Blog

Blog

Illegal Access part 1

Illegal access The term “hack” was first used by US university computing centre in mid-1960.  The offence of illegally accessing the system. There are two terms for illegal attempt to get into the system hacking and cracking. Hackers are people who get into the system and exploit the system for purpose. Breaking the password, setting

Cyber Crime and Cyber Security!

Cyber Crime and Cyber Security! Cybercrime and cyber security is the trending topic which is all over the internet. Cybercrime and cyber security go hand in hand. Cybercrime are the criminal activity carried by means of computer, other electronic devices and internet. Cyber security is the protection from cybercrime in cyber space. Cyber security has

Salami Attack

What is a Salami Attack? A salami is a slice of meat. An attack is made on the computer system or network where a cybercriminal successfully transfers a small amount of money (a very negligible amount) from the victims file or bank account to his account. The transferred amount is a small slice of a

Hacking CCTV

The attacks on the CCTV Camera Systems, in recent times have been elevated. Perpetrators can easily hack into your camera system and spy on everywhere and every time whenever they want even without your knowledge says Zayed Aljaberi, the founder of wesecure.ae. He demonstrated a process of hacking into a CCTV System within 30 seconds.

Use of Encryption in Cyber Crimes

What is Encryption? Encryption is the process of converting readable text (data) into an unreadable form (code or cipher text) using a mathematical algorithm. The reverse of this process, i.e. converting cipher text or encrypted data back into its original form is called Decryption. There are 2 types of encryption: Symmetric Asymmetric Both types of

Phishing : Gmail Scams

The art of creating phishing schemes are mastered by some hackers who have attained a P.hd in it. Even the best of the best technologically savy users fall for it because of the fake documents created by the hackers seems almost realistic and above all quite legitimate which sets up the trap for them. This

A short analysis of Ransomware in reference to Ohio ransomware attack

 A short analysis of Ransomware in reference to Ohio ransomware attack “Ransomware is more about manipulating vulnerabilities in human psychology than the adversary’s technological sophistication” As the world is becoming more techno savvy so are the crimes associated with it. Last year’s top most cyber security threat as reported by Malwarebytes labs.  Ransomware is kidnapping

“Mobile Malware from Timfonica to Triada”

“Mobile Malware from Timfonica to Triada” Malicious software that are targeted for mobile phones and personal digital devices was firstly introduced by Marcos Velasco (Brazilian software engineer) to aware the masses about the upcoming threat.However, Timifonica being the early form of mobile malware orginated by Spain and diagnosed by Russian labs has its fame competence

Web Defacement

What is Web Defacement? Web Defacement is an attack on the website where the attacker damages the visual appearance of the website by either altering or replacing the originally present content, images or designs on the website. The common objective of this attack is to damage the credibility of the entity/ individual owning the website.

Online Gambling

What is Online Gambling? The act of betting money via the internet is known as Online Gambling. In India, gambling is illegal but it is permitted in many other countries. The availability of websites facilitating gambling and readily available internet access has made gambling easily accessible. What are the threats? Online Gambling is accessible online