North Korea’s Facebook clone StarCon gets hacked hours after being launched

Default password helped British teen hack into North Korea’s Facebook clone StarCon It was recently revealed that North Korea has its own version of Facebook’s social media website, apparently installed by the state-run Internet service provider. However, this clone set up in North Korea has already been hacked. While North Korea is known for its Read more about North Korea’s Facebook clone StarCon gets hacked hours after being launched[…]

Cyber Crime In India

The advancement of technology has made man dependent on the Internet for all his needs. The Internet has given easy access to everything while sitting in one place. Social networking, online shopping, storing data, gaming, online studying, online jobs, every possible thing that man can think of can be done through the medium of the Read more about Cyber Crime In India[…]

Phone Sim Forensics

With MOBIL Forensic you can view, search or retrieve all data from a phone with only a few clicks. This data includes call history, phonebooks, text messages, multimedia messages, files, calendars, notes, reminders, and raw application data. It will also retrieve all phone information such as IMEI, operating systems, firmware including SIM details (IMSI), ICCID, Read more about Phone Sim Forensics[…]

What is buffer overflow attack

Buffer overflow errors are characterized by the overwriting of memory fragments of the process, which should have never been modified intentionally or unintentionally. Overwriting values of the IP (Instruction Pointer), BP (Base Pointer), and other registers cause exceptions, segmentation faults, and other errors to occur. Usually, these errors end the execution of the application in Read more about What is buffer overflow attack[…]

What is Cryptography

Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Modern cryptography concerns itself with the following four objectives:  Confidentiality Integrity  Non-repudiation  Authentication Risk Factors for Cryptography Systems There is no simple formula for determining how safe a Read more about What is Cryptography[…]