Tag "Blogathon"

A “BIT” of the future money

Bitcoin is a consensus system that enables a new payment system and completely digital money. It is the original decentralized peer-to-peer payment network which is driven by its users with no central authority, banks or middlemen. From a user point of view, Bitcoin is very much like cash for the Internet. Bitcoin is the first execution of a concept called “crypto-currency”, which was first explained in 1998 by Wei Dai,

Security Incident

Incident: Monster.com (Confidential information of 1.3 million job seekers stolen and used in a phishing scam) Date of incident: August 2007 Incident Background: The US recruitment site’s password protected resume library was hacked into by using servers of a Web hosting company and a group of targeted personal computers. Information belonging to job seekers was stolen and used by the perpetrators to send phishing mails seeking personal financial data of

Superhumans: a.k.a. Information Security Professionals

Once upon a time there were computers – monstrous, mystical machines which whirred, purred and had tape spools which rotated randomly at high speeds! These hot machines were housed comfortably in air conditioned dust-free environments with geeky and nerdy whizkid operators, sorry, engineers. As the geeks grew older the computer became a small PC – eventually becoming part of human life. From a functional ‘supporting’ role the computer department now

Can hacking ever be ‘Ethical’?

Lets first be on a common platform and start with the pretext that hackers are bad guys and hacking is a bad thing because we have different understanding of these terms. By law of the own land, IT Act 2000 and IT Act (Amdt) 2008 and everywhere else hacking is a crime and a punishable offense. Hacking can be best defined as ‘ bypassing a computer security mechanism’ or to

Security Audits

1.      With increasing insecurity in the Cyber Domain, Cyber Security has become an essential part of our life. Digital gadgets cannot be done away with in the present scenario. At home or at office you are living in a virtual world and the dangers of this imaginary world have intruded in our day to day lives. Now we speak of Cyber Crime, Cyber Espionage and Cyber War which are the