' phone numbers and home addresses and, in some cases, to company systems. The scammer gathers bits of information over time, becomes increasingly credible and eventually gains access or passwords. "That's a real situation that we see all the time," Nichols says.

IT's response: A clearly written policy should classify what information shouldn't be distributed. Access to financial or human resources databases, as well as to sensitive customer information, should be restricted. Receptionists should also be trained with real-world scenarios to learn how to respond to information requests.
2. Social networking sites can hold dangers.

Receptionists might kill some time by browsing their Facebook or MySpace accounts, watching an online video or downloading music. But malicious code can now be hidden in video streams, downloaded from YouTube or embedded in songs streamed from social-networking Web sites.

What's more, Web users often have no control over the audio or video they browse. "You can embed these media types directly into Web pages," said David Thiel, a consultant at iSec Partners Inc., an applications security consulting company in San Francisco, in a February webcast. "So for anybody who browses to a Web page, a lot of different media file types are launched automatically as background music or embedded video" without the user clicking on anything.

IT's response: Install a filtering proxy. IT departments can block access to social networking sites completely with firewall software. "But if you want to be more liberal and allow [access], use a filtering proxy to check what's coming across and get rid of the known nasty stuff," says Avishai Wool, chief technology officer at Algorithmic Security Inc., a firewall management company in Reston, Va. "You could also include mail filters on incoming and outgoing e-mail to strip out executable attachments. You don't want to be the deliverer of malware, either."
3. Peer-to-peer software creates legal risks.

For many employees, their PCs at work are more powerful than their home computers, and receptionists might want to take advantage of the ample bandwidth to download or share large files using peer-to-peer software like eMule, Kazaa and BitTornado. Problem is, that opens up the organization to potential legal risk.

"A lot of the content is either pirated, illegal, inappropriate or copyrighted," Wool says. "So the organization is opening itself up to legal problems by hosting the content on their servers -- even inadvertently."

On the IT side, peer-to-peer products are resource hogs and can easily drain significant chunks of bandwidth meant for company business. The adware they distribute can bombard systems with advertisements and pop-ups, hijack Web browsers and even slow computers to a grinding halt.

IT's response: Block access and train employees. IT staffs are almost uniformly against using P2P services, and they take measures to block access to them. Individual employees should be aware that company policies prohibit viewing or downloading pirated or indecent material.
4. Keep your personal e-mail account personal.

Receptionists who access their personal Yahoo, Hotmail or Gmail accounts at work open up the network to potential malware attacks. What's more, they may be violating the company's compliance requirements.

At regulated companies, sending company files to a home computer could violate corporate guidelines. "If the file that you sent to yourself goes through [the Web mail provider's] network, then they have a copy of what you sent, and they don't throw it away -- so you personally lose control of that information," Wool says.

IT's response: Block access to known personal e-mail providers and train employees.
5. Beware the messy desk.

Incoming and outgoing postal mail containing corporate information crosses the receptionist's desk daily. "Clean desk" policies are often not enforced, and a lot of information that can be readily used by scammers may be in plain sight. Even worse, passwords are often left under keyboards or even taped to computer monitors.
IT's response: Tighten up paper security. Keep the reception desk clear of visible mail and papers. And have a strong policy that outlines when to shred company documents.

-Abhi

Monday, April 14, 2008

How GOOGLE Search Work

Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. Higher ranked pages appear further up in Google's search engine results page (SERP), meaning that the best links relating to your search query are theoretically the first ones Google lists.
For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

Google's keyword search function is similar to other search engines. Automated programs called spiders or crawlers travel the Web, moving from link to link and building up an index page that includes certain keywords. Google references this index when a user enters a search query. The search engine lists the pages that contain the same keywords that were in the user's search terms. Google's spiders may also have some more advanced functions, such as being able to determine the difference between Web pages with actual content and redirect sites -- pages that exist only to redirect traffic to a different Web page.

Keyword placement plays a part in how Google finds sites. Google looks for keywords throughout each Web page, but some sections are more important than others. Including the keyword in the Web page's title is a good idea, for example. Google also searches for keywords in headings. Headings come in a range of sizes, and keywords in larger headings are more valuable than if they are in smaller headings. Keyword dispersal is also important. Webmasters should avoid overusing keywords, but many people recommend using them regularly throughout a page.


