You must’ve heard about tech giants not taking the protection of their user’s data seriously at all, yet again. And various news articles are already doing the rounds of my news feeds, yet again.
From Quora to Facebook (well no surprises there), and even TRAI’s Chairman R.S. Sharma’s personal details were posted online after he openly challenged the Internet to do so.
On 21 December 2018, The Ministry of Home Affairs issued an order authorizing 10 Central agencies to intercept, monitor, and decrypt “any information generated, transmitted, received or stored in any computer.
[Read More]
The Year 2038 Problem
Is it the Y2K bug all over again?
Not Enough Storage If you know about The Year 2000 problem, also known as the Y2K problem, the Millennium bug, or the Y2K bug, then you know how bad it was.
In short, only the last two digits of a year were used to store the years in computers and most electronic devices in the last century. But, as soon as we hit the year 2000, problems were anticipated, and arose, because many programs represented four-digit years with only the final two digits — making the year 2000 indistinguishable from 1900 or even 3000.
[Read More]
A Brief Guide to Various Techniques in Hacking
Understanding Hacking Techniques and Kali Linux Toolkit Overview
Introduction To be a Hacker, one has to be a master of multiple disciplines ranging from Operating Systems to Networking, and of course programming. They need to know everything about everything, from latest server technologies like Node.js to old programming languages like BASIC and C. They know almost every web framework, operating system, wireless technology, encryption that there is, in and out.
If you are finding weakness and loopholes in a system and gaining access or exploiting it then you are termed as a Hacker.
[Read More]
Introduction to the Dark Web
Understanding the dark web, for beginners
Introduction You hear about data leaks all the time in the media. Have you ever wondered where that data is leaked?
You might’ve heard about the WannaCry ransomware attack last year. It is a program targeting Windows operating system as it installs and hijacks computers and demanding huge ransom, even ATM machines, personal computers as well as servers were not secure. It bought the US Healthcare System and French car maker, Renault to their knees.
[Read More]
Bugs and Vulnerabilities
Are we really secure? (Part-4) - Understanding bugs and vulnerabilities
No matter how much time is devoted to developing an app or a website, or under how many eyes it passes through during its development stages, they still have vulnerabilities. Some have more so than others and some are just unusable. Every vendor on this planet has a security issue with their product. It has now become a fact of modern-day life. Take Microsoft for instance. CVE Details, a site that chronicles publicly disclosed vulnerabilities shows that in the 10 years starting with 2006 the company has disclosed an astonishing 3,157 security flaws.
[Read More]
Apps and Permissions
Are we really secure? (Part-3) - How an app on your mobile phone is a potential threat
Android is an operating system for handheld devices like smartphones. It was announced in 2007 and was the first commercial device was released in 2008. Today, after exactly a decade in the future, it has more than 2 billion monthly active devices. With such level of a userbase, sure comes a lot of prying eyes on your data. Though Google Play Store has restrictions on what you can install and what data your apps see, it is just a matter of a few permissions before these apps can start harvesting your data.
[Read More]
Data Breaches
Are we really secure? (Part-2) - Data breaches and how they work
In the last post, I talked about how people unknowingly give away the data which can be used to draw statistical inferences to a large degree of accuracy for a particular region or a country. There is another bigger threat to our data - ‘Data Breaches’.
You store photos in the cloud and you save storage, you use online platforms that save your details and you are okay with it, you buy something online and all your online transactions are stored in a database.
[Read More]
Data Protection
Are we really secure? (Part-1) - A look at what worries me the most
Modern day technologies for sure provide much more efficient, convenient and sometimes creative solutions to our problems. Want to talk for free with a relative thousand miles away? Open an app and that’s it, talk as much as you want, this was not at all possible before. Solutions like these are all around us and we use them on a daily basis. Stuck in a new city? Open the map app and get going, it will track you in real time too.
[Read More]