This blog has been inspired by Rebecca Herold’s blog post. In a Gist: A computer user, we shall say the intended victim – receives a call and is asked to verify certain facts about the computer system they own and based on the type o... Read more
This is a quick post about vulnerabilities exposed by a Lebanese hacker who goes by the handle Idhac. According to Idhac, there exist two vulnerabilities in apple.com 1: IFrame Injection (https://consultants.apple.com) 2: Blind SQL Injection (ht... Read more
A few hours ago twitter account of Fox News @FoxNewsPolitics was hacked and misinformation was tweeted. The contention of this blog is to not discuss how @foxnewspolitics got hacked but a few recommendations on how to save yourself from embarras... Read more
[UPDATE] LulzSec Denies. @LulzSec The Lulz Boat Just saw the pastebin of the UK census hack. That wasn’t us – don’t believe fake LulzSec releases unless we put out a tweet first. —— LulzSec in their recent #AntiSec... Read more
Virtual money gets stolen by a Virtual application – how apt this is. BitCoin – new age digital currency without any government, generated using a complicated algorithm based on p2p but with a limit (21 million BTC), anonymous with p... Read more