• malware-on-laptop
    Antimalware,  Browser Forensic Tool (BFT),  Cyber Investigation

    Browser Forensic Tool (BFT) – A Benign Tool or Malign Tool??

    Someone referred me to the UNREMOTE link where an interesting article was posted about a tool named as “Browser Forensic Tool (BFT)”. The link is given below: http://unremote.org/2012/02/09/bft-browser-forensic-tool/ About BFT:According to the above given link, BFT is a software that will search in all kind of browser history (even archived) in few seconds. It will retrieve URLs and Title with chosen keywords of all matching search. One can use default example profiles or create a new one, with thematic search. At first hand since never heard something like this, hence, it was obvious for me to take BFT for a test ride and to know whether it is worth using…

  • bitly-logo
    Hacking,  Incident Response,  RFC 2104

    Incident Response Case Study: Bitly Account Compromise

    There is an important update from the Bitly Account Users from the Bitly Team. The Bitly Team is having some strong reasons to believe that Bitly account credentials may have been compromised; however, they have no indication at this time that the user’s account has been accessed without permission. Whenever a service provider is having some suspicion of account compromising incident, it is better to take precautions. In the same manner, to play safe in the cyberspace The Bitly Team had proactively disconnected any connections one might had done with Facebook and Twitter to publish the posts by using the URL Shortening Links using bit.ly or bitly.com. Once can safely reconnect these…

  • cyber-law
    Career Counselling,  Cyber Law

    साइबर लॉ के क्षेत्र में है करियर के साथ असीम संभावनायें

    आज भारत में जिस तरह इंटरनेट का विस्तार हो रहा है, उसी तरह यहाँ साइबर लॉ की जरूरत भी महसूस की जाने लगी है। वास्तव में साइबर लॉ की जरूरत हर उस देश में महसूस की जा रही है जहाँ भी साइबर अपराध हो रहे हैं। ऐसे में ज्यादातर सभी विकासशील देशों जहाँ इंटरनेट अभी पूरी तरह से जड़ें जमा नहीं पाया है, वहाँ भी साइबर लॉ की जरुरत महसूस की जा रही है। साइबर अपराध को निपटाने और न्याय दिलाने के लिए इसके विशेषज्ञों की माँग लगातार बढ़ रही है। इसी जरुरत को ध्यान में रखते हुए साइबर लॉ से संबंधित पाठयक्रमों की शुरुआत अब ज्यादातर इंस्टीट्यूट में कर…

  • ubuntu-logo
    Ubuntu

    Some important commands in Ubuntu

    Ubuntu is a Linux distribution based on Debian and composed mostly of free and open-source software. At some relevant point the user may want to execute the commands in the Terminal window to perform the basic functions. Such commands are being compiled by the author since he also owns the Ubuntu OS.

  • hacking-of-cars-ccin
    Hacking

    Could the computer in your car be hacked?

    As vehicles are increasingly computerized, researchers and industry officials consider it inevitable that cars will face the same vulnerabilities as PCs. Internal computer networks monitor and control everything from brakes, engines and transmissions to air bags and keyless-entry functions. Wireless connections, meanwhile, are becoming more common in reporting a vehicle’s position or providing information about the car’s functions. Some auto companies are creating applications to allow users to control some features in their car with their smartphone. On 10 March, 2011 there was a news update that “Researchers had found that Cars can be hacked and remotely controlled“. You can refer the link here to read the news: Could the computer…

  • SCADA

    Researchers released new attack code for exploiting SCADA vulnerabilities

    The security of software used to control hardware at nuclear plants, gas refineries and other industrial settings is coming under renewed scrutiny as researchers released attack code exploiting dozens of serious vulnerabilities in widely used programs. The flaws, which reside in programs sold by Siemens, Iconics, 7-Technologies, Datac, and Control Microsystems, in many cases make it possible for attackers to remotely execute code when the so-called supervisory control and data acquisition software is installed on machines connected to the internet. Attack code was released by researchers from two separate security camps over the past week. “SCADA is a critical field but nobody really cares about it,” Luigi Auriemma, one of the researchers, wrote in an…