Tampering with Source Code : Cyber Offence

“Tampering is Great Art of Creativity, but on the Cost of Others” Introduction I was to purchase an I Phone I was  discussing this with my friend at the bus stop suddenly a boy approached me and said that he knows a dealer who could give me an I Phone with android applications working in

CONTINUE READING …

Starting a Network Architecture Review

Network Architecture, I am sure every one of us have heard it and often copied them from Internet for our assignments for network classes. But when it comes to reviewing them, it often becomes a confusing task for the new-comers in auditing. So here I will share some of the basic tips on how to

CONTINUE READING …

Email Phishing and Attacks

Phishing was a word in the beginning used to portray email attacks that were used to rob your online banking username and security password. On the other hand, the term has evolved and now refers to almost any email-based attack. Phishing uses social engineering, a method where cyber attackers try to fool you into performing

CONTINUE READING …