The D-Day is finally arriving ie. 8th April 2014, when Microsoft pulls the plug on its most successful OS WindowsXP. Those who haven’t yet migrated are going to face a lot of 0Day Attacks , which have been saved by the criminals to be used... Read more
With a goal of securing e-commerce, Korean government developed its own encryption technology, SEED in the year 1990. Wherein, the system requires users to produce an authentication which is a digital certificate issued by local authorities, sec... Read more
The world still remains stunned by the mystery of what has actually happened to Malaysia Airlines Flight MH370 which went missing on March 8, 2014. Even though the missing flight’s fate is still an unsolved mystery, there is one thing which is v... Read more
Recently I received a comment on the blog for an article written about .RU registry. Comment: Clause 9.6.2 IS NOT requires mandatory verification, it is just states the list of data, which is kept in registry. It is similar to 3.3 clause of ICAN... Read more
Did you ever encounter issues in your PC even after having anti-virus software installed in it? And later you realize that it is not a legitimate antivirus software and just a fake application? Chances are you have installed a Trojan-Horse. Bein... Read more
July 9 2012 , was the day when FBI pulled down the curtains on Operation GhostClick. GhostClick was the name given to the operation which was targeted towards the DNSChanger Bot wherein FBI had seized the malicious servers and on 9th July they p... Read more