North Korea’s Facebook clone StarCon gets hacked hours after being launched

Default password helped British teen hack into North Korea’s Facebook clone StarCon It was recently revealed that North Korea has its own version of Facebook social media website, apparently installed by the state-run Internet service provider. However, this clone set up in North Korea has already been hacked. While North Korea is known for its Read more about North Korea’s Facebook clone StarCon gets hacked hours after being launched[…]

Cyber Crime In India

The advancement of technology has made man dependent on Internet for all his needs. Internet has given man easy access to everything while sitting at one place. Social networking, online shopping, storing data, gaming, online studying, online jobs, every possible thing that man can think of can be done through the medium of internet. Internet Read more about Cyber Crime In India[…]

Phone Sim Forensics

With MOBIL Forensic you can view, search or retrieve all data from a phone with only a few clicks. This data includes call history, phonebook, text messages, multimedia messages, files, calendars, notes, reminders and raw application data. It will also retrieve all phone information such as IMEI, operating systems, firmware including SIM details (IMSI), ICCID Read more about Phone Sim Forensics[…]

What is buffer overflow attack

Buffer overflow errors are characterized by the overwriting of memory fragments of the process, which should have never been modified intentionally or unintentionally. Overwriting values of the IP (Instruction Pointer), BP (Base Pointer) and other registers causes exceptions, segmentation faults, and other errors to occur. Usually these errors end execution of the application in an Read more about What is buffer overflow attack[…]

What is Cryptography

Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Modern cryptography concerns itself with the following four objectives:  Confidentiality Integrity   Non-repudiation   Authentication Risk Factors for Cryptography Systems There is no simple formula for determining how safe a Read more about What is Cryptography[…]