Author Archives: Web_Osama

IoT Device and Hack

IoT Device and Hack This recent increase in IoT devices have proved mindboggling challenge to cyber world. No doubt IoT devices has significantly eased our life.  The smart refrigerator tells you when the milk is over, available veggies. Adding to this here are some of the noteworthy IoT devices. August doorbell camp: this small doorbell

Illegal Access part 1

Illegal access The term “hack” was first used by US university computing centre in mid-1960.  The offence of illegally accessing the system. There are two terms for illegal attempt to get into the system hacking and cracking. Hackers are people who get into the system and exploit the system for purpose. Breaking the password, setting

A short analysis of Ransomware in reference to Ohio ransomware attack

 A short analysis of Ransomware in reference to Ohio ransomware attack “Ransomware is more about manipulating vulnerabilities in human psychology than the adversary’s technological sophistication” As the world is becoming more techno savvy so are the crimes associated with it. Last year’s top most cyber security threat as reported by Malwarebytes labs.  Ransomware is kidnapping

“Mobile Malware from Timfonica to Triada”

“Mobile Malware from Timfonica to Triada” Malicious software that are targeted for mobile phones and personal digital devices was firstly introduced by Marcos Velasco (Brazilian software engineer) to aware the masses about the upcoming threat.However, Timifonica being the early form of mobile malware orginated by Spain and diagnosed by Russian labs has its fame competence

Anonymity Through Blind Signature Cryptosystem

Father of online anonymity David Chaum has brought in the revolutionary change in cryptography by introducing the concept of Blind signature. Among many of his notable contribution such as digi cash, new digital signature, anonymous communication, trust worthy voting system the ground concept lingers around maintaining the anonymity. Blind signature is that very concept which

CLOUD FORENSIC AND CHALLENGES

CLOUD FORENSIC AND CHALLENGE Major companies and also traditional vendors are using cloud services since cloud services provide broader horizon of services to the clients. As cloud services is becoming more widespread is involvement in crime is likely to increase. Over the time, the use of digital evidence in criminal and civil matters will continue

CLOUD FORENSICS AND IT’s CHALLENGES

CLOUD FORENSICS AND IT’s CHALLENGES Major companies and also traditional vendors are using cloud services since cloud services provide broader horizon of services to the clients. Cloud computing offers diverse benefits such as scalability, flexibility and readily available services. Flexibility benefit refers to the ability of using the computer resources you need when you need

IT Act still needs to be observed

IT Act still needs to be observed

The Information Technology Act, 2000 is so far, the most effective act which deals with cybercrime and electronics in India. The Act 2000 comprise of 94 section, divided among 13 chapters and 4 schedule. The very Act applies to whole India and also to the citizens of other countries who found guilty in cybercrime which