Melissa Virus- A wake up call for public
How does it started A programmer by the name of David Lee Smith took over an America Online (AOL) account in late March 1999 and used it to upload a file with an adult domain to Internet newsgroup. Dozens of free passwords to adult-content websites that charge fees were promised in the post. A virus…
Read morePOSTED BY
shripali
The termination of botnet operation via discontinuation of Core-flood virus
Role of botnet:- Botnets are basically networks of virus-infected computers that an attacker can manage remotely. They can be used to steal money, take over identities, and perform other crimes. In this case, botnets are potent core-flood virus that allows cyber criminals to filch the valuable personal and financial information of users by recording the user’s unsuspecting every keystroke. When it came into limelight:- In an unprecedented action in the fight against cybercrime, the FBI halted an international cyberfraud…
Read morePOSTED BY
shripali
$10 Million Hack:- First robbery in the history of cyber crime
Introduction This case is the giant wheel in the history of cyber crime and a start of the bank robbery without involvement of internet. How does it started? A young computer programmer in St. Petersburg, Russia, headed a group of ambitious crooks from several continents who broke into the electronic systems of a large U.S.…
Read morePOSTED BY
shripali
Everything you should know about Cyber Forensics.
Cyber forensics, also known as digital or computer forensics, is the process of collecting, preserving, analysing, and presenting digital evidence for legal or investigative purposes, encompassing various devices and data sources. Critical evidence for cybercrimes is frequently found in electronic devices such as computers and mobile phones. It is critical to collect digital evidence to combat…
Read morePOSTED BY
shripali
Best Linux based OS to look for Hacking purpose
Linux is an open-source operating system (OS).1 That is, anyone can inspect, edit, and redistribute the source code. This feature has enabled developers to customise many Linux distributions (distros) for hacking and penetration testing. Today’s top Linux operating systems for hacking have built-in hacking tools and are more secure than other operating systems such as…
Read morePOSTED BY