Monday, July 9, 2012

Sedulity Groups | Bulgarian Hackers Group arrested



Bulgarian authorities say that after months of investigation they have busted the “most powerful hacker group” in the country, the Cyber Warrior Invasion. The operation was conducted by Bulgaria’s Sector for Computer Crimes, Intellectual Property and Gambling and the territorial units of the Chief Directorate for Fight with Organized Crime in the municipalities of Pleven, Shumen, Plovdiv, Burgas, Haskovo, Stara Zagora and Kyustendil.

Saturday, July 7, 2012

Sedulity Groups | Hiring a Hacker in your IT team is really secure or not?


Hackers might have shaded pasts, but if hired can bring a lot of IT security expertise in the system. Should you consider hiring one?
In this Open Source Era where everything is easily available online, Internet has given various pros and cons to the IT world. Still company’s think that Hackers are the curse of the Cyber Security professional's existence when they goes unethical, but the truth is, hackers often understand the distinctions of Cyber Security better than an average CTO. So is it really secure to hire a Hacker in your IT team?


Thursday, July 5, 2012

Sedulity Groups | Beware! Katrina, Deepika can lead you to Malware

Beware. Katrina Kaif is beautiful but she is the most dangerous celebrity in the Indian cyber space, followed by Deepika Padukone. That's according to internet security company McAfee's the 'Most Dangerous Indian Celebrity' study.
Commenting on the findings of the report, Venkatasubrahmanyam Krishnapur, senior director, McAfee India, said, "In a celebrity crazy country such as India, cyber criminals find it very lucrative to use the names of popular figures as keywords to lure people to websites with malicious software." "This year's study found movie stars top the ''most dangerous'' list, while sports stars and politicians are among the safest,'' he said.

Wednesday, July 4, 2012

Sedulity Groups | Cyber Security can help corporates to meet their security goals

Anup Girdhar, CEO of Sedulity Groups, says, "Getting networks, Web applicationsServers etc. tested by Cyber Security Professional is the only best utilitarian way for companies to establish the level of security of their networks & systems. With the ever-increasing risk of external attacks to websites, IT outsourcing and the adoption of new technologies including virtualization and cloud computing, organizations have to firstly, identify Cyber Threats and secondly, put control measures in place to defend themselves from all these Cyber Attacks."

Routine IT Audit, is also known as penetration testing, is an essential component for any Corporate to implement the optimum level of security. As computer technology has advanced, organizations have become increasingly dependent on computerized information systems to carry out their operations and to process, maintain, and report essential information. As a consequence, the reliability of computerized data and of the systems that process, maintain and report these data are a major concern to audit. IT Audit helps to examine the adequacy of controls in information systems and related operations to ensure system effectiveness.

Monday, July 2, 2012

Sedulity Groups | Hacker made calls worth ₨ 6,98,324 [ About 7 Lakh ] from public phone


Computer expert Dariusz Ganski, of Sunny Bank, Kingswood, used a router to tap into BT phone boxes and made hours of calls to expensive numbers.

He make calls worth £10,000 of premium-line bills and he has been jailed for 18 months.

Prosecutor David Maunder commented: "Police located the vehicle and they found Mr Ganski with two laptop computers and numerous mobile telephones."