iHack 4.0, the 24 hours software hackathon organized by the ISACA student group of University of Colombo School of computing happened successfully throughout 6th &7th October continuously at the University Of Colombo School Of Computing Premises. There were 15 enthusiastic teams from both government and private institutes converting their creative ideas into mass software solutions. Participants were registered in the morning of 6th October after handing over the t-shirts and the souvenirs. The event started by lighting traditional oil lamp and then the gathering was addressed by the director of the University Of Colombo School Of Computing Prof. K.P.Hewagamage, a representative from the ISACA Sri Lanka Chapter, representative from our platinum partner ‘ISM APAC’, and a representative from the gold partner ‘DirectFN’. An introduction about iHack 4.0 was given by the President of UCSC ISACA Student Group.     The core of the event was begun after the opening ceremony.…

Read more

“ iFest 2k18 ”, organized by the UCSC ISACA Student Group with close partnership with the ISACA Sri Lanka Chapter was held on the 13th of May 2018. This was the most awaited Cyber Security tech event in the recent past. UPAY was the platinum sponsor of this event and ISM APAC pvt.ltd was the silver sponsor. The event commenced at 9.00 a.m. by giving a short introduction regarding the purpose of the programme. The New Arts Theatre of the University of Colombo, was filled with over 400 students from both private and state higher educational institutes from all over the island.Initially, the gathering was addressed by Dr. Rasika Dayaratne, the lecturer in charge of UCSC ISACA Student Group. Afterwards, Mr. Sithira Wanniarachchi, representative of the Sri Lanka ISACA Chapter gave a small introduction about ISACA. Representing the Platinum sponsor for the event, UPay; Mr.Rasindu Croos & Mr.Asela Wikramasooriya introduced…

Read more

IFest 2k18 – the most awaited tech conference on information security and emerging trends proudly organized by the UCSC – ISACA Student Group will be held on 13th May 2018, from 9.00 am to 2.30 pm at the University of Colombo – New Arts Theater (NAT). IFest 2k18 will be organized in close partnership with the ISACA Sri Lanka Chapter and will be witnessed by over 400 undergraduates from both public and private higher education institutes from all parts of the island with a genuine interest in matters relating to information security, governance, etc.. The conference will be held focused on enhancing awareness in the fields of information security and governance with an emphasis on emerging technologies and trends including several sessions conducted by resource people with expertise in each area as well as interactive sessions with the participants. The event will include quizzes to interact with the participants as…

Read more

iCS meetup organized by the UCSC ISACA Student Group will be held in partnership with ISM APAC at the UCSC premises on 3rd September 2017 from 9 am to 5 pm. UCSC ISACA Student Group is a member of the ISACA Sri Lanka Chapter. iCS meetup will be held with the participation of government and private university students. It is a cyber-security meetup comprising code lab session and tech session series with the intention of enhancing the knowledge on cyber security and enhancing the awareness of emerging technologies and trends.

Read more

Is everything safe? It’s 2017, and the answer is clearly NO.

Making sure that your passwords are secure is one of the first lines of defense for your computer, email, and information against hacking attempts. Password managers are the one recommended by many security experts to keep all your passwords secure in one place. Password managers are the software that creates complex passwords, stores and organizes all your passwords for your computers, websites, applications, and networks, as well as remembers them on your behalf.

Read more

In this article, here I will try to give some basic ideas of threats. In modern telecommunication world, cyber security issues are so much important because of many reasons. But with the development of technology and IT field new types of threats are emerging that can compromise your business. Here are a quick guide and a simple introduction to some trends in IT security and a few ideas to safeguard yourself against them. So as to give the basic introduction, the basic types of attacks can be classified as active and passive. First, an important distinction to make is active attacks vs. passive attacks. These differ both in how they are accomplished and what they do once the unauthorized party gains access. This is a brief introduction about what a passive attack is. Passive attacks happen when a program is constantly searching for vulnerabilities, and when one is found, it gains entry.…

Read more

A botnet is a computer network created and controlled by cyber criminals for malicious purposes. The term “botnet” is formed by combining the words “robot” and “network”. The botnet infected computers are interconnected and can perform multiple actions according to the attacker’s aspiration. Initially, Trojans, worms or some other viruses are sent into the computers in order to create restrained security conditions. Then attackers conquer the computers one by one and create a network of infected machines like a specific infrastructure for cyber crime, that they can subordinately control. The infected computers are called zombies as well. Without the owner’s knowledge, a computer can be enslaved by the cyber criminals in this manner. These types of networks are used consistently by the criminals to send spam/ phishing emails, transfer viruses, attack other computers, steal sensitive data, launch Distributed Denial of Service attacks (DDoS). But if you dig deep and think,…

Read more

Virtual Reality is where one or many users interact with a stimulating environment using computer technology.  It makes users interacting in an artificial or virtual environment think actually that they are in a real environment. The meaning of Virtual Reality is ‘Near Reality’. The main feature of it is the use of three-dimensional effect (3D).

Read more

Phishing has become a common kind of cyber-crime which is generally referred to as an attempt to trick someone into giving private information over the internet or by email that would allow someone else to access them. Sensitive information such as usernames, passwords or credit card numbers is taken possession of, by means of an email, text message, or a message through an online chat where the sender seems to be an administrator from a trusted authority or the owner of the particular website you are visiting. The content displayed on these messages urges the recipient to take immediate action by logging into another website which is more likely to be fake or clicking on a link or replying the message providing personal information.

Read more

GoogleDrive, OneDrive, Dropbox can be hacked without user’s passwords

You may have heard of Man-in-the-Middle attacks, where a malicious actor makes a cyber attack by inserting himself between the sender and receiver, then gain access to their confidential and/or valuable data. Man-in-the-Middle attacks was a nightmare of many large corporations in the past few year. However, they now have something much more serious to worry about.

Read more

10/12