In the first week of June 2011 informatics.nic.in was hacked and a message was posted which claimed that this was the handiwork of Anonymous. My first perception (based on the language and... Read more
Recently launched Google’s 2 step verification is simply great. Its been quite a while since I have come across an algorithm which is simple to be utilized by the users yet technically... Read more
SQL Injection is currently the widely used exploit to hack into servers. The novelty is not in the hack which garnered my attention but the fact that a Pen-Test tool being used to conduct th... Read more
Nothing new nor surprising but just an affirmation that Sony’s woes are far from over. Sony has been hacked almost 10 times in past three weeks. Though this is of little interest nor w... Read more
This blog is based on the events described in this article, which appeared in Times of India and a few other newspapers. In a nutshell – the accused had managed to transfer huge amount... Read more
Some of the industry experts are sceptical about their scepticism of the authenticity of Stars Virus and this blog is an extension of the previous blog on Stars Virus. Logically and rational... Read more