Posts

Showing posts from March, 2019

Mysterious Devil's Sea: Japan's Bermuda Triangle | The Deadlier One

Image
The Devil's Sea, The Pacific's own Bermuda Triangle | If you are seeing the name "The Devil's Sea" for the first time, yes you are seeing it right and it is the Pacific Version of Bermuda Triangle which is even deadlier than our very well known Bermuda Triangle in the Atlantic Ocean.  This part of the Pacific Ocean also known as The Dragon's Triangle as it was widely believed that dragons lurked in the depths of the ocean here. Mysterious disappearance of planes, sinking of many ships, Monsters sightings, sightings of ghost ships and islands these are what make this part of the ocean more mysterious. Bermuda Triangle in the Atlantic Ocean has long been a mystery for the scientists and the subject of debate but Dragon's Triangle of the pacific is even deadlier and more mysterious than the original Bermuda Triangle.  The Devil's Sea is located between the Japanese Coast, about 100 km south of Tokyo. It is known as "ma no umi" in japanese and th

National Security Agency (NSA) has announced to open source a powerful reverse engineering tool Ghidra for the Cyber Security Community

Image
NSA, the national security agency of United States, department of defense has recently announced to open source a powerful reverse engineering tool named Ghidra   which the agency has been using for a long time, for the Cyber Security Community and they have called it a contribution to the nation's cyber security community.   In March 2019 at RSA Conference the NSA (National Security Agency) stated that in near future they are planning to open source this powerful tool. This software is written in Java Programming Language using the Swing Framework for the GUI. This powerful reverse engineering tool was developed by the National Security Agency (NSA) itself.   The actual announcement was made by Rob Joyce who is the cyber security adviser of NSA. He ensured the audience that there are no backdoors in Ghidra . He also added that the tool was developed in such a way to take a deep look into malware and software to spot the weaknesses and to exploit them.   What is a Reverse Engineeri