Saturday, February 25, 2017
exploit search in metasploit

Explore and Search Exploit in Metasploit

Metasploit having a big name, when we talking about security. Metasploit was written in Perl as a portable network tool, In 2007 the Metasploit  Freamwork has completely rewritten in Ruby. In...
Bitport Review : Download torrents to your cloud and play them online

Bitport Review : Download torrents to your cloud and play them online

Bitport.io review :Most of the people here use torrent to download movies, games , series , software and much more. But there is a question is it safe to download these...
crack password using hydra and burpsuit

How To Crack Web Form Passwords Using Hydra With Burpsuite In Kali Linux

In our previous article How To Crack Password Using Hydra In Kali Linux , we have discussed about THC Hydra- A tool for Online Password attacks. In this tutorial we will discuss about How To...
crack web form

How To Crack Password Using Hydra In Kali Linux

Weak password is still a big problem in the world of security. User need to set a strong password to restrict the access of data from anonymous user. Even a 6 digit...
Guccifer hacker extradited to the US

Guccifer hacker extradited to the US

Guccifer is a egregious Romanian hacker,whose real name is Marcel Lazar Lehel has been permitted to abandon to the United States to face Computer Intrusion and Identity theft charges for 18...
Let’s Encrypt released a Beta version

Let’s Encrypt: Free SSL Certificate Install by 1 Million websites

Let’s Encrypt published 1 million free Transport Layer Security SSL Certificates to webmasters who want to secure their connection between their users and domains and has achieved a vast milestone. It is a...
Developer of most secure messaging app hired by Apple

Developer of most secure messaging app hired by Apple

This time Apple is very sincere about upgrading the security of its iPhone so that no can hack it.Apple also hired one of the key builders of signal to accomplish this...
Phishing malware crashes ICICI bank

Phishing malware crashes ICICI bank

#Phshing Malware crashes ICICI bank .... https://t.co/a8vTOVvuob — Buffercode (@buffercoding) February 25, 2016 //platform.twitter.com/widgets.js   Official @ICICIBank_Care reply to tweet : @buffercoding Hi, ICICI Bank has a robust & multi-level security system for all its banking channels including...

Kali Linux Rolling Edition updated with the latest patches

The most popular Kali Linux was released on 2015 at DefCon 23 in Las Vegas. Kali is successor of Backtrack based on Debian Jessie,distribution, includes many popular penetration testing applications....
VDI

VDI Deployment Mistakes

Firstly, we should know about VDI. It stands for Virtual Desktop Infrastructure. It is a practice which hosts desktop operating system within a Virtual Machine (VM) running on a centralized server....
US Intelligence Chief Hacked

US Intelligence Chief Hacked by a teen

The email of US Intelligence Chief Hacked! The same teenager who hacked the AOL email of CIA Director John Brennan back in October last year has now hacked into personal email and...
PlayStation Hacked

PlayStation Hacked! Hackers managed to run Linux on PS4 gaming Console

PlayStation Hacked! This might be the craziest thing done in the world of gaming, when some hackers hacked Sony’s PlayStation gaming console to run Linux. This console hacking goes by the name FailOverflow,...
Instagram Hacked

Instagram Hacked: A security researcher hacked into the servers of Instagram

Instagram Hacked! Someone just hacked into the servers of Instagram, showing the most secure mechanisms also have bugs. But you don’t try to do anything like this because even reporting the security vulnerability...
log management

EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK

EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK What’s in the LOG? The information you need to answer Who’s attacking us today? and How did they get access to all...
Trojanized Adware

The Trojanized Adware: It can automatically install apps to your Android Device

What sort of apps do you install on your Android Smartphone? I hope the trusted ones. Now, what if someone installs a malicious app on your smartphone without your permission? It can leave...
ISIS hackers hacked 54,000 twitter accounts

ISIS hackers hacked 54,000 twitter accounts: Publishing the secret information of CIA Head

The year has been bad so far for CIA and other US agencies, now this time ISIS hackers hacked 54,000 twitter accounts which also include the accounts of FBI and CIA...
Baidu SDK Bug

Baidu SDK Bug: Puts over 100 Million devices at risk

Researchers recently found that Baidu’s software development kit (SDK) is vulnerable to a bug that can allow the hacker to gain the backdoor like access to a user’s device. Baidu SDK...

TalkTalk Cyber-attack: Another teenager arrested in London

Another teenager arrested in London. This time the British police arrested a 16 year old boy from Feltham in West London in case of TalkTalk data breach. On Monday, Metropolitan Police Cyber Crime...

18,000 malicious apps are stealing the text messages from your android device

Knowing that there are number of Android apps that are stealing the copies of the text messages received or sent to your device may leave you a bit insecure, but it...

15 Year old Boy Arrested as the suspect of TalkTalk cyber Attack

After the data breach of largest phone and broadband provider in UK, police for the first time has taken some action. Last week TalkTalk the biggest Phone and Broadband provider in UK...

CIA Director’s hacked email: Pak uses militants to counter India’s Influence in Afghanistan

Last week WikiLeaks started publishing the documents from the CIA Director’s hacked email revealing some top secrets. A set of document of released by WikiLeaks says that Pakistan uses militants as...

WikiLeaks to publish the content from CIA’s Director Email

You must have visited the website of WikiLeaks, the non-profit and transparency organisation to read about the leaks and top secrets of this world. And now Julian Assange, the founder of WikiLeaks...

Apple refused to unlock the iPhone on the enforcement of U.S Federal Judge

Once again the tech giant Apple has proved that how much they are concerned about the privacy of its users, and they will never break the users’ security for government officials. Yes,...

Google is going to mandate the Full Disk Encryption by default for devices with...

Last year when Google launched Android Lollipop 5.0, Google wanted to make the full disk encryption mandatory, but due to some reasons the idea didn’t work. But this time with the launch...

Facebook’s New Notification Feature: Facebook will now Notify you if Government is Spying on...

Yet another feature by Facebook to make the world’s largest social network more secure. Facebook has just launched a new Notification feature that will alert you if it believes that someone...

ISIS Hacker Arrested In Malaysia: US Military Data Hacked By ISIS Hacker

A Kosovo citizen is arrested by Malaysian Authorities in the charges of computer hacking and providing the personal data of U.S. Military members to the Islamic State terrorist group (ISIS). Name of...