Posts

#Competitive Intelligence report on Cyberwarfare with respect to Pakistan

Cyberwarfare which is known-ed to be the actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption. Cyber  warfare  is a  relatively  new  concept  whereby  politically  motivated  hackers  and Computer  scientists  develop  means  of  causing  disruption  or  damage  to  a  government’s  IT  system  and  network  infrastructure. There  are  various  techniques  that  fall  under cyber-warfare  such  as a  virus  or  malicious  software  (most  recent  examples  would  be  stuxnet  and  Duqu)  or  web  vandalism.    The  constant  developments  in  the  IT  world  inevitably  lead to  an  increasing  occurrence  of  cyber  warfare.    This raises  the  question  as  to  whether  it  is  more  dangerous  as  opposed  to  traditional  warfare. Cyber  warfare  also  puts a  large  amount  of  focus  on  espionage. Spy  weapons  and technologies  are  advancing  at  a  rapid  pace,  allowing  individuals  to  gain 

IPv6

Image
IPv6, which is supported in some of the latest OSes and network devices, is all about end-to-end, or peer-to-peer communications. Aside from offering more address space than its IPv4 predecessor -- which has made it immediately popular in some parts of the world -- it offers a redesigned IP packet format that simplifies route processing, making it ideal for applications such as voice over IP or instant messaging. But IPv6 presents a whole range of new security problems, experts say. French researchers recently found problems in the IPv6 protocol specification itself, namely in the routing header. Bottom line: The specification lets the sender add an arbitrary number of extra headers on IPv6 packets, and the IPv6-based routers or hosts must process these headers. It's a denial-of-service attacker's dream come true. Speaking at last month's CanSecWest conference, researchers Philippe Biondi and Arnaud Ebalard disclosed details of problems they found in IPv6

End-to-end security & Virtualization

End-to-end security & Virtualization The following list describes new and enhanced security features in Windows 8: Trusted boot: Some malware programs target the boot process and insert themselves into the system before Windows or antimalware software is able to start. Because of this, the ability of Windows or the antimalware software to protect the system might be compromised. With UEFI 2.3.1 equipped devices, the UEFI Secure Boot feature helps to ensure that malware is not able to start before Windows 8. The Windows 8 Trusted boot feature protects the integrity of the remainder of the boot process, including the kernel, system files, boot critical drivers, and even the antimalware software itself. The system’s antimalware software is the first third party application or driver to start. Moving antimalware into the Trusted boot process prevents it from being tampered with. In the event that malware is able to successfully tamper with the boot process, Windows ca

Tous Protocols for Telco Industries

Image
Mr. James who was just graduated from an reputed engineering institute in telecommunication sector. He was celebrating his graduation with his family, Friends and other relatives with great gathering at near by Hotel sponsored by his father. James was excited & starting thinking to work for an IT company soon. After few days, he visited a number of companies, organization and institutions to drop his CVs or walk in interviews. He almost attended more than six walk in interviews and three by call. But he was not successful because of some certifications they demanded. He was shocked to hear about market demand for professional certifications like CCNA, CCNP and CCIE. Yea! you have to have experience in networking to handle switches, routers and other devices endorsed by CISCO. Okie he decided to take at least one certification CCNA, he browsed for CCNA tuition center near by and he called the for information about course. It is like short

Rising Star in Pakistan for Cyber Security & Research

Image
  Before I start questioning I would like to write something about Rafay. Rafay Baloch is the founder/CEO of RHAinfosec, He runs one of the top security blogs in Pakistan with more than 25k+ subscribers and 100k+ Facebook fan. Rafay has helped major industrial giants such as Google, Facebook, twitter, paypal, adobe, apple etc to improve and secure their online presense. Rafay managed to find a Remote Code execution vulnerability inside paypal for which he was awarded 10,000$ and also was offered a job inside of Paypal as a security ninja. Currently, the major area of Rafay's research are bypassing modern security defenses, HTML 5 and other client side javascript. Rafay holds CPTE, OSCP, CCNP Route, WAPT certifications and ECCS Certification by Voice of Green Hats. Rafay's work has been featured in enormous amounts of articles, newspaper, magazines and local TV channels. Lets Start questionings Q: What was your first finding? How did you felt at that momen

Top 10 Big Data Stories Of 2013

Image
  Big data ruled as one of the most popular tech topics of 2013, drawing reader interest along many different angles of coverage. Whether focused on careers and education, emerging platforms and technologies, or real-world use cases from healthcare to celebrity social networking, our big data coverage during the last year drew millions of page views. For a look back at what you may have missed, here's our list of the top-ten big data headlines of 2013. 1. Big Data Analytics Master's Degrees: 20 Top Programs. Our detailed guide to well-known and emerging masters programs specifically targeting the big data analytics talent gap. 2. 7 Big Data Solutions Try To Reshape Healthcare. From Beth Israel Deaconess Medical Center to the University of Pittsburgh Medical Center, leading institutions and technology providers are applying big data to healthcare challenges in innovative ways. 3. 5 Big Wishes For Big Data Deployments. The industry made progress on a couple of t

Ziaullah Mirza

Image
  Ziaullah Mirza is a mature and an enthusiastic individual who believes in snaking up my ladder with honesty and hard work. He possess a strong personality, excellent communication and interpersonal skills. His current experience and training have equipped him with the ability to respond to queries, manipulating problems analytically, to assess situation and then resolve the problem quickly and professionally. He is highly motivated, eager to learn and able to work under busy/stressful conditions to be one of the leading roles within the organization. He has been working for International trade and development under the umbrella of Malaysian Dutch Business Gateway, Malaysia Dutch Business Council and European Malaysian Chamber of Commerce & Industries as well as a number of highly professional International community in Kuala Lumpur, Malaysia, Singapore, Vietnam and EU. In the view of new technology and competitiveness in educational market and sustainabilit