Cyber Security - the emerging lifeline

Cyber security is emerging as the life in the digital world.

Management Education

Management education has become critical in this hyper active world filled with dynamics.

Cyber Security training

Cyber security calls for intricate understanding

Police trained in Cyber Security

Cyber Security Calls for a series of awareness programs followed by diploma and degree programs

Cyber World !

Cyber World is composed of various interdependent components.

Thursday, January 3, 2013

PlugX and its implications

A new Remote Administration Tool has been discovered called PlugX which is a Remote Access Tool (RAT). It has also been named as Korplug. PlugX has been detected in targeted attacks not only against military, government or political organizations, but also against more or less ordinary companies. The attack starts with a phishing email containing a malicious attachment, usually an archived, bundled or specially crafted document that exploits either a vulnerability.

Cyber Espionage

"Kaspersky Security Bulletin" talks about Cyber-espionage or "hacktivism" and naton-state cyberattacks, apart from legal surveillance, cloud based network attacks, cyber extortion of individuals and companies. The mobile malware will start shaping the digital security landscape in the forthcoming years painting a different picture. This apart there is a surge in fake security certificates, coupled with skillfully coded malware fostering the nationally authorized cyber attacks leading to a cold cyber war across developed countries. Cyberespionage perpetrators are people with excellent technical skills and psychological understanding of human behavior capable of manipulating their targets within an organization, since the universal statement is people are always the weakest security link.

Wednesday, January 2, 2013

Second International Conference of the South Asian Society of Criminology and Victimology


The South Asian Society of Criminology and Victimology (SASCV) and Department of Criminology and Criminal Justice at Manonmaniam Sundaranar University are organizing their Second International Conference from 11 to 13 January, 2013 at Kanyakumari, Chennai under the theme of  "REVISITING INTERPERSONAL CRIMES AND VICTIMIZATION"


Shamoon attack

Overview. 

A new malware surfaced during August 2012 as reported by the various security agencies.  The malware has been  dubbed by the code name  "Shamoon". The attack is called "Shamoon", due to a filename i.e. string of a folder name within the malware executable called as Shamoon. ("C:\Shamoon\ArabianGulf\wiper\release\wiper.pdb").The spyware infects all the computers in an internal network.

Tuesday, January 1, 2013

Mariposa Botnet


Understanding Bots as a technology has emerged as a critical skill in the information era. This article is focused in understanding Mariposa. Botnet Mariposa was reported by defense intelligence some time during May of 2009. Trend micro says that the worm has been in existence as early as December 2008.