-Abhi

How GOOGLE Search Work

Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. Higher ranked pages appear further up in Google's search engine results page (SERP), meaning that the best links relating to your search query are theoretically the first ones Google lists.
For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

Google's keyword search function is similar to other search engines. Automated programs called spiders or crawlers travel the Web, moving from link to link and building up an index page that includes certain keywords. Google references this index when a user enters a search query. The search engine lists the pages that contain the same keywords that were in the user's search terms. Google's spiders may also have some more advanced functions, such as being able to determine the difference between Web pages with actual content and redirect sites -- pages that exist only to redirect traffic to a different Web page.

Keyword placement plays a part in how Google finds sites. Google looks for keywords throughout each Web page, but some sections are more important than others. Including the keyword in the Web page's title is a good idea, for example. Google also searches for keywords in headings. Headings come in a range of sizes, and keywords in larger headings are more valuable than if they are in smaller headings. Keyword dispersal is also important. Webmasters should avoid overusing keywords, but many people recommend using them regularly throughout a page.


-Abhi

How GOOGLE Search Work

Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. Higher ranked pages appear further up in Google's search engine results page (SERP), meaning that the best links relating to your search query are theoretically the first ones Google lists.
For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

Google's keyword search function is similar to other search engines. Automated programs called spiders or crawlers travel the Web, moving from link to link and building up an index page that includes certain keywords. Google references this index when a user enters a search query. The search engine lists the pages that contain the same keywords that were in the user's search terms. Google's spiders may also have some more advanced functions, such as being able to determine the difference between Web pages with actual content and redirect sites -- pages that exist only to redirect traffic to a different Web page.

Keyword placement plays a part in how Google finds sites. Google looks for keywords throughout each Web page, but some sections are more important than others. Including the keyword in the Web page's title is a good idea, for example. Google also searches for keywords in headings. Headings come in a range of sizes, and keywords in larger headings are more valuable than if they are in smaller headings. Keyword dispersal is also important. Webmasters should avoid overusing keywords, but many people recommend using them regularly throughout a page.


-Abhi

How GOOGLE Search Work

Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. Higher ranked pages appear further up in Google's search engine results page (SERP), meaning that the best links relating to your search query are theoretically the first ones Google lists.
For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

Google's keyword search function is similar to other search engines. Automated programs called spiders or crawlers travel the Web, moving from link to link and building up an index page that includes certain keywords. Google references this index when a user enters a search query. The search engine lists the pages that contain the same keywords that were in the user's search terms. Google's spiders may also have some more advanced functions, such as being able to determine the difference between Web pages with actual content and redirect sites -- pages that exist only to redirect traffic to a different Web page.

Keyword placement plays a part in how Google finds sites. Google looks for keywords throughout each Web page, but some sections are more important than others. Including the keyword in the Web page's title is a good idea, for example. Google also searches for keywords in headings. Headings come in a range of sizes, and keywords in larger headings are more valuable than if they are in smaller headings. Keyword dispersal is also important. Webmasters should avoid overusing keywords, but many people recommend using them regularly throughout a page.


-Abhi

How GOOGLE Search Work

Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. Higher ranked pages appear further up in Google's search engine results page (SERP), meaning that the best links relating to your search query are theoretically the first ones Google lists.
For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

Google's keyword search function is similar to other search engines. Automated programs called spiders or crawlers travel the Web, moving from link to link and building up an index page that includes certain keywords. Google references this index when a user enters a search query. The search engine lists the pages that contain the same keywords that were in the user's search terms. Google's spiders may also have some more advanced functions, such as being able to determine the difference between Web pages with actual content and redirect sites -- pages that exist only to redirect traffic to a different Web page.

Keyword placement plays a part in how Google finds sites. Google looks for keywords throughout each Web page, but some sections are more important than others. Including the keyword in the Web page's title is a good idea, for example. Google also searches for keywords in headings. Headings come in a range of sizes, and keywords in larger headings are more valuable than if they are in smaller headings. Keyword dispersal is also important. Webmasters should avoid overusing keywords, but many people recommend using them regularly throughout a page.


