Youth held for befriending others creating fake Fb profiles

Bs_logoImage
Press Trust of India Kolkata
Last Updated : Aug 11 2016 | 9:13 PM IST
Three years after a complaint was registered by a woman, the Cyber section of Kolkata Police today arrested one person for befriending several others creating fake profiles on the Facebook and cheating them, the police said.
Rahul Dev Karan (23) was arrested from his hideout in the Kasba area by the Kolkata Police Cyber Crime section more than three years after the complain was filed in May 2013.
According to a senior officer of the Force, five mobile phones, two SIM cards and several fake documents including student identity cards of Jadavpur University were seized from Karan.
"The accused used to befriend people impersonating as somebody else creating fake profiles using photographs of others. He used to chat and grow close to them and then asked them to recharge his mobile phone with an amount ranging from Rs 200 to Rs 2,000," the officer said.
According to the survey, outdated information security
architecture and controls have most increased risk exposure for Indian industry over the last 12 months, with as many as 61 per cent of the respondents citing this aspect as their top most vulnerability.
Careless or unaware employees was second-most important concern for 58 per cent.
"Majority (54 per cent) believe that cyber-attacks are primarily targeted at defacing or disrupting organisations or towards stealing intellectual property or data (51 per cent), followed by fraud (48 per cent)," the report said.
According to the Indian respondents, management and governance issues (42 per cent), followed by lack of quality tools for managing information security and lack of executive awareness and support (41 per cent) were seen as the main challenges for information security operations.
On the impact of the upcoming technology space-- Internet of Things (IoT)-- the report found that organisations are struggling with the huge number of devices that will become part of their networks
"The most important information security challenges of IoT were identified as finding hidden or zero-day attacks (50 per cent), identifying suspicious traffic over the network (44 per cent) and ensuring that implemented security controls are meeting the requirements of the day (40 per cent)," the report said.

You’ve reached your limit of 5 free articles this month.
Subscribe now for unlimited access.

Already subscribed? Log in

Subscribe to read the full story →
Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Access to Exclusive Premium Stories

  • Over 30 subscriber-only stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

First Published: Aug 11 2016 | 9:13 PM IST