Breaking News
malware-on-laptop

Browser Forensic Tool (BFT) – A Benign Tool or Malign Tool??

Someone referred me to the UNREMOTE link where an interesting article was posted about a tool named as “Browser Forensic Tool (BFT)”. The link is given below: http://unremote.org/2012/02/09/bft-browser-forensic-tool/ About BFT:According to the above given link, BFT is a software that will search in all kind of browser history (even archived) in few seconds. It will…

Read More
bitly-logo

Incident Response Case Study: Bitly Account Compromise

There is an important update from the Bitly Account Users from the Bitly Team. The Bitly Team is having some strong reasons to believe that Bitly account credentials may have been compromised; however, they have no indication at this time that the user’s account has been accessed without permission. Whenever a service provider is having some suspicion…

Read More
cyber-law

साइबर लॉ के क्षेत्र में है करियर के साथ असीम संभावनायें

आज भारत में जिस तरह इंटरनेट का विस्तार हो रहा है, उसी तरह यहाँ साइबर लॉ की जरूरत भी महसूस की जाने लगी है। वास्तव में साइबर लॉ की जरूरत हर उस देश में महसूस की जा रही है जहाँ भी साइबर अपराध हो रहे हैं। ऐसे में ज्यादातर सभी विकासशील देशों जहाँ इंटरनेट अभी…

Read More
ubuntu-logo

Some important commands in Ubuntu

Ubuntu is a Linux distribution based on Debian and composed mostly of free and open-source software. At some relevant point the user may want to execute the commands in the Terminal window to perform the basic functions. Such commands are being compiled by the author since he also owns the Ubuntu OS.

Read More
hacking-of-cars-ccin

Could the computer in your car be hacked?

As vehicles are increasingly computerized, researchers and industry officials consider it inevitable that cars will face the same vulnerabilities as PCs. Internal computer networks monitor and control everything from brakes, engines and transmissions to air bags and keyless-entry functions. Wireless connections, meanwhile, are becoming more common in reporting a vehicle’s position or providing information about…

Read More

Researchers released new attack code for exploiting SCADA vulnerabilities

The security of software used to control hardware at nuclear plants, gas refineries and other industrial settings is coming under renewed scrutiny as researchers released attack code exploiting dozens of serious vulnerabilities in widely used programs. The flaws, which reside in programs sold by Siemens, Iconics, 7-Technologies, Datac, and Control Microsystems, in many cases make it possible for attackers to…

Read More