Implement cyber security measures to protect against potential threats
In the cyberspace dimension, every organization is at risk from cyber threats having the potential to disrupt essential services and potentially result in impacts to public safety. Over the past…
Browser Forensic Tool (BFT) – A Benign Tool or Malign Tool??
Uncovering the Browser Forensic Tool (BFT): Benign or Threat? This software boasts fast retrieval of browser history, but suspicions arose after use on a virtual machine. Despite having a COMODO…
Incident Response Case Study: Bitly Account Compromise
There is an important update from the Bitly Account Users from the Bitly Team. The Bitly Team is having some strong reasons to believe that Bitly account credentials may have…
साइबर लॉ के क्षेत्र में है करियर के साथ असीम संभावनायें
आज भारत में जिस तरह इंटरनेट का विस्तार हो रहा है, उसी तरह यहाँ साइबर लॉ की जरूरत भी महसूस की जाने लगी है। वास्तव में साइबर लॉ की जरूरत…
Some important commands in Ubuntu
Ubuntu is a Linux distribution based on Debian and composed mostly of free and open-source software. At some relevant point the user may want to execute the commands in the…
Could the computer in your car be hacked?
Did you know that cars can be hacked and remotely controlled? With vehicles becoming increasingly computerized, it's only a matter of time before they face the same vulnerabilities as PCs.…
Researchers released new attack code for exploiting SCADA vulnerabilities
The security of software used to control hardware at nuclear plants, gas refineries and other industrial settings is coming under renewed scrutiny as researchers released attack code exploiting dozens of…