A series of Cyber attacks had occurred on the 19th of May in Sri Lanka. Among the victimized web sites the official website of the Kuwait Embassy, the Website of the Rajarata University, the  website of the Sri Lanka Tea Research Institute and few other private institution websites were reported to be included. Mainly some .lk & .com domained websites have been targeted. The targeted web pages have been defaced with various content. The SLCERT, TechCERT and the Cyber Operations Center operating under the ministry of Defence are investigating the incident. Furthermore it is reported that these kinds of attacks have been happening from the May of 2014 in an annual basis on the same month. The institutions who owned the web sites which were attacked have been informed and some of the targeted websites are now removed for the time being & some are restored to the previous state.…

Read more

අපේ ජංගම දුරකථනවලට අප ගැන බොහෝ දේ හෙළි කළ හැක. අප ජීවත් වන්නේ කොහෙද , වැඩ කරන්නේ කොහෙද , අපේ පවුල මිතුරන් හා හිතවතුන් ගැන , අපි ඔවුන් සමඟ සන්නිවේදනය කරන්නේ කෙසේ ද, අපේ පෞද්ගලික පුරුදු, යන ආදිය  ජංගම දුරකථනවල ගබඩා කර ඇති මෙම තොරතුරු නිසා, දුරකථන භාවිතා කරන්නන් ඔවුන්ගේ පෞද්ගලිකත්වය සුරැකීමට පියවර ගැනීම පුදුමයට කරුණක් නොවේ. පුද්ගලයින් නව Android හෝ iOS යෙදුම් ස්ථාපනය කරන විට පුද්ගලික තොරතුරු වෙත ප්‍රවේශ වීමට පෙර පරිශීලකගේ අවසරය ඉල්ලා සිටියි. සාමාන්‍යයෙන් මෙය ධනාත්මකය. මෙම යෙදුම් එකතු කරන තොරතුරු සමහරක් ඒවා නිසි ලෙස ක්‍රියා කිරීම සඳහා අවශ්‍ය වේ. නමුත් ස්මාර්ට් දුරකතන යෙදවුම් 70% කට වඩා වැඩි ගණනක් Google Analytics, Facebook Graph API හෝ Crashlytics වැනි තෙවන පාර්ශව නිරීක්ෂණ සමාගම් වෙත පුද්ගලික දත්ත වාර්තා කරයි.ස්ථානයක් ලබාගැනීමට GPS දත්ත භාවිතා කළ නොහැකි නම් Google Maps එතරම් ප්‍රයෝජනවත් නොවේ.නමුත් එම තොරතුරු එකතු කිරීමට අවසර දුන් පසු, ඔවුන්ට ඕනෑම අයෙකු සමඟ ඔබේ දත්ත හුවමාරු කර ගත හැකිය . මෙහිදී…

Read more

ISACA ,the glorious global root of the sub domains ‘ISACA Sri Lankan chapter’ and ‘UCSC ISACA Students’ Group’, is celebrating its 50th anniversary today as an independent, nonprofit, global association which has widely spread all over the world. ISACA stands for the Information Systems Audit and Control Association . It was incorporated in 1969 by a small group of individuals who recognized a need for a centralized source of information and guidance in the growing field of auditing controls for computer systems. Today, ISACA serves 140,000 professionals in 180 countries with the aim of to sponsor local educational seminars and workshops, conduct regular chapter meetings, and to help further promoting and elevating the visibility of the IS audit, control and security profession throughout the area. Figure 1 : ISACA Sri Lankan chapter ISACA plays a major role in the IT world today. It provides practical guidance, benchmarks and other effective…

Read more

In this part we will discuss about a small part about Cyber security. Cyber security basically is the protection of internet-connected systems, including hardware, software and data, from cyber attacks. Elements of cyber security ➢ Application security Application security is the use of software, hardware, and procedural methods to protect applications from external threats. ➢ Information security Information security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non- digital information. ➢ Network security Network security consists of the policies and practices adopted to prevent and Disaster monitor unauthorized access, misuse, modification, or denial of a computer network and network- accessible resources. ➢ Disaster recovery/business continuity planning :  A disaster recovery plan (DRP) is a documented, structured approach with  instructions for responding to unplanned incidents. A business continuity plan (BCP) is a document that consists of…

Read more

iHack 4.0, the ultimate software hackathon organized by the University of Colombo School of Computing ISACA student group is going to happen again on 6th and 7th of  October between 24 hours continuously, at the UCSC premises. It’s a pleasure to mention the parties who are holding their hands with us for the success of the event . Our Platinum partner is ‘ISM APAC’, a major contributor in software and hosting services who is also a part of the world-wide ISM- eGroup . The Gold partner is ‘DirectFN’ who leads emerging and frontier markets in the Financial Services Industry. Our silver partner is ‘Just in time group’ who are currently the best system integrators in Sri Lanka . ‘UPay’ who aspires to disrupt the Fintech industry through cutting-edge technology innovations , is our Technology partner . Also we should be thankful to the  ‘ISACA Sri Lanka Chapter’ as our Co-Sponsor…

Read more

Network of networks, internet comprises of several layers. Surface web is the outermost layer and it is the layer we all are in as normal internet users. As well as it is the most easily accessible web in the internet. Another special layer in the internet of data repository is Deep web.  Deep web is referred as  a World Wide Web which cannot be identified by bots and not indexed by any search engine. But, the most import and the notorious  part of the deep web is the dark web. Through this article lets talk about the dark web. Dark web is also a World Wide Web which contains many sites on seriously heinous and horrible stuffs. Some refers Dark web as the deep web. But dark web  and deep web are totally different from each other . It’s somewhat horrible than deep web. Dark web operates some special kind…

Read more

  What is phishing? Phishing is a kind of a cyber crime. The word “phishing” is pronounced like “fishing”.Phishing can be described as a malicious individual or a group of individuals who tries to scam users.They do this thing by sending emails or creating web pages that looks legitimate and collecting important information of an user via them.It is easier to let someone click a certain link than trying to break through the protection mechanisms of a computer. So what happens here is, a victim will get a message or a thing of like that which appears on his screen,as that thing seems legitimate he will allure to enter his important information like bank,credit card,passwords or other login information.When an user click on these links the phishers will try to steal the information and malwares that get in to computers through this will help them to spy on the user…

Read more

                      In this modern and complicated technical society social media play a big role in every field. Because social media facilitate the creation and sharing of information, ideas, career interests and other forms of expressions. And also for most of brands today, social media are critical for many purposes. So, social media have become a very interesting and popular computer mediated technology that are used via virtual communities and networks. Examples for most popular social media web sites are Facebook, Instagram, Twitter, WhatsApp, LinkedIn, YouTube, Google+, WeChat, Skype…etc. More than millions of people are regularly using these websites mainly through computers, mobile phones and tablets. Recently social media have highly affected in changing the choices, thinking pattern and ways of communication of individuals and large communities. So, there is a range of positive and negative impacts of social media. Social…

Read more

    Hi Guys! Hows are you? OK ….. Do you guys actually know what Internet of things is? Well it’s quite simple you know? It goes like this, IOT examines the interconnection of devices within an existing Internet infrastructure. It is expected to offer clear connectivity of devices, systems, and services that goes beyond normal machine connection and is based upon many protocols, domains, and applications etc. Even as we speak (reads ;)) now billions and billions of physical devices from all around the world is connected to the internet and are exchanging information rapidly. The best thing about IOT is that if you have the correct devices like some cheap processors and a wireless network at home you can easily make anything in your hands reach a part of this IOT! And after that any device previously dumb is now intelligent and are able to even communicate with…

Read more

9/9