NSA (USA) is doing Data collection across the world and there is nothing wrong in that according to USA. In the process of spying non-USA citizens they also spy USA citizens. It is really difficult to differentiate between citizens and non-citizens when …
Not a day passes without one hearing about email scams, stolen passwords, cyberwar and terrorism; cyber threats and crimes have been skyrocketing. An effective strategy to combat these threats would be to provide an awareness on vulnerability detection-exploitation-patching mechanisms and secure programming …
ClubHack Magazine is seeking submissions for next issue, Issue 33 – Oct 2012. Topics and interest areas include, but not limited to the following:- # Hardware, Embedded Systems and other Electronic Devices Hacking# Physical Security / Locks / Safes# Telecom Security (3G/4G, …
image027.jpg IT security is more important for businesses than ever. A study that was carried out by the Ponemon Institute has revealed that businesses lacking in IT security could be losing over £200,000. The study, entitled “Impact of Cybercrime on Businesses”, surveyed …
It is a matter of rejoice for us to see CHMag entering in to its second year of publication. Considering the overwhelming response of the people, we feel that we are on the right track towards our objective. When we look in …
specialfeature.gif IntroductionDuring my presentation at Club Hack Conference on day 2, the one named “Cybercrime, CyberWar, Information Warfare: what’s this all about, from a Hacker’s perspective? New rules for a new world”, I’ve noticed a deep interest by the audience. All of …
special.png On May 14th & 15th, CDAC Mumbai, IIT Gandhinagar & City University London organized a workshop on information security perspective of Critical National Infrastructure Protection. This workshop was intended to brainstorm and learn more on the information security risk of SCADA …
pwn.png For all those of you who have been living under a rock or busy with the evils of the real world, it is time to wake up and see the perils of the Cyber-World. It is time to stop ignoring the …
hpp.jpg How many times did we listen to stereotypes on hackers? How many times did we hear sentences such as “he’s a teenager, myope, fat and dirty”: probably, he’s hacker” ?And, how long did we hear that hackers are criminals, stealing credit …