Cyber Attacks

Hackers access personal data of 79,400 customers of local mobile operator and internet service provider in Singapore

Date: 10th September 2021 Severity: High A local mobile operator & internet service provider confirmed on Friday that it was hit by series of Cyber Attacks in recent month which resulted in unuthorised access to personal data of 79,400 customers. The personal details accessed by hackers included identity verification documents …

Read More »

DuPage Medical group was victim of Cyber-attack in mid-July, potentially compromised patients’ information

Date: 30th August 2021 Severity: High The DuPage Medical group have started notifying patients about recent Cyber-attack which might have compromised their personal information like date of birth, diagnosis code & social security numbers. According to recent post by Chicago Tribune, almost 6,00,000 patients shall be notified about the data …

Read More »

Thwarting XSS!

Data containing HTML or Java Script can really be one of the BIGgest problem, specially when its is being specified by a ‘user’. For example simple application like Blog, where user can submit the comments after reading the post, which’s being displayed. If the user is ‘not-that-bad’ and enters only plain …

Read More »

Understanding IP datagram – the easy way

It is important to understand the information which is presented in an IP Packets as it helps you understand how the integrity of the information you send across a local network or the internet can be compromised. Mainly IP datagram has two components: the header and the payload. The Header …

Read More »

Learn to Love your Log files

Yes! Learn to Love your Log file, it tells everything you want to hear. Even a Clever thief always leave his fingerprints anywhere at the crime scene, in the same way most of the malicious exploit and intruders leave their fingerprints or say footprint all over the Log file. If …

Read More »

Cracking wireless Network WEP protection

Stuffs required: A compatible wireless Adapter: There are lots of compatible wireless adapter available, but what you need to care about is the size of your Pocket or say your budget. One can easily go for a good Alfa adapter that is easily available in Amazon but I’ll recommend going for …

Read More »

Protecting Removable drive against malware

Today one of the fastest medium used by malware for infection is removable drives. Worms used it to replicate faster, once your removal drive come in contact with infected system it gets infected automatically by the malicious services running in system, one of the first task done by malicious services …

Read More »