twitter

Being impersonated on Twitter, or subject to abusive/violent threats? Take action!

Impersonation on Twitter and most other social networking website is very common. They say “Imitation is the sincerest forms of flattery”. Ok, probably you don’t feel a bit flattered when you’re seriously impersonated on Twitter, spreading incorrect information like wildfire. Take action immediately! Twitter “Impersonation Policy” clearly states that “impersonation is a violation of the […]

ag-office

Attorney General’s Office Website – Do Not Visit / Browse

The Attorney General’s Office website has been listed as a suspicious website, which might infect your computer with malicious software. This malicious software includes 45 scripting exploits and 5 Trojans. When you enter the website, malicious software might be downloaded and installed without your knowledge. I was searching for some information and happened to go […]

A Study – Potential E-crime Threats on e-Government of Maldives

ABSTRACT E-Government initiative of Maldives has undoubtedly invited new forms of crimes against the government agencies. The legal system which does not cover electronic crimes is a major bottleneck in circumventing these crimes. This paper would discuss current and future potential e-crimes on the e-government of Maldives, and highlight on technical and legislative countermeasures. 1- […]

cover-facebook

FACEBOOK – Application Requests – Could it be considered spam?

facebook

Does What Happens in the Facebook Stay in the Facebook?

I came across this interesting presentation about Facebook and it’s connections to the US Government. It highlights that the people who initially funded (and still funds) this website are linked to US Government Agencies; namely Department of Defese (DoD), Central Intelligence Agency (CIA), and Information Awareness Office (IAO). It raises more questions…. ??? The amount […]

gates

Microsoft Wireless Keyboard Hack

Researchers from a Swiss security company, Dreamlab Technologies, have successfully hacked the the protocol used for securing some of Microsoft’s wireless keyboards; Microsoft Wireless Optical 1000 and Microsoft Wireless Optical 2000. They also mentioned that Wireless Optical 3000, Wireless Optical 4000 and other 27Mhz based Wireless Laser Desktop series could be vulnerable to this hack. […]

Steganography – The Art and Science of Writing Hidden Messages

Wikipedia defines Steganography as the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message; this is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscured. The word “Steganography” […]