Loading...

Sedulity Groups | Things to know about the real Technical heroes: 'Ethical Hackers'

Now a Days, where Technology is Boosting up; Do you think that “HACKERS” are the people who make illegal activities? It is the perception where, Reality is far away from this statement that Hackers and Crackers are not different from each other in their working strategies. In the real world, Hacker is the one who have great Technical knowledge and expertise. However, the major difference between a “Hacker” or a “Cracker” is 'ETHICS'.

Sedulity Groups | Get yourself protected from the Black Hats

Which of the following is often one of the most overlooked areas of security: operational, technical, Internet, or physical? What is the name for a person who follows an employee through a locked door without own badge or key: tailgater, follower, visitor, or guest? Which application will help identify whether a website is vulnerable to SQL injection attacks: BlackWidow, Metasploit, Scrawlr, or SQL Block? What is the easiest method to get a password: brute-force cracking, guessing, dictionary attack, or hybrid attack?

Sedulity Groups | Hacker wanted by FBI held in India For Carding Crimes

Nikhil Kolbekar, aka HellsAngel, was arrested on July 11 in Mumbai, India. Eric Bogle, known as Swat Runs Train, and Justin Mills, or xTGxKAKAROT, were taken into custody in Canada, respectively Colorado, US. HellsAngel and Bogle is suspected of selling complete credit card details, including names, addresses, social security numbers, birth dates, and bank account information. He also sold remote desktop protocol (RDP) access data that could be utilized to breach computers in countries such as Turkey, India, Czech Republic, Brazil, Germany, France, Italy, Spain, Sweden, and others.

Sedulity Groups | No Booting for you ! Windows 8 will able to kill Live CD?

Lets discuss about live booting/ Live CD, Live cd is a Cd/ Dvd or any other portable media containing bootable Operating system. These media have the unique ability to run operating system without altering the files and operating system installed on the hard disk of the pc.

Sedulity Groups | This quarter may disappoint Top IT Companies

Hopes are evaporating that leading technology companies will offer a safe harbor this year from the economic storms swirling across Europe, Asia and the United States.

Sedulity Groups | Global IT touch to spend trillions in 2012

NEW DELHI: Global IT spending is expected to grow by 3 per cent to $3.6 trillion in 2012 on the back of growth in segments like cloud computing, telecom and consulting services, research firm Gartner said today. 

Sedulity Groups | Yahoo Voice Hacked & 400,000 yahoo passwords leaked

Now a days where Most of the organizations are working a lot to provide utmost security to their clients & customers, Hackers know how to bypass that security and hack the information. Recently over 450,000 email addresses and plain-text passwords are Hacked and circulated on the internet, in a document marked "Owned and Exposed".

Sedulity Groups | Indian Navy Computers hacked by Chinese Hackers

Chinese hackers allegedly plant bug via flash drives onIndia navy's computers, which relayed sensitive data to China IP addresses. The sniffing tool was found in the naval computers exactly as INS Arihant, India’s first nuclear missile submarine, was in trials at the targeted facility in Visakhaptnam.

 

 

Sedulity Groups | Bulgarian Hackers Group arrested

Bulgarian authorities say that after months of investigation they have busted the “most powerful hacker group” in the country, the Cyber Warrior Invasion. The operation was conducted by Bulgaria’s Sector for Computer Crimes, Intellectual Property and Gambling and the territorial units of the Chief Directorate for Fight with Organized Crime in the municipalities of Pleven, Shumen, Plovdiv, Burgas, Haskovo, Stara Zagora and Kyustendil.