Virtual money gets stolen by a Virtual application – how apt this is. BitCoin – new age digital currency without any government, generated using a complicated algorithm based on p2p but with a limit (21 million BTC), anonymous with p... Read more
In the first week of June 2011 informatics.nic.in was hacked and a message was posted which claimed that this was the handiwork of Anonymous. My first perception (based on the language and method used) was that, this is not the work of Anonymou... Read more
Malware writers are not only becoming more conversant in their programming skills but there also is a major improvement in their writing skills as well. This new malware string is only limited to Firefox browsers and only pops up when a Firefox... Read more
Recently launched Google’s 2 step verification is simply great. Its been quite a while since I have come across an algorithm which is simple to be utilized by the users yet technically complicated. As usual Google has provided a How it wor... Read more
SQL Injection is currently the widely used exploit to hack into servers. The novelty is not in the hack which garnered my attention but the fact that a Pen-Test tool being used to conduct this particular exercise. A few blogs ago I had mentioned... Read more