Articles on Cyber Security

oclHashcat-plus v0.08 Released – fastest password Cracker


As far as password recovery utilities go, Cain & Abel is by far one of the best out there. It’s designed to run on Microsoft Windows 2000/XP/Vista but has methods to recover passwords for other systems. Cain & Abel is a password recovery tool for Microsoft Operating Systems.

The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines.
According several researches the principal search engines index only a small portion of the overall web content, the remaining part is unknown to the majority of web users.

Dear Readers, in this artcle I am trying to give precise information about ‘different types of Cyber Crimes’ which is very important to know in this Computer Era and I am sure that it will help you all to be aware of all such crimes. Over the past 10 years the Internet has become very important source in the India.

Technology; a vast term to understand and to explain, however it becomes more complicated and difficult when it keeps changing very often. There are lots of technical glitches which every technical person face. In today’s computer Modernization, Security is the biggest challenge for every Technology and to implement it is another good question.

New Delhi: A hacking group said it attacked the Mahanagar Telephone Nigam Limited (MTNL) website, accusing the company of censoring content on the Internet.
The corporate website of MTNL, which caters to the major Indian cities of New Delhi and Mumbai, was down for at least six hours. A post on hacking group Anonymous India's blog said the company was attacked because it had blocked several file sharing websites.

But MTNL officials denied any knowledge of an attack.

Whenever we talk about the Cyber Security, we should always remember that precaution is the best countermeasure, however there are few countermeasures which should be followed by every computer user in order secure themselves from the professional crackers while using computers and internet. The countermeasures are mentioned as follows;

Always make sure that your Password is Alpha Numeric (i.e. combination of both letters & numbers and also use some special characters if you can).

Always keep your Password length of minimum 8 characters.

Anonymous Hackers, with Twitter account "LulzsecReborn" Hack into TweetGif (http://tweetgif.com) and Hack complete Database, Later they publish that on Internet also. TweetGif is a website which allow you to use animated GIF image as your twitter picture.

LulzSec Reborn, a 3.0 version of the earlier LulzSec, has leaked 10,000 Twitter profiles’ passwords, Usernames, real names, locations, bios, avatars and secret tokens used to authenticate their accounts.
Pastebin message posted: The leaked data was uploaded to embed upload and contains a 4 MB SQL file with all the users details.

serious security bug in MariaDB and MySQL Disclosed, According to Advisory All MariaDB and MySQL versions up to 5.1.61, 5.2.11, 5.3.5, 5.5.22 are vulnerable. This issue got assigned an id CVE-2012-2122.

In today’s electronic world, E-Mail is critical to any business being competitive. In most cases it now forms the backbone of most organizations’ day-to-day activities, and its use will continue to grow. E-Mails have enabled an efficient means of communication, without the limitations of time zones, speed or cost, usually associated with many of the other forms of communication. Though it has lot of advantages, however; E-Mails can easily be used for the negative purposes as well, making SPAM and virus E-Mails a problem especially by the hackers.