Blog

Blog

Data Alteration or Diddling

What is data diddling ? Data Diddling can be defined as illegal or unauthorized fraudulent alteration of data. It is the process of modifying data before or after it is entered into the system, generating a faulty output. What are the threats ? While processing large amounts of data, criminals either alter the input or

Cyber Terrorism & Cyber Warfare

Cyber Terrorism & Cyber Warfare What is cyber terrorism ? Cyber Terrorism can be defined as activities done with the intention to threaten unity, integrity, security or sovereignty of a country or terrorize people or sections of people by way of Unauthorized access Denying legitimate access/ service Disrupting services Damage critical information infrastructure etc. What

Ancalog Document Silent Exploit Builder – Cyber-Criminal Tool

Ancalog Document Silent Exploit Builder – Cyber-Criminal Tool

According to the technical paper from SophosLabs. Document exploitation is a well-known method of distributing malware. SophosLabs explores why we’re seeing more document exploitation malware in the wild, and investigates the long-standing popularity of a document exploitation generator called Ancalog, which is widely commercially available. Ancalog builder supports several methods for malware distribution using different file formats. Features :

Cyber Bullying & Stalking

Cyber Bullying & Stalking What is Cyber Bullying? Cyber bullying may be defined as the use of online and digital technologies to hurt, ridicule, embarrass or inflict harm on others. Who are Cyber Bullies? Bullies are usually vocally abusive and persistent. They often gang up on their victims. Cyber bullies are those people who carry

Digital Society Day

17 Oct 2016…IT Act turned sweet 16 ..a age considered by few as entry to freedom while by some as turning mature and responsible. Digital India, Skill India, IT Act, Smart cities….are words of the day.Everyone uses them as at their will.Few serious infosec enthusiasts ( Triveni Singh , Naavi and few more of them)

Festive Season of Ransomware

Festive Season of Ransomware

It’s the talk of the town, everyone is talking about it and even falling prey to it. All so called experts and information security enthusiasts have shifted their focus and resume highlight point to ransomware. It’s money for the creator and also for the publisizers in form of speakers and solutions provider. Every what’s app

ODIN Mode in Samsung Mobile

ODIN Mode in Samsung Mobile

When I power on the mobile (Samsung SM-A800F) to connect it to UFED this screen is shown. Mobile starts in ODIN Mode. Unless it doesn’t start I can’t connect it to UFED and carry out analysis. Few questions -Why is it starting in this mode. Is it been wiped? -Why is the solution? -Should the