-Abhi

How GOOGLE Search Work

Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. Higher ranked pages appear further up in Google's search engine results page (SERP), meaning that the best links relating to your search query are theoretically the first ones Google lists.
For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

Google's keyword search function is similar to other search engines. Automated programs called spiders or crawlers travel the Web, moving from link to link and building up an index page that includes certain keywords. Google references this index when a user enters a search query. The search engine lists the pages that contain the same keywords that were in the user's search terms. Google's spiders may also have some more advanced functions, such as being able to determine the difference between Web pages with actual content and redirect sites -- pages that exist only to redirect traffic to a different Web page.

Keyword placement plays a part in how Google finds sites. Google looks for keywords throughout each Web page, but some sections are more important than others. Including the keyword in the Web page's title is a good idea, for example. Google also searches for keywords in headings. Headings come in a range of sizes, and keywords in larger headings are more valuable than if they are in smaller headings. Keyword dispersal is also important. Webmasters should avoid overusing keywords, but many people recommend using them regularly throughout a page.


-Abhi

How GOOGLE Search Work

Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. Higher ranked pages appear further up in Google's search engine results page (SERP), meaning that the best links relating to your search query are theoretically the first ones Google lists.
For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

Google's keyword search function is similar to other search engines. Automated programs called spiders or crawlers travel the Web, moving from link to link and building up an index page that includes certain keywords. Google references this index when a user enters a search query. The search engine lists the pages that contain the same keywords that were in the user's search terms. Google's spiders may also have some more advanced functions, such as being able to determine the difference between Web pages with actual content and redirect sites -- pages that exist only to redirect traffic to a different Web page.

Keyword placement plays a part in how Google finds sites. Google looks for keywords throughout each Web page, but some sections are more important than others. Including the keyword in the Web page's title is a good idea, for example. Google also searches for keywords in headings. Headings come in a range of sizes, and keywords in larger headings are more valuable than if they are in smaller headings. Keyword dispersal is also important. Webmasters should avoid overusing keywords, but many people recommend using them regularly throughout a page.


-Abhi

How GOOGLE Search Work

Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. Higher ranked pages appear further up in Google's search engine results page (SERP), meaning that the best links relating to your search query are theoretically the first ones Google lists.
For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

Google's keyword search function is similar to other search engines. Automated programs called spiders or crawlers travel the Web, moving from link to link and building up an index page that includes certain keywords. Google references this index when a user enters a search query. The search engine lists the pages that contain the same keywords that were in the user's search terms. Google's spiders may also have some more advanced functions, such as being able to determine the difference between Web pages with actual content and redirect sites -- pages that exist only to redirect traffic to a different Web page.

Keyword placement plays a part in how Google finds sites. Google looks for keywords throughout each Web page, but some sections are more important than others. Including the keyword in the Web page's title is a good idea, for example. Google also searches for keywords in headings. Headings come in a range of sizes, and keywords in larger headings are more valuable than if they are in smaller headings. Keyword dispersal is also important. Webmasters should avoid overusing keywords, but many people recommend using them regularly throughout a page.


-Abhi

How GOOGLE Search Work

Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. Higher ranked pages appear further up in Google's search engine results page (SERP), meaning that the best links relating to your search query are theoretically the first ones Google lists.
For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

Google's keyword search function is similar to other search engines. Automated programs called spiders or crawlers travel the Web, moving from link to link and building up an index page that includes certain keywords. Google references this index when a user enters a search query. The search engine lists the pages that contain the same keywords that were in the user's search terms. Google's spiders may also have some more advanced functions, such as being able to determine the difference between Web pages with actual content and redirect sites -- pages that exist only to redirect traffic to a different Web page.

Keyword placement plays a part in how Google finds sites. Google looks for keywords throughout each Web page, but some sections are more important than others. Including the keyword in the Web page's title is a good idea, for example. Google also searches for keywords in headings. Headings come in a range of sizes, and keywords in larger headings are more valuable than if they are in smaller headings. Keyword dispersal is also important. Webmasters should avoid overusing keywords, but many people recommend using them regularly throughout a page.


-Abhi

How GOOGLE Search Work

Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. Higher ranked pages appear further up in Google's search engine results page (SERP), meaning that the best links relating to your search query are theoretically the first ones Google lists.
For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

For Web page administrators, being listed prominently on Google can result in a big boost in site traffic and visibility. In 2007, Google surpassed Microsoft as the most visited site on the Web [source: The San Francisco Chronicle]. With that much traffic, getting a good spot on a Google SERP could mean a huge boost in the number of site visitors.

