SlideShare a Scribd company logo
1 of 26
By Viral Parmar
Cyber Disorder
Who AM I
Viral Parmar
Founder of Infinite Defense Foundation
Mozilla Reps, Mozilla Foundation
Initiator of ā€œLogoutā€ worldā€™s biggest Privacy Awareness Campaign
Cyber Security Consultant
Cyber Security Researcher
Solved more than 40 cases of cyber-crime and online frauds.
Trained 50,000+ people till now and aware them about privacy and security.
Given Seminars and workshops in 100+ Organizations.
Always remember: Know hAckiNG, but no HaCKing.
Social Media Addiction
1. Carve with a razor "f57" on your hand, send a photo to the
curator.
2. Wake up at 4.20 a.m. and watch psychedelic and scary videos
that curator sends you.
3. Cut your arm with a razor along your veins, but not too deep,
only 3 cuts, send a photo to the curator.
4. Draw a whale on a sheet of paper, send a photo to curator.
5. If you are ready to "become a whale", carve "YES" on your leg.
If not, cut yourself many times (punish yourself).
6. Task with a cipher.
7. Carve "f40" on your hand, send a photo to curator.
8. Type "#i_am_whale" in your VKontakte status.
9. You have to overcome your fear.
10. Wake up at 4:20 a.m. and go to a roof (the higher the better)
11. Carve a whale on your hand with a razor, send a photo to
curator.
12. Watch psychedelic and horror videos all day.
13. Listen to music that "they" (curators) send you.
14. Cut your lip.
15. Poke your hand with a needle many times
16. Do something painful to yourself, make yourself sick.
17. Go to the highest roof you can find, stand on the
edge for some time.
18. Go to a bridge, stand on the edge.
19. Climb up a crane or at least try to do it
20. The curator checks if you are trustworthy.
21. Have a talk "with a whale" (with another player like
you or with a curator) in Skype.
22. Go to a roof and sit on the edge with your legs
dangling.
23. Another task with a cipher.
24. Secret task.
25. Have a meeting with a "whale."
26. The curator tells you the date of your death and you
have to accept it.
27. Wake up at 4:20 a.m. and go to rails (visit any
railroad that you can find).
28. Don't talk to anyone all day.
29. Make a vow that "you're a whale."
30-49. Everyday you wake up at 4:20am, watch horror
videos, listen to music that "they" send you, make 1 cut
on your body per day, talk "to a whale."
50. Jump off a high building. Take your life.
Protect Your Identity
1. Donā€™t talk to Unknown people on Internet .
2. Don't give your Information about yourself like:
I. Full name
II. Parents name
III. Date of birth
IV. Address
V. Phone number
VI. Donā€™t share photos
to anyone online that you don't trust or know.
Cyber Stalking, Cyber bullying, Cyber harassment
IT act 2008 Section 66C Identity theft 3 years jail and 5 lakh
IT act 2008 Section 66A sending Offensive message
IT act 2008 Section 66D cheating by personation
Where the issue stands
ā€¢ Major issue with school/college going students
ā€¢ Fake facebook profile
ā€¢ Sexting ā€“ Sexual predators
ā€¢ Identity theft
ā€¢ Bullying on public pages
ā€¢ Pornography
ā€¢ Defamatory
ā€¢ Selfie
ā€¢ 460 millions user online in india
Case Study
ā€¢ London base fake doctor giving 24 lakhs for kidney and asked for
expense to harvesting the kidney
ā€¢ Online extortion with 39 yr old women by 34 yr old man got 65 lakhs
ā€¢ Fake call from mall to verify the transaction and asked the all details
ā€¢ Girlfriend post the exposing photos of his boy friend on fake profile
ā€¢ Man created fake profile to get the affection from married woman
ā€¢ Boys photos were uploaded online by unknown person
ā€¢ Messages were send to father in law to stop the marriage to happen
ā€¢ Boyā€™s photos with past girl friend were uploaded to stop the
engagement
ā€¢ Fake company mails
ā€¢ Created fake company and asked for funds to invest
Any Questions
Contact Me
in.linkedin.com/in/viralparmarhacker
viralparmarhacker@gmail.com
facebook.com/viralparmarhacker
twitter.com/viralparmarhack
Stay Connected
Stay Safe
+91 8980808222
Thank You
#LogOutNow

