21 Oct

“We took a hacker to a café and, in 20 minutes, he knew where everyone else was born, what schools they attended, and the last five things they googled.”  Hackinsight

Makaseh Identity is for your Cyber Protection

Millions vulnerable UPnP devices vulnerable to attack

19 Oct

Researchers at Akamai firm have observed an increase of new reflection and amplification DDoS attacks exploiting Internet of Things devices (e.g. SOHO devices, routers, media servers, web cams, smart TVs and printers), which that misuses communications protocols.     Security Affairs

Makaseh Identity will prevent unidentified requests for software and hardware applications.

How To Talk To Spooked Customers About Cyber Security

15 Oct

The high-profile security-breaches of the last two years have made consumers much more aware of the risk to their financial and personal safety when a company they do business with is hacked.  –  Forbes

Encryption or Recognition?

13 Oct


Systems are always good tools designed and developed with good intentions.  They are designed for a purpose and as long as the conditions for which they are designed exists, it would generate a proper result.  The weakness in  systems are the conditions that is supposed to activate it; if one could override the conditions by concealing, imitating or falsifying it, the system could be made to work the way it should not.  Hackers and code breakers employ tactics that would make a system accept a condition that does or does not exist, at their will.  Recognition works differently.  When a house is burgled, the burglar has complete unmitigated access to the assets within the premises.  Access is only limited till the time the owners or neighbors recognize them as intruders, having no legitimate access. On the other hand, if the owners were in and the intruders had gained access by passing all the systems in place, the intruders would have been limited severely.

Recognition is not just saying ‘true or false’.  It is a process that concludes after ascertaining several facts.  It determines, the person, relationship, trust level, and many more factors before allowing access.  The access level of a maid differs with the access level of a child; and the access level of a plumber is far different from that of a relative or friend.  Employing the recognition method is surely far more reliable.  It is not limited by a couple or more sets of parameters.  It fulfills a range of analogous process before determining the output.  The scope and boundary are limitless, and can be easily updated and analyzed on a process to process basis.

Encryption is good in a one to one, well defined  environment.  It has paradigm limitations and the only security will be the difference between one encryption and the other.  With many products and many approaches, it will be tough to find a unified single platform that will be safe and secure.  Time and again encryption algorithms have been broken and decrypted because they have been forced to follow a standard.  Non standard products float in the sea of encryption tools, tossed and turned only to vanish, lost in their proprietary algorithms.

Makaseh Identity is a tool that would address the benefits of recognition and a single viable and secure encryption protocol for all.  makaseh.in

I am looking for Ethical Hackers to hack into our Cyber security tool “Makaseh Identity”

12 Oct

I am looking for Ethical Hackers to hack into our Cyber security tool “Makaseh Identity” A prize of USD1000 is available to the first successful hacker. We are also willing to provide a minimal compensation for the time and effort, Please send me a note to themakaseh@gmail.com To know more about the tool please visit makaseh.in

Hackers Exploit U.S. Army, Microsoft

3 Oct

“The members of this international hacking ring stole trade secret data used in high-tech American products, ranging from software that trains U.S. soldiers to fly Apache helicopters to Xbox games,”   GovInfoSecurity

Major Android Browser Flaw Allowing Hackers to Bypass SOP Mechanism

2 Oct

A major security flaw has been exposed in the Android Open Source Platform (AOSP) browser, which is used by more than a fifth of the world’s smartphone users. This issue, exposed by security expert Rafay Baloch, can lead to the dreaded cookie theft.

Sharon Solomon CHECKMARX

Makaseh Identity is portable 

FBI warns cyber sabotage, extortion by disgruntled employees rising

29 Sep

Disgruntled workers are increasingly exacting their revenge on their employers by using their access to company computers to engage in cyber-sabotage, the FBI is warning. Others are using their access to extort money from their employers by threatening sabotage.   Washington Examiner

Home Depot data breach comes as no surprise to ex-employees

26 Sep

The biggest data breach in retail history didn’t come as a surprise to ex-employees of Home Depot  –  IT Governance

Fighting cyber crime in the US – Infographic

26 Sep

With 1.5 million monitored cyber attacks and a 700% increase in distributed denial-of-service (DDoS) attacks last year, US businesses are under significant pressure to protect their data.  –  IT Governance


Get every new post delivered to your Inbox.

%d bloggers like this: