When it comes to exploit development for Microsoft Windows, Mona.py is the go to library for most security researchers. In this post I list six commands that I use often. Watch the video for demonstration. What is Mona.py? A pycommand for Immunity Debugger, designed and developed to aid the exploit development process Automates various tasks […]
Would Trump trump his promise on Cybersecurity?
It’s been almost a week since American citizens elected Donald J. Trump as their 45th president. Ever since, there have been a variety of speculations on what his presidency would mean for the USA and world at large. Many are worried that his victory may have initiated a new trend which could affect the upcoming […]
Effects of Currency Ban on Cyber Security
On 8th November, 2016, our honorable Prime Minister Shri. Narendra Modi, in his speech addressing the nation, announced that the currency notes of denomination 500 and 1000 would cease to be legal tender from the midnight of November 8. Following are key points concerning the currency ban (source: The Hindu): These notes can be deposited […]
What you need to know about XKeyScore: NSA’s Mass Surveillance Tool
In this video, we give you a peek into the world’s supreme intelligence gathering tool, XKeyScore. Developed by the NSA, XKeyScore has been widely criticized ever since it’s existence became known through the documents leaked by Edward Snowden in 2013. Watch the video till the end to know why. Uday MittalUday Mittal is […]
7 Ways to Cover Your Device’s Camera
Have you ever wondered that somebody might be watching you through your laptop’s webcam or smartphone’s camera? Or that while your laptop or smartphone stays on, in your bedroom, somebody might be recording your each and every act? Cracking into device cameras has been around ever since they were commercialized. Most of the devices we […]
Mr. Robot: Fsociety deploys ransomware
If you’ve been following the news, you would have come across a term called Ransomware. It is a type of computer virus which uses encryption as a weapon for destruction rather than protection of data. It encrypts files on an infected system and then demands a ransom, from the user of the infected machine, to decrypt […]
DDoS Attacks: When Servers Won’t Serve
DDoS stands for Distributed Denial of Service. DDoS is a type of attack in which multiple computers (for example a botnet) are used, to flood a single computer or a network with non-legitimate service requests to overload its resources. It is rare that a week goes by without news of some organization being impacted by […]
Safety Tips for Your Mobile Devices
That smartphone in your pocket – or your tablet or laptop – contains significant information about you and your friends and family – contact numbers, photos, location and more. Your mobile devices need to be protected. Take the following security precautions and enjoy the conveniences of technology with peace of mind while you are on […]
Updated: Comments on Draft National Encryption Policy
Imagine, the Government issues a policy which states that you may lock your house but you have to leave the keys outside the house, at all times. The Government appointed officials may then at any time visit your house to see what’s going on inside. You have no choice but to comply. What would your […]
Cyber Security Awareness 2.0
When dealing with Cyber Security, it is often said that people are the weakest links. One vulnerable and gullible employee is all it takes to infiltrate into the company network. However, cyber security managers need to ask themselves this question, are people really the problem here? The challenge for cyber security managers is that they […]