Combating Malware is a herculean task, one would admit. There are many things that go into it , decryption of the logic used, identification of the IP addresses, domain-names, and signatures. Majority of the antiviruses depend on these methods t... Read more
For past few weeks we have been observing an increase in phishing operations, related to 41 Indian Banks. This is the largest Phishing scam being hosted on a single server, the only reason being all Indian Banks have been targeted. Before I move... Read more
In the last post, I had demonstrated the detection of SURL Analyzer when served with exploits generated by MetaSploit. In this post I will be using SET – Social Engineering Toolkit, another favorite tool, used by Phishers. SET provides you... Read more
In continuation with the previous blog, wherein I have given a sneak preview about Statistical URL Analyzer. In this series of blog-posts, we shall briefly look into the MetaSploit and SET, two of the most widely used kits, which are used for ge... Read more
For past few day, twitter users have been receiving emails from Twitter, pertaining to the reset of their password or hack attempts on their twitter accounts. For past few weeks, after the discovery of brute force attack on Twitter login page an... Read more
Well, well, well, what do we have here, DRDO hacked, alongwith few other key Indian government websites targeted by an Algerian Hacker. Does this surprise me? No, is the apt answer. The List of sites hacked by SanFour25 alongwith the timeline of... Read more