Google's keyword search function is similar to other search engines. Automated programs called spiders or crawlers travel the Web, moving from link to link and building up an index page that includes certain keywords. Google references this index when a user enters a search query. The search engine lists the pages that contain the same keywords that were in the user's search terms. Google's spiders may also have some more advanced functions, such as being able to determine the difference between Web pages with actual content and redirect sites -- pages that exist only to redirect traffic to a different Web page.

Keyword placement plays a part in how Google finds sites. Google looks for keywords throughout each Web page, but some sections are more important than others. Including the keyword in the Web page's title is a good idea, for example. Google also searches for keywords in headings. Headings come in a range of sizes, and keywords in larger headings are more valuable than if they are in smaller headings. Keyword dispersal is also important. Webmasters should avoid overusing keywords, but many people recommend using them regularly throughout a page.


-Abhi

Identity theft gone wrong - Users lured by brand Reliance

Cyber cime cell of mumbai arrested a marketing executive from andhra pradesh trying to lure investors by creating a fake webpage of ADAG - Reliance. He created a website at Google owned blogger (http://reliancemlmindia.blogspot.com/).

He launched multiple schemes for insurance, mobile handsets and lots of other marketing stuff and lured users to give their personal details like Name, Address, PAN card and other stuff, He did not ask them for money but surely his plans were far more superior.

Identity theft crime is picking up in India but the sophistication of doing such crimes is not yet there, I mean how stupid a person can get to host a website on blogger ?

This is surely how stupid a scammer can get to do identity theft but lets not rule of the possibility of a credit card scamming gang involved into it or maybe more than that.

"MUMBAI: The cyber crime cell (CCC) of the Mumbai crime branch on Thursday arrested a 36-year-old marketing executive from Adilabad district of Andhra Pradesh for allegedly trying to lure investors by creating a fake webpage of the Anil Dhirubhai Ambani Group (ADAG).

According to the police, Sujankumar Narsima Reddy launched a webpage by using the logo of Reliance Communication and putting a photograph of its chairman Anil Ambani. “The accused floated several schemes regarding marketing of mobile handsets and insurance policies and promoted them as multi-level marketing schemes under the aegis of ADAG,” joint commissioner of police (crime) Rakesh Maria said.

Being a marketing person, Reddy’s schemes were well-planned, the police said. “It was a well-planned trap, but we foiled it before it became a big scam,” DCP Sanjay Mohite said.

Reddy just wanted those interested to fill up a form, giving their personal details, including name and address. He, however, did not demand any money from them, the police said.

The matter came to light when the legal department of the ADAG filed a complaint with the cyber cell on March 18. The complaint said that someone had launched a webpage (http://reliancemlmindia.blogspot.com) and was trying to cheat people.

The webpage, which also had a photo of Anil Ambani, informed people that the schemes were to be launched on April 10 and that was the deadline for those interested to become members." [Source]

-Abhi

Identity theft gone wrong - Users lured by brand Reliance

Cyber cime cell of mumbai arrested a marketing executive from andhra pradesh trying to lure investors by creating a fake webpage of ADAG - Reliance. He created a website at Google owned blogger (http://reliancemlmindia.blogspot.com/).

He launched multiple schemes for insurance, mobile handsets and lots of other marketing stuff and lured users to give their personal details like Name, Address, PAN card and other stuff, He did not ask them for money but surely his plans were far more superior.

Identity theft crime is picking up in India but the sophistication of doing such crimes is not yet there, I mean how stupid a person can get to host a website on blogger ?

This is surely how stupid a scammer can get to do identity theft but lets not rule of the possibility of a credit card scamming gang involved into it or maybe more than that.

"MUMBAI: The cyber crime cell (CCC) of the Mumbai crime branch on Thursday arrested a 36-year-old marketing executive from Adilabad district of Andhra Pradesh for allegedly trying to lure investors by creating a fake webpage of the Anil Dhirubhai Ambani Group (ADAG).

According to the police, Sujankumar Narsima Reddy launched a webpage by using the logo of Reliance Communication and putting a photograph of its chairman Anil Ambani. “The accused floated several schemes regarding marketing of mobile handsets and insurance policies and promoted them as multi-level marketing schemes under the aegis of ADAG,” joint commissioner of police (crime) Rakesh Maria said.

Being a marketing person, Reddy’s schemes were well-planned, the police said. “It was a well-planned trap, but we foiled it before it became a big scam,” DCP Sanjay Mohite said.

Reddy just wanted those interested to fill up a form, giving their personal details, including name and address. He, however, did not demand any money from them, the police said.

The matter came to light when the legal department of the ADAG filed a complaint with the cyber cell on March 18. The complaint said that someone had launched a webpage (http://reliancemlmindia.blogspot.com) and was trying to cheat people.

The webpage, which also had a photo of Anil Ambani, informed people that the schemes were to be launched on April 10 and that was the deadline for those interested to become members." [Source]

-Abhi

Identity theft gone wrong - Users lured by brand Reliance

Cyber cime cell of mumbai arrested a marketing executive from andhra pradesh trying to lure investors by creating a fake webpage of ADAG - Reliance. He created a website at Google owned blogger (http://reliancemlmindia.blogspot.com/).

He launched multiple schemes for insurance, mobile handsets and lots of other marketing stuff and lured users to give their personal details like Name, Address, PAN card and other stuff, He did not ask them for money but surely his plans were far more superior.

Identity theft crime is picking up in India but the sophistication of doing such crimes is not yet there, I mean how stupid a person can get to host a website on blogger ?

This is surely how stupid a scammer can get to do identity theft but lets not rule of the possibility of a credit card scamming gang involved into it or maybe more than that.

"MUMBAI: The cyber crime cell (CCC) of the Mumbai crime branch on Thursday arrested a 36-year-old marketing executive from Adilabad district of Andhra Pradesh for allegedly trying to lure investors by creating a fake webpage of the Anil Dhirubhai Ambani Group (ADAG).

According to the police, Sujankumar Narsima Reddy launched a webpage by using the logo of Reliance Communication and putting a photograph of its chairman Anil Ambani. “The accused floated several schemes regarding marketing of mobile handsets and insurance policies and promoted them as multi-level marketing schemes under the aegis of ADAG,” joint commissioner of police (crime) Rakesh Maria said.

Being a marketing person, Reddy’s schemes were well-planned, the police said. “It was a well-planned trap, but we foiled it before it became a big scam,” DCP Sanjay Mohite said.

Reddy just wanted those interested to fill up a form, giving their personal details, including name and address. He, however, did not demand any money from them, the police said.

The matter came to light when the legal department of the ADAG filed a complaint with the cyber cell on March 18. The complaint said that someone had launched a webpage (http://reliancemlmindia.blogspot.com) and was trying to cheat people.

The webpage, which also had a photo of Anil Ambani, informed people that the schemes were to be launched on April 10 and that was the deadline for those interested to become members." [Source]

-Abhi

Identity theft gone wrong - Users lured by brand Reliance

Cyber cime cell of mumbai arrested a marketing executive from andhra pradesh trying to lure investors by creating a fake webpage of ADAG - Reliance. He created a website at Google owned blogger (http://reliancemlmindia.blogspot.com/).

He launched multiple schemes for insurance, mobile handsets and lots of other marketing stuff and lured users to give their personal details like Name, Address, PAN card and other stuff, He did not ask them for money but surely his plans were far more superior.

Identity theft crime is picking up in India but the sophistication of doing such crimes is not yet there, I mean how stupid a person can get to host a website on blogger ?

This is surely how stupid a scammer can get to do identity theft but lets not rule of the possibility of a credit card scamming gang involved into it or maybe more than that.

"MUMBAI: The cyber crime cell (CCC) of the Mumbai crime branch on Thursday arrested a 36-year-old marketing executive from Adilabad district of Andhra Pradesh for allegedly trying to lure investors by creating a fake webpage of the Anil Dhirubhai Ambani Group (ADAG).

According to the police, Sujankumar Narsima Reddy launched a webpage by using the logo of Reliance Communication and putting a photograph of its chairman Anil Ambani. “The accused floated several schemes regarding marketing of mobile handsets and insurance policies and promoted them as multi-level marketing schemes under the aegis of ADAG,” joint commissioner of police (crime) Rakesh Maria said.

Being a marketing person, Reddy’s schemes were well-planned, the police said. “It was a well-planned trap, but we foiled it before it became a big scam,” DCP Sanjay Mohite said.

Reddy just wanted those interested to fill up a form, giving their personal details, including name and address. He, however, did not demand any money from them, the police said.

The matter came to light when the legal department of the ADAG filed a complaint with the cyber cell on March 18. The complaint said that someone had launched a webpage (http://reliancemlmindia.blogspot.com) and was trying to cheat people.

The webpage, which also had a photo of Anil Ambani, informed people that the schemes were to be launched on April 10 and that was the deadline for those interested to become members." [Source]

-Abhi

Identity theft gone wrong - Users lured by brand Reliance

Cyber cime cell of mumbai arrested a marketing executive from andhra pradesh trying to lure investors by creating a fake webpage of ADAG - Reliance. He created a website at Google owned blogger (http://reliancemlmindia.blogspot.com/).

He launched multiple schemes for insurance, mobile handsets and lots of other marketing stuff and lured users to give their personal details like Name, Address, PAN card and other stuff, He did not ask them for money but surely his plans were far more superior.

Identity theft crime is picking up in India but the sophistication of doing such crimes is not yet there, I mean how stupid a person can get to host a website on blogger ?

This is surely how stupid a scammer can get to do identity theft but lets not rule of the possibility of a credit card scamming gang involved into it or maybe more than that.

"MUMBAI: The cyber crime cell (CCC) of the Mumbai crime branch on Thursday arrested a 36-year-old marketing executive from Adilabad district of Andhra Pradesh for allegedly trying to lure investors by creating a fake webpage of the Anil Dhirubhai Ambani Group (ADAG).

According to the police, Sujankumar Narsima Reddy launched a webpage by using the logo of Reliance Communication and putting a photograph of its chairman Anil Ambani. “The accused floated several schemes regarding marketing of mobile handsets and insurance policies and promoted them as multi-level marketing schemes under the aegis of ADAG,” joint commissioner of police (crime) Rakesh Maria said.

Being a marketing person, Reddy’s schemes were well-planned, the police said. “It was a well-planned trap, but we foiled it before it became a big scam,” DCP Sanjay Mohite said.

Reddy just wanted those interested to fill up a form, giving their personal details, including name and address. He, however, did not demand any money from them, the police said.

The matter came to light when the legal department of the ADAG filed a complaint with the cyber cell on March 18. The complaint said that someone had launched a webpage (http://reliancemlmindia.blogspot.com) and was trying to cheat people.

The webpage, which also had a photo of Anil Ambani, informed people that the schemes were to be launched on April 10 and that was the deadline for those interested to become members." [Source]

-Abhi

Identity theft gone wrong - Users lured by brand Reliance

Cyber cime cell of mumbai arrested a marketing executive from andhra pradesh trying to lure investors by creating a fake webpage of ADAG - Reliance. He created a website at Google owned blogger (http://reliancemlmindia.blogspot.com/).

He launched multiple schemes for insurance, mobile handsets and lots of other marketing stuff and lured users to give their personal details like Name, Address, PAN card and other stuff, He did not ask them for money but surely his plans were far more superior.

Identity theft crime is picking up in India but the sophistication of doing such crimes is not yet there, I mean how stupid a person can get to host a website on blogger ?

This is surely how stupid a scammer can get to do identity theft but lets not rule of the possibility of a credit card scamming gang involved into it or maybe more than that.

"MUMBAI: The cyber crime cell (CCC) of the Mumbai crime branch on Thursday arrested a 36-year-old marketing executive from Adilabad district of Andhra Pradesh for allegedly trying to lure investors by creating a fake webpage of the Anil Dhirubhai Ambani Group (ADAG).

According to the police, Sujankumar Narsima Reddy launched a webpage by using the logo of Reliance Communication and putting a photograph of its chairman Anil Ambani. “The accused floated several schemes regarding marketing of mobile handsets and insurance policies and promoted them as multi-level marketing schemes under the aegis of ADAG,” joint commissioner of police (crime) Rakesh Maria said.

Being a marketing person, Reddy’s schemes were well-planned, the police said. “It was a well-planned trap, but we foiled it before it became a big scam,” DCP Sanjay Mohite said.

Reddy just wanted those interested to fill up a form, giving their personal details, including name and address. He, however, did not demand any money from them, the police said.

The matter came to light when the legal department of the ADAG filed a complaint with the cyber cell on March 18. The complaint said that someone had launched a webpage (http://reliancemlmindia.blogspot.com) and was trying to cheat people.

The webpage, which also had a photo of Anil Ambani, informed people that the schemes were to be launched on April 10 and that was the deadline for those interested to become members." [Source]

-Abhi

Identity theft gone wrong - Users lured by brand Reliance

Cyber cime cell of mumbai arrested a marketing executive from andhra pradesh trying to lure investors by creating a fake webpage of ADAG - Reliance. He created a website at Google owned blogger (http://reliancemlmindia.blogspot.com/).

He launched multiple schemes for insurance, mobile handsets and lots of other marketing stuff and lured users to give their personal details like Name, Address, PAN card and other stuff, He did not ask them for money but surely his plans were far more superior.

Identity theft crime is picking up in India but the sophistication of doing such crimes is not yet there, I mean how stupid a person can get to host a website on blogger ?

This is surely how stupid a scammer can get to do identity theft but lets not rule of the possibility of a credit card scamming gang involved into it or maybe more than that.

"MUMBAI: The cyber crime cell (CCC) of the Mumbai crime branch on Thursday arrested a 36-year-old marketing executive from Adilabad district of Andhra Pradesh for allegedly trying to lure investors by creating a fake webpage of the Anil Dhirubhai Ambani Group (ADAG).

According to the police, Sujankumar Narsima Reddy launched a webpage by using the logo of Reliance Communication and putting a photograph of its chairman Anil Ambani. “The accused floated several schemes regarding marketing of mobile handsets and insurance policies and promoted them as multi-level marketing schemes under the aegis of ADAG,” joint commissioner of police (crime) Rakesh Maria said.

Being a marketing person, Reddy’s schemes were well-planned, the police said. “It was a well-planned trap, but we foiled it before it became a big scam,” DCP Sanjay Mohite said.

Reddy just wanted those interested to fill up a form, giving their personal details, including name and address. He, however, did not demand any money from them, the police said.

The matter came to light when the legal department of the ADAG filed a complaint with the cyber cell on March 18. The complaint said that someone had launched a webpage (http://reliancemlmindia.blogspot.com) and was trying to cheat people.

The webpage, which also had a photo of Anil Ambani, informed people that the schemes were to be launched on April 10 and that was the deadline for those interested to become members." [Source]

-Abhi

Identity theft gone wrong - Users lured by brand Reliance

Cyber cime cell of mumbai arrested a marketing executive from andhra pradesh trying to lure investors by creating a fake webpage of ADAG - Reliance. He created a website at Google owned blogger (http://reliancemlmindia.blogspot.com/).

He launched multiple schemes for insurance, mobile handsets and lots of other marketing stuff and lured users to give their personal details like Name, Address, PAN card and other stuff, He did not ask them for money but surely his plans were far more superior.

Identity theft crime is picking up in India but the sophistication of doing such crimes is not yet there, I mean how stupid a person can get to host a website on blogger ?

This is surely how stupid a scammer can get to do identity theft but lets not rule of the possibility of a credit card scamming gang involved into it or maybe more than that.

"MUMBAI: The cyber crime cell (CCC) of the Mumbai crime branch on Thursday arrested a 36-year-old marketing executive from Adilabad district of Andhra Pradesh for allegedly trying to lure investors by creating a fake webpage of the Anil Dhirubhai Ambani Group (ADAG).

According to the police, Sujankumar Narsima Reddy launched a webpage by using the logo of Reliance Communication and putting a photograph of its chairman Anil Ambani. “The accused floated several schemes regarding marketing of mobile handsets and insurance policies and promoted them as multi-level marketing schemes under the aegis of ADAG,” joint commissioner of police (crime) Rakesh Maria said.

Being a marketing person, Reddy’s schemes were well-planned, the police said. “It was a well-planned trap, but we foiled it before it became a big scam,” DCP Sanjay Mohite said.

Reddy just wanted those interested to fill up a form, giving their personal details, including name and address. He, however, did not demand any money from them, the police said.

The matter came to light when the legal department of the ADAG filed a complaint with the cyber cell on March 18. The complaint said that someone had launched a webpage (http://reliancemlmindia.blogspot.com) and was trying to cheat people.

The webpage, which also had a photo of Anil Ambani, informed people that the schemes were to be launched on April 10 and that was the deadline for those interested to become members." [Source]

-Abhi