Category Archives: IN

Cyber Security Intelligence Report 2013 (IBM Report)

Executive Summary & Analysis of Cyber Security Report: Recently IBM has published a report that explains the Global threat landscape encompassing 3700 clients across 130 countries and is a complementary to IBM X-Force Report. As per the published report, Manufacturing, Finance & Insurance are in the list of most attacked industries which is nearly 50% […]

Operation Hangover : Unveiling an Indian CyberAttack Infrastructure (NormanShark Report)

Norway-based security firm Norman released a comprehensive report that examines a sophisticated Cyber Attack Infrastructure that appears to be originated from India, conducted by private threat actors with no evidence of state-sponsorship. As per published report this attack was in operation for over last three years, primarily as a platform for surveillance against Pakistan and possibly United States in […]

Celebrate Hardware Freedom Day

You’ve heard about Open Hardware and would love to discover more, be able to ask questions and see some live action? You already have some hackable stuff and would like to meet with like-minded people in your neighbourhood? Then Hardware Freedom Day is for you: check out events map and find a location in your area celebrating HFD. For more […]

Celebrate Hardware Freedom Day

You’ve heard about Open Hardware and would love to discover more, be able to ask questions and see some live action? You already have some hackable stuff and would like to meet with like-minded people in your neighbourhood? Then Hardware Freedom Day is for you: check out events map and find a location in your area celebrating HFD. For more [...]

*Parallelized* Data Mining (PDM) Security

Parallel Data Mining is currently attracting much research. Objects involved with ‘Parallel Data Mining’ include special type of entities with the ability to migrate from one processor to another where it can resume / initiate its execution. In this article we consider security issues that need to be addressed before these systems in general, and […]

Compliance Hacking | A new and defined terminology!

Things which are ethical for me may not be ethical for you, so when we talk about something ethical, it’s all about moral philosophy and in my view moral philosophy is nothing more than a perception, which varies people to people and community to community. Take a case, where, a hacker group from Pakistan trying […]

Thwarting XSS!

Data containing HTML or Java Script can really be one of the BIGgest problem, specially when its is being specified by a ‘user’. For example simple application like Blog, where user can submit the comments after reading the post, which’s being displayed. If the user is ‘not-that-bad’ and enters only plain text, then seriously no problem. Let’s take […]

Securing the ‘ClouD’…

Where and how our data is composed, processed, accessed, stored, backed up and destroyed is, what is sure to become massively overlaid cloud-based services and ‘by whom’ and ‘using whose infrastructure’ solely yields significant concerns related to security, privacy, compliance and survivability. This paper will show multiple cascading ‘levels of failure’ associated with relying on […]

CyberSEC

CyberSEC | A Desperate Attempt Towards Cyber Safety CyberSEC is first of its kind, Not for Profit, Knowledge Sharing initiative on Basic Cyber Safety and bring Security Awareness. A DeSperate AttEmpt Towards Cyber Safety