Category Archives: Uncategorized

IoT Device and Hack

IoT Device and Hack This recent increase in IoT devices have proved mindboggling challenge to cyber world. No doubt IoT devices has significantly eased our life.  The smart refrigerator tells you when the milk is over, available veggies. Adding to this here are some of the noteworthy IoT devices. August doorbell camp: this small doorbell

Illegal Access part 1

Illegal access The term “hack” was first used by US university computing centre in mid-1960.  The offence of illegally accessing the system. There are two terms for illegal attempt to get into the system hacking and cracking. Hackers are people who get into the system and exploit the system for purpose. Breaking the password, setting

Cyber Crime and Cyber Security!

Cyber Crime and Cyber Security! Cybercrime and cyber security is the trending topic which is all over the internet. Cybercrime and cyber security go hand in hand. Cybercrime are the criminal activity carried by means of computer, other electronic devices and internet. Cyber security is the protection from cybercrime in cyber space. Cyber security has

A short analysis of Ransomware in reference to Ohio ransomware attack

 A short analysis of Ransomware in reference to Ohio ransomware attack “Ransomware is more about manipulating vulnerabilities in human psychology than the adversary’s technological sophistication” As the world is becoming more techno savvy so are the crimes associated with it. Last year’s top most cyber security threat as reported by Malwarebytes labs.  Ransomware is kidnapping

“Mobile Malware from Timfonica to Triada”

“Mobile Malware from Timfonica to Triada” Malicious software that are targeted for mobile phones and personal digital devices was firstly introduced by Marcos Velasco (Brazilian software engineer) to aware the masses about the upcoming threat.However, Timifonica being the early form of mobile malware orginated by Spain and diagnosed by Russian labs has its fame competence

AN INSIDE OF CYBER/ONLINE BULLYING

  by Arfiya Siddique “Replace cyber-bullying with cyber-believing. Let us build each other up instead of bringing others down. BELIEVE & BUILD” ― Janna Cachola Cyberbullying or Online Bullying is the use of technology to harass, threaten, embarrass  a target person by another individual or a group by the use of internet and digital devices.

CLOUD FORENSICS AND IT’s CHALLENGES

CLOUD FORENSICS AND IT’s CHALLENGES Major companies and also traditional vendors are using cloud services since cloud services provide broader horizon of services to the clients. Cloud computing offers diverse benefits such as scalability, flexibility and readily available services. Flexibility benefit refers to the ability of using the computer resources you need when you need

November Issue is Out….

Hi Readers, Thanks for your over whelming support for the inaugural issue of Digital 4n6 Journal.We have come out with the second issue after incorporating all the suggestions given by you. We have given a new look and also changed the size of the Journal and now we can proudly say it is second to