I have been following up the topic from quite some time now. The whole issue of National Security in danger is very much right from the context of being able to intercept the secure messaging that Blackberry Services Provide. But, there is a Pandora’s Box that would open up if the stuff is done unplanned …
Okay just finished testing Jail Break on iOS 4.0.1 and yeah it works pretty fine with following steps – ensure you have iOS 4.0 also available with you, upgrade your phone to iOS 4.0.1 use redsn0w to jailbreak, but do not point to 4.0.1, rather point to iOS 4.0 and let redsn0w do the needful …
Many out there have been thinking on how to go about the upgrading jailbroken iPhone 3G with iOS 4.0. Its quite simple and well ensure you make following preparations before going with the upgrade – Back-up your iPhone using iTunes Make sure you have the latest version of iTunes installed, if not please update iTunes …
Organizations have done a lot to secure their infrastructure, get compliance efforts in place and get going with the emerging requirements that are hard pressing them to move to excellence on the Security Front. But how much to secure is secure? It should not be the case where Security that is supposed to be the …
A new botnet infestation has been reported to have been identified and named Kneber Botnet. Computer Systems from nearly 2,500 organizations across the world have been compromised (including commercial and government entities worldwide). Hackers have been able to steal large amount of confidential data including approximately 68,000 corporate login credentials and online banking sites. The …
Another Article and another set of mixed responses on Banning or Blocking Pornography –“Urgent need to ban porn websites: Chief Justice of India”. I sort of Agree with what CJI has opined for. If people say that there are ways to circumvent the ban, they are forgetting that there are ways to plug the loops …
Just happened to read the Article “ – Govt can’t ban porn websites for obscenity I was more shocked than surprised. Though this sort of inaction can very much be expected from the Govt, we certainly could not accept it. When the Indian IT Act amendments were being discussed and the amendment to the act …
Strange but true, Yesterday I happen to identify a new virus / spyware / grayware that is interestingly a mysterious stuff. I suddenly suspected something fishy on my machine and the initial diagonosis using Trend Micro revealed Nothing. I restarted my machine and there while the processes were being started saw a new process – …
Information Security Breach can be referred to as the compromise with Confidentiality of Data / Information with an Unauthorized and Unwarranted access. However a breach might not always result in Data Theft, but as the Information Guardian, the Information Security Team of an organization must vigilantly secure access to the Information Assets hosting/processing critical information including …
We often get to hear that Email accounts are hacked and someone else has logged in email addresses and sent out mails to the address list. No this certainly is a case where one gets worried about the misuse of email account. But then who is responsible? Certainly we ourselves as we either do not …