The Process of Tracing People on the Internet
Introduction Tracing a person on the internet is sometimes not easy, but with structured investigative process we can track anyone on the internet, This same process is being used inRead More →
Cyber Security Researcher. Information security specialist, currently working as risk infrastructure specialist & investigator. He is a cyber-security researcher with over 25 years of experience. He has served with the Intelligence Agency as a Senior Intelligence Officer. He has also worked with Google and Citrix in development of cyber security solutions. He has aided the government and many federal agencies in thwarting many cyber crimes. He has been writing for us in his free time since last 5 years.
Introduction Tracing a person on the internet is sometimes not easy, but with structured investigative process we can track anyone on the internet, This same process is being used inRead More →
A new evasion technique called “TokenBreak” has been discovered that effectively bypasses AI-based content moderation systems—including those used in popular AI models, chatbots, and content filters. This method works byRead More →
In what appears to be a highly sophisticated cyber-physical operation targeting Hezbollah, new revelations have emerged about the potential involvement of Israel’s elite cyber intelligence unit, Unit 8200, in aRead More →
SMS delivery reports not only inform the sender that the message was successfully delivered, but they also have the potential to provide the location of the receiver. This is whatRead More →
Researchers have at last cracked the PlayStation’s security after nearly two years of work. The PS5 has been jailbroken and completely unlocked, making this the device’s first serious hack sinceRead More →
The Dirty Cred Linux kernel attack was unveiled at the Black Hat security conference last week.The CVE-2022-0847 vulnerability was found by PhD student Zhenpeng Lin and his colleagues, who attemptedRead More →
High-tech criminals are increasingly targeting push-start automobiles by hacking into key fobs, leaving many New Orleans car owners stranded according to WSDU news. The thief first waves a relay boxRead More →
Large corporations are always in the crosshairs of hackers, who are constantly looking for new ways to access their systems. This forces the implementation of increasingly strict security measures, althoughRead More →
DigitalOcean has revealed that some of its customers’ emails were exposed to attackers thanks to an attack on the Mailchimp email marketing service. DigitalOcean has reported on its website aRead More →
They have kept us in suspense for a long time, but they finally published it in February of this year. The new version of the ISO 27002 international standard representsRead More →