Nowadays, many people are talking about the Anonymous group because of their newly released video, which is about Easter Sunday Attack in Sri Lanka. Let us see who are they and what are they doing. Anonymous is a group of people who are active on the internet and they want justice for citizens of the world. The word Anonymous means not revealing identity to others. This group started in 2002 and they used a special ‘Guy Fawkes’ mask when they appeared on the internet. The anonymous group is different from other hacker groups on the internet. They do not have a physical space as their headquarters. This group does not have a leader and the number of members of this group is a secret. The main motive of the Anonymous group is freedom on the internet and they want every citizen of the world to have equal rights. They use…

Read more

Spectre and Meltdown are two vulnerabilities that affect nearly every computer chip which manufactured in the last 20 years of time. On 1st  of June 2017 researchers working on Google Project Zero discover these 2 major security flaws in modern processors. This has come to topic early this year at the Consumer Electronics Show 2018. A technique called Speculative Execution which is widely used to boost the performance of modern processors has caused these bugs. What Is Speculative Execution? This is a technique which is widely used in modern processors to enhance their performance on a massive level. What this does is, it predicts what will user do next in the future and processes these data. And these processed data will be kept in the CPU is cached for quick access. If a user executes the predicted instruction, then the CPU can respond faster because the data is already processed. Due to…

Read more

“Forensic science is the application of science to criminal and civil laws, mainly on the criminal side during criminal investigation, as governed by the legal standards of admissible evidence and criminal procedure.” Digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information. Experts use a systematic approach to examine evidence that could be presented in court during proceedings. Digital forensics is commonly used in both criminal law and private investigation. There are some software and tools that helps us to read through different types of evidence. It is glad to say some of these are simple and common software that use in day-to-day life. Image analyze –exif meta data/lightroom Recovering and file carving –Recuwa / Autopcy Live Memory acquisition – 504ensicsLabs-Lime/Volatility Windows…

Read more

Blockchain, a technology which most tech experts believe that would revolutionize computing in a similar way the internet did in the 90s and early 2000s. Satoshi Nakamoto released a whitepaper in 2008 which is called as Bitcoin: A Peer to peer electronic cash system, this popular crypto currency bitcoin uses blockchain as its underlying technology. Blockchain is a difficult technology to explain. We could say that blockchain is a decentralized public ledger of crypto transactions. Blockchain is like a distributed and decentralized network/database which can have users all over the world. Any user can add information to the blockchain, every other user is responsible for verifying the accuracy of the information added. It stores information across a network of computers .It uses cryptography to make user records can’t be altered. Although data is public the data is verified and secured by cryptography, it creates a record of which the authenticity…

Read more

At the current world almost all the things have become digitized and as a result all the human operated advanced systems are now on the hands of unintelligent machines. As these machines are unintelligent it has only limited capabilities of following the instructions of intelligent living being. And also due to digitalization nowadays the information has become the most valuable thing in almost every single personal and in organizations. So in these days protecting this information has become a severe problem in tech world. When considering about information security, protecting information from unauthorized personals or things is the one of most outstanding issue. So controlling the access to information in mean of password authentication, smart card authentication, biometric authentication are some of major authentication methods using widely. From this article it is expected to expand on biometrics and how it is used to information security. What is biometrics and how…

Read more

  When we talk about information security, cryptography acts main role. There won’t be any information security without cryptography. They both bond to each other unbreakably. Let’s get in to the topic lets discuss how cryptography works. What is cryptography? Sometimes you may never heard of cryptography. But sure, you may have heard about encrypting and decrypting. Well these are the key features of cryptography. Cryptography is a mechanism which converting ordinary plain text into an unreadable form of text and vice-versa. Basic task in cryptography is to enable users to communicate securely over an insecure channel in a way that guarantees their transmission’s privacy. How cryptography works? To get cryptography into work we need a cryptographic algorithm. Cryptographic algorithm is simply a mathematical function (but it is not a simple function) that converts a plaintext into a ciphertext and vice versa. This conversion from plain text to cipher text…

Read more

iHack 4.0, the 24 hours software hackathon organized by the ISACA student group of University of Colombo School of computing happened successfully throughout 6th &7th October continuously at the University Of Colombo School Of Computing Premises. There were 15 enthusiastic teams from both government and private institutes converting their creative ideas into mass software solutions. Participants were registered in the morning of 6th October after handing over the t-shirts and the souvenirs. The event started by lighting traditional oil lamp and then the gathering was addressed by the director of the University Of Colombo School Of Computing Prof. K.P.Hewagamage, a representative from the ISACA Sri Lanka Chapter, representative from our platinum partner ‘ISM APAC’, and a representative from the gold partner ‘DirectFN’. An introduction about iHack 4.0 was given by the President of UCSC ISACA Student Group.     The core of the event was begun after the opening ceremony.…

Read more

7/7