In the first week of June 2011 informatics.nic.in was hacked and a message was posted which claimed that this was the handiwork of Anonymous. My first perception (based on the language and method used) was that, this is not the work of Anonymou... Read more
Malware writers are not only becoming more conversant in their programming skills but there also is a major improvement in their writing skills as well. This new malware string is only limited to Firefox browsers and only pops up when a Firefox... Read more
Recently launched Google’s 2 step verification is simply great. Its been quite a while since I have come across an algorithm which is simple to be utilized by the users yet technically complicated. As usual Google has provided a How it wor... Read more
SQL Injection is currently the widely used exploit to hack into servers. The novelty is not in the hack which garnered my attention but the fact that a Pen-Test tool being used to conduct this particular exercise. A few blogs ago I had mentioned... Read more
Nothing new nor surprising but just an affirmation that Sony’s woes are far from over. Sony has been hacked almost 10 times in past three weeks. Though this is of little interest nor would want to specify the do’s and dont’s ,... Read more