How Facebook Cyber Crime are Happening In India
Using Social Media platforms in Cyber Criminal activity is very common from last decade. Creating fake profiles with same name, details and it looks same replica of the original. FacebookRead More →
Cyber Security Researcher. Information security specialist, currently working as risk infrastructure specialist & investigator. He is a cyber-security researcher with over 25 years of experience. He has served with the Intelligence Agency as a Senior Intelligence Officer. He has also worked with Google and Citrix in development of cyber security solutions. He has aided the government and many federal agencies in thwarting many cyber crimes. He has been writing for us in his free time since last 5 years.
Using Social Media platforms in Cyber Criminal activity is very common from last decade. Creating fake profiles with same name, details and it looks same replica of the original. FacebookRead More →
Web browser extensions gives additional features to any normal web browser. Extensions are capable of giving functionality from capturing web pages to downloading videos from restricted websites. Most web browserRead More →
Traditionally, UI/UX and security were two aspects that were taught separately when it came to application design. Thinking about it now, it wouldn’t make much sense, really. A concrete securityRead More →
Whether you’re in charge of a large corporation, or you’re just getting your feet wet with a brand new start-up, data theft and threats to your company’s productivity are anRead More →
Metasploit can used in various ways for exploiting Windows vulnerabilities. Metasploit, most popular framework for pentester/ security researcher, is capable for attacking any Windows operating system platform. Metasploit gives multipleRead More →
Shutterstock The more sensitive data you have online, the higher the risk of losing not only them but also your digital identity. You may ask, does someone collect data aboutRead More →
There are numerous way in which web applications can be infected and everyday backdoor news can be seen in headlines. Shell backdoor is another form malware script which are usedRead More →
This vulnerability will affect all the version of Windows past decades, 20 years. Microsoft will soon release a patch on 14 Jan 2020 for this extremely dangerous vulnerability in aRead More →
Just like any ransomware attackers, Sodinokibi ransomware were made public by hackers for not paying ransomware, for the first time in the history. Sodinokibi ransomware was found on April 17,Read More →
Vulnerability which is most dangerous for any software or application. If vulnerability becomes more vulnerable to mobiles phone, it can lead to access your password, contacts and even your mobileRead More →