Introduction to Log Collector and Event Sources | SIEM
In this article, we will discuss how we use a log collector to collect and analyze logs. While in the previous article we have discussed Logs. We already have...
WikiLeaks to publish the content from CIA’s Director Email
You must have visited the website of WikiLeaks, the non-profit and transparency organisation to read about the leaks and top secrets of this world.
And now Julian Assange, the founder...
How to make sure a file is safe or threat? | How to do...
Today, we will discuss how to find, a file is safe or a threat for your system?
Or we can say, how to do malware and threat analysis?
Watch Video on...
Smartphones with a ‘kill switch’ to prevent from thefts
New software 'kill switch' to thwart thefts:
Microsoft & Google Follows Apple Security Software Which Render handset Unusable after Reported Stolen
Microsoft and google said that phones using their operating systems...
Kali Linux Rolling Edition updated with the latest patches
The most popular Kali Linux was released on 2015 at DefCon 23 in Las Vegas. Kali is successor of Backtrack based on Debian Jessie,distribution, includes many popular penetration...
WordPress XML-RPC: Brute Force Amplification Attack
It is always interesting to hear about the bugs in world’s most famous systems, this time it is WordPress. Yes the world’s most famous content management system is vulnerable...
Yahoo! Launched its own Web Application Security Scanner
Yahoo! Launched its own Web Application Security Scanner
Gryffin, the web application security scanner by Yahoo! is now open source for the purpose to improve the safety on the web...
Basic Linux Exploits:Make your Pc more secure
Basic Linux Exploits:Make your Pc more secure and learn the basics of computer world
Why study Exploits?
Before learning exploits ,one should know about vulnerability.What does it means in the world...
How to surf internet Anonymously
Hello friends this post is about how to hide your machine IP for surfing internet Anonymously. To read this may bore you but keep patience because it is important....
Managing Kali Linux Services
Managing Kali Linux Services
Kali Linux is a specialized Linux distribution aimed to test Network. The default Kali installation comes with several services preinstall like SSH, HTTP, MySQL, etc. These...
StageFright 2.0 Fixed: Google released an OTA for Nexus Devices.
StageFright 2.0 Fixed
Few days back, the researchers warned google of the new Stage Fright Bug. This bug affected more than a billion devices that are running on Android OS.
This...
ISIS Hacker Arrested In Malaysia: US Military Data Hacked By ISIS Hacker
A Kosovo citizen is arrested by Malaysian Authorities in the charges of computer hacking and providing the personal data of U.S. Military members to the Islamic State terrorist group...
An Almost Impossible To Detect Phishing Attack Using Punycode
In our previous article How to secure you account from phishing page, we discussed about how to create and detect whether a page is a phishing page or original...
How to Choose a Router for Your Business
If you think that choosing a router for your business is an easy task, you have no idea how wrong you are. It is not like choosing a standard...
Stone tether smallest tracking device finds your lost items
Stone tether smallest tracking device:
Technology has made life easier if you fail to remember something. A new device is becoming to discover your lost items. Its name is stone...
BBM BlackBerry now features timer just like Snapchat
Here is a good news for all BBM ( BlackBerry Messenger) Lovers, new Privacy features update which is live by BBM BlackBerry Application for all Android, ios or windows device....
End-To-End Encryption is now on WHATSAPP
On Tuesday,Whatsapp's founder Jan Koum disclosed that all the messages and call which are done through Whatsapp are fully encrypted.Whatsapp is now lot more secure.
All user those who want...
Managing the Safety and Security of Sensitive Documents
The digital era has made it effortless and more efficient to conduct business than ever before, be it in a local space or on a largely worldwide scale. In...
Hacking with Android Smartphone using zANTI2
Download zANTI 2.2(Apk)
Hacking with Android Smartphone using zANTI2
zANTI2 is a Network Analysis and penetration suit developed by ZImperium family as a software developer and researcher, the name zANTI2 comes...
18,000 malicious apps are stealing the text messages from your android device
Knowing that there are number of Android apps that are stealing the copies of the text messages received or sent to your device may leave you a bit insecure,...
USB Killer 2.0 : It can destroy your system in just some seconds
Do you remember Killer USB? It is about the new version of Killer USB, this time with tremendous powers.
Let’s talk a bit about the previous version of Killer USB,...
Snapchat’s Security break by Steven Hickson
It's all about little bit of simple programming and computer graphics . Snapchat's Security broke by Steven Hickson a programmer as well as a hacker or you can say that every...
Russia Got Targeted By Rotexy Trojan
Due to the hipe of trojan activity, Kaspersky decided to do a deep analysis of the evolution of popular malware family. And they found one most interesting (Rotexy) trojan...
Dual Boot Kali 2.0 and Microsoft Windows 8, 8.1, 10
Dual Boot Kali 2.0 and Microsoft Windows 8, 8.1, 10
The most popular Kali Linux was released on last week at DefCon 23 in Las Vegas.Kali is successor of Backtrack...
Bitport Review : Download torrents to your cloud and play them online
Bitport.io review :Most of the people here use torrent to download movies, games , series , software and much more. But there is a question is it safe to...
TalkTalk Cyber-attack: Another teenager arrested in London
Another teenager arrested in London.
This time the British police arrested a 16 year old boy from Feltham in West London in case of TalkTalk data breach.
On Monday, Metropolitan Police...