The UnBroken Encrypted Message since 1942
Back in time, Encryption used to be weak, plain, and simple. We can break those in couple of seconds with a normal PC over a brute-force attack. With the modern computing Grids, its possible to … Read more
Back in time, Encryption used to be weak, plain, and simple. We can break those in couple of seconds with a normal PC over a brute-force attack. With the modern computing Grids, its possible to … Read more
Chinese Government has added additional layers of filtering to all traffic that reaches the end-users. The censorship is one of it kinds which assures cleaner WWW. Because of this civilized censorship, the browsing experience is … Read more
Just How powerful one man, one President could be? He can order National Security and get a Nation wide “Emergency”. But did any one ever heard, President of a country shutting down Internet for the … Read more
Sometimes its ridiculous how the most common (and important) technology in our daily-life is vulnerable to kinds of attacks that could bring nightmares. Still, no one is aware, no one is doing anything. Such is … Read more
Wi-Fi, since it’s birth suffers from security issues. It’s first Encryption, WEP, can today be broken in a minute. and Irony — It’s still used commonly. What’s new? Computer scientists in Japan say they’ve developed … Read more
How big can a theft be? 100s of credit card no.s and total amount of millions? Wrong. Today, this theft is much bigger than any one has ever seen. 130 Million Credit card numbers, a … Read more
While I write this, Twitter went down again. Another DDoS Attack just like the one we had seen earlier. Social networks are most prone to different kinds of threats. Why Social sites? Almost every one … Read more
Almost Every enterprise we know of relies on wireless infrastructure to run their offices, remote users, some way or the other. The best practices being adopted the Industry’s Top players are no longer secrets, they … Read more
Domain hijacking is the process by which internet domain names are stolen from the rightful registrant. Domain theft is an aggressive form of domain hijacking that usually involves an illegal act. In most cases, identity theft … Read more
He wakesup from a dream, which he thought was a dream. In the dream world he is a hacker, and to enter the Real world, he takes the Red pill, He wakes up to the … Read more
Apple had been silent on the Critical Vulnerability found by BlackHat’s security expert presenter, till Google went ahead with the similar fix for the Android platform. I haven’t heard the official news coming directly Apple, but Carriers are … Read more
BlackHat is a yearly security conference where Industry’s most Dark side secrets are revealed. Few years back, Sir Lenin identified a Cisco security flaw that could bring down EVERY SINGLE CISCO ROUTER in the world. Lenin was from … Read more
After a decade of being offline they are back again, this time with geeky video reports about security, Hacker News Network. Hacker News Network, HNN, is one of the projects of the Boston-based hacker. The Project … Read more
Botnet is a collection of software robots, or bots, that run automatically. It is often associated with malicious software over network of computers using distributed computing. While botnets are often named after their malicious software … Read more
I can’t seem to believe it. Are governments and National Security Agencies blind? E-Passports are becoming popular amoung a large no. of countries and it’s so easy to hack and clone, but no one has … Read more