CSAM'13 Blogathon
Cognitive biases are the methodologies or rather we can say certain tendencies to think in certain manner, one of the core concepts of human psychology. It is the basis of social engineering a term that has become quite popular in the security world as it is often used to hamper the sanctity of sensitive information through an individual. So what social engineering is :- “It is an act which is
Bitcoin is a consensus system that enables a new payment system and completely digital money. It is the original decentralized peer-to-peer payment network which is driven by its users with no central authority, banks or middlemen. From a user point of view, Bitcoin is very much like cash for the Internet. Bitcoin is the first execution of a concept called “crypto-currency”, which was first explained in 1998 by Wei Dai,
Incident: Monster.com (Confidential information of 1.3 million job seekers stolen and used in a phishing scam) Date of incident: August 2007 Incident Background: The US recruitment site’s password protected resume library was hacked into by using servers of a Web hosting company and a group of targeted personal computers. Information belonging to job seekers was stolen and used by the perpetrators to send phishing mails seeking personal financial data of
Once upon a time there were computers – monstrous, mystical machines which whirred, purred and had tape spools which rotated randomly at high speeds! These hot machines were housed comfortably in air conditioned dust-free environments with geeky and nerdy whizkid operators, sorry, engineers. As the geeks grew older the computer became a small PC – eventually becoming part of human life. From a functional ‘supporting’ role the computer department now
Lets first be on a common platform and start with the pretext that hackers are bad guys and hacking is a bad thing because we have different understanding of these terms. By law of the own land, IT Act 2000 and IT Act (Amdt) 2008 and everywhere else hacking is a crime and a punishable offense. Hacking can be best defined as ‘ bypassing a computer security mechanism’ or to