today-is-a-good-day
facebook verification page has bug

Facebook verification page has bug found by team Buffercode

5
Note: I already send report for this bug , I  hope Team Facebook will change their algorithm for this page.  New Bug has found by team Buffercode in Facebook It's always...
WordPress XMLPRC: Brute Force Amplification Attack

WordPress XML-RPC: Brute Force Amplification Attack

0
It is always interesting to hear about the bugs in world’s most famous systems, this time it is WordPress. Yes the world’s most famous content management system is vulnerable...
Top Vpn providers 2016

Top Free Vpn Provides 2016

0
A VPN (Virtual Private Network) extends your private network across a public network, such as a company internal network. There are several numbers of system that enables you to...

End-To-End Encryption is now on WHATSAPP

0
On Tuesday,Whatsapp's founder Jan Koum disclosed that all the messages and call which are done through Whatsapp are fully encrypted.Whatsapp is now lot more secure. All user those who want...
Mac Malware: Time to test Mac security

Mac Malware: Time to test Apple’s Security

0
Last quarter shows an interestingly spike in malware activity that targeted Mac users only. New samples in the 1st 3 months of this year are nearly equal to the...

Google reveals three Apple OS X zero-day flaws

0
Once again Google proved that they have strong security team which can expose not only Microsoft vulnerabilities but Apple OS X can also stand in the same category. Google expose...
ProxyHam : Anonymously Access Wi-Fi from 2.5-Miles Away

ProxyHam : Anonymously Access Wi-Fi from 2.5-Miles Away

0
Here we will discuss How to Anonymously Access Wi-Fi from 2.5 miles away using Dubbed Proxyham. It's always the matter of discuss when anonymity is in the frame. In...
VDI

VDI Deployment Mistakes

0
Firstly, we should know about VDI. It stands for Virtual Desktop Infrastructure. It is a practice which hosts desktop operating system within a Virtual Machine (VM) running on a...
log management

EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK

0
EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK What’s in the LOG? The information you need to answer Who’s attacking us today? and How did...

CIA Director’s hacked email: Pak uses militants to counter India’s Influence in Afghanistan

0
Last week WikiLeaks started publishing the documents from the CIA Director’s hacked email revealing some top secrets. A set of document of released by WikiLeaks says that Pakistan uses...
Instagram Hacked

Instagram Hacked: A security researcher hacked into the servers of Instagram

0
Instagram Hacked! Someone just hacked into the servers of Instagram, showing the most secure mechanisms also have bugs. But you don’t try to do anything like this because even reporting the...
Tor

How to surf web anonymously ??

1
Continue with our previous post How to surf web anonymously ...... Today i am going to tell you one of the best solution to surf web anonymously... In my personal point...

How to secure your account from phishing attacks on Internet

11
Note: Instead of using backtrack use Kali Linux | Rebirth of BackTrack, the Penetration Testing Creating Phishing page to know the safety cautions on Internet To know the cautions we must know...
exploit search in metasploit

Explore and Search Exploit in Metasploit

0
Metasploit having a big name, when we talking about security. Metasploit was written in Perl as a portable network tool, In 2007 the Metasploit  Freamwork has completely rewritten in...