More Related Content

Similar to Cyber Disorder

Leonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography Essay
Leonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography EssayLeonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography Essay
Leonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography Essay
Reina Rosado
Ā 
Hazing Powerpoint
Hazing PowerpointHazing Powerpoint
Hazing Powerpoint
kristen
Ā 

Similar to Cyber Disorder (11)

Reasons As To Why College Athletes Should Be Paid Essay
Reasons As To Why College Athletes Should Be Paid EssayReasons As To Why College Athletes Should Be Paid Essay
Reasons As To Why College Athletes Should Be Paid Essay
Ā 
Leonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography Essay
Leonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography EssayLeonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography Essay
Leonardo Da Vinci Biography Essay.pdfLeonardo Da Vinci Biography Essay
Ā 
What Is Narrative Essay Writing
What Is Narrative Essay WritingWhat Is Narrative Essay Writing
What Is Narrative Essay Writing
Ā 
Essay About My Friendship. Online assignment writing service.
Essay About My Friendship. Online assignment writing service.Essay About My Friendship. Online assignment writing service.
Essay About My Friendship. Online assignment writing service.
Ā 
How To Write A Scientific Essay
How To Write A Scientific EssayHow To Write A Scientific Essay
How To Write A Scientific Essay
Ā 
Best Scholarship Essays Writing Company
Best Scholarship Essays Writing CompanyBest Scholarship Essays Writing Company
Best Scholarship Essays Writing Company
Ā 
The power of public sociology
The power of public sociologyThe power of public sociology
The power of public sociology
Ā 
Pornography
PornographyPornography
Pornography
Ā 
Political Issues Free Essay Example. Online assignment writing service.
Political Issues Free Essay Example. Online assignment writing service.Political Issues Free Essay Example. Online assignment writing service.
Political Issues Free Essay Example. Online assignment writing service.
Ā 
Political Issues Free Essay Example
Political Issues Free Essay ExamplePolitical Issues Free Essay Example
Political Issues Free Essay Example
Ā 
Hazing Powerpoint
Hazing PowerpointHazing Powerpoint
Hazing Powerpoint
Ā 

More from Viral Parmar

We are Building Dystopia using AI & ML
We are Building Dystopia using AI & MLWe are Building Dystopia using AI & ML
We are Building Dystopia using AI & ML
Viral Parmar
Ā 

More from Viral Parmar (14)

We are Building Dystopia using AI & ML
We are Building Dystopia using AI & MLWe are Building Dystopia using AI & ML
We are Building Dystopia using AI & ML
Ā 
The malware effects
The malware effectsThe malware effects
The malware effects
Ā 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
Ā 
Why Privacy matters?
Why Privacy matters? Why Privacy matters?
Why Privacy matters?
Ā 
JWT Authentication with Django at PyTennessee 2019
JWT Authentication with Django at PyTennessee 2019JWT Authentication with Django at PyTennessee 2019
JWT Authentication with Django at PyTennessee 2019
Ā 
WebVR
WebVRWebVR
WebVR
Ā 
Rust Hack
Rust HackRust Hack
Rust Hack
Ā 
JS authentication with auth0
JS authentication with auth0JS authentication with auth0
JS authentication with auth0
Ā 
XSS
XSSXSS
XSS
Ā 
Extreme Web Exploitation
Extreme Web ExploitationExtreme Web Exploitation
Extreme Web Exploitation
Ā 
Facebook Breach - A wake up call
Facebook Breach - A wake up callFacebook Breach - A wake up call
Facebook Breach - A wake up call
Ā 
Who is spying on you ?
Who is spying on you ?Who is spying on you ?
Who is spying on you ?
Ā 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the web
Ā 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
Ā 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Ā 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Ā 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Ā 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Ā 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Ā 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Ā 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Ā 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Ā 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Ā 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Ā 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Ā 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Ā 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Ā 

Cyber Disorder

  • 2. Who AM I Viral Parmar Founder of Infinite Defense Foundation Mozilla Reps, Mozilla Foundation Initiator of ā€œLogoutā€ worldā€™s biggest Privacy Awareness Campaign Cyber Security Consultant Cyber Security Researcher Solved more than 40 cases of cyber-crime and online frauds. Trained 50,000+ people till now and aware them about privacy and security. Given Seminars and workshops in 100+ Organizations. Always remember: Know hAckiNG, but no HaCKing.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14. 1. Carve with a razor "f57" on your hand, send a photo to the curator. 2. Wake up at 4.20 a.m. and watch psychedelic and scary videos that curator sends you. 3. Cut your arm with a razor along your veins, but not too deep, only 3 cuts, send a photo to the curator. 4. Draw a whale on a sheet of paper, send a photo to curator. 5. If you are ready to "become a whale", carve "YES" on your leg. If not, cut yourself many times (punish yourself). 6. Task with a cipher. 7. Carve "f40" on your hand, send a photo to curator. 8. Type "#i_am_whale" in your VKontakte status. 9. You have to overcome your fear. 10. Wake up at 4:20 a.m. and go to a roof (the higher the better) 11. Carve a whale on your hand with a razor, send a photo to curator. 12. Watch psychedelic and horror videos all day. 13. Listen to music that "they" (curators) send you. 14. Cut your lip. 15. Poke your hand with a needle many times 16. Do something painful to yourself, make yourself sick. 17. Go to the highest roof you can find, stand on the edge for some time. 18. Go to a bridge, stand on the edge. 19. Climb up a crane or at least try to do it 20. The curator checks if you are trustworthy. 21. Have a talk "with a whale" (with another player like you or with a curator) in Skype. 22. Go to a roof and sit on the edge with your legs dangling. 23. Another task with a cipher. 24. Secret task. 25. Have a meeting with a "whale." 26. The curator tells you the date of your death and you have to accept it. 27. Wake up at 4:20 a.m. and go to rails (visit any railroad that you can find). 28. Don't talk to anyone all day. 29. Make a vow that "you're a whale." 30-49. Everyday you wake up at 4:20am, watch horror videos, listen to music that "they" send you, make 1 cut on your body per day, talk "to a whale." 50. Jump off a high building. Take your life.
  • 15.
  • 16. Protect Your Identity 1. Donā€™t talk to Unknown people on Internet . 2. Don't give your Information about yourself like: I. Full name II. Parents name III. Date of birth IV. Address V. Phone number VI. Donā€™t share photos to anyone online that you don't trust or know. Cyber Stalking, Cyber bullying, Cyber harassment
  • 17. IT act 2008 Section 66C Identity theft 3 years jail and 5 lakh IT act 2008 Section 66A sending Offensive message IT act 2008 Section 66D cheating by personation
  • 18.
  • 19.
  • 20. Where the issue stands ā€¢ Major issue with school/college going students ā€¢ Fake facebook profile ā€¢ Sexting ā€“ Sexual predators ā€¢ Identity theft ā€¢ Bullying on public pages ā€¢ Pornography ā€¢ Defamatory ā€¢ Selfie ā€¢ 460 millions user online in india
  • 21. Case Study ā€¢ London base fake doctor giving 24 lakhs for kidney and asked for expense to harvesting the kidney ā€¢ Online extortion with 39 yr old women by 34 yr old man got 65 lakhs ā€¢ Fake call from mall to verify the transaction and asked the all details ā€¢ Girlfriend post the exposing photos of his boy friend on fake profile ā€¢ Man created fake profile to get the affection from married woman ā€¢ Boys photos were uploaded online by unknown person ā€¢ Messages were send to father in law to stop the marriage to happen ā€¢ Boyā€™s photos with past girl friend were uploaded to stop the engagement ā€¢ Fake company mails ā€¢ Created fake company and asked for funds to invest
  • 22.
  • 23.