Use nslookup for footprinting
WHAT IS A DNS (DOMAIN NAME SERVER)? Domain Name Server or we can say Domain Name System is a distributed method that helps humans to remember name of any website.Read More →
WHAT IS A DNS (DOMAIN NAME SERVER)? Domain Name Server or we can say Domain Name System is a distributed method that helps humans to remember name of any website.Read More →
The vulnerability persisted on the Postal Service website for almost a year Cybersecurity and digital forensics specialists from the International Institute of Cyber Security reported that the United States PostalRead More →
The malicious program could be a cryptocurrency miner, or an adware The Android mobile operating system is one of the most widely used in the world, so multiple threat actorsRead More →
Launched this summer, this biometric program has shown greater efficiency on land frontiers than at airports It has been almost three months since the implementation of biometric facial recognition forRead More →
Microsoft has recently announced that its nearly 800 million users of services such as Outlook, Office or Skype now have the option to login to these platforms without using aRead More →
MASSBLEED:- Massbleed is a SSL vulnerability scanner. Its mainly check vulnerability in ssl of the target sites, as per ethical hacking investigators. Massbleed is an open source project and canRead More →
Domain Name Server or we can say Domain Name System is a distributed method that helps humans to remember name of any website. Generally websites are hosted on servers usingRead More →
Some recommendations for compliance with the EU’s data security regulation As reported by information security and digital forensics specialists, all organizations that process personal data from residents of the EuropeanRead More →
The flaw was presented in a new feature of the social network, implemented to comply with the GDPR A security flaw in “Download Your Data”, the recently launched Instagram tool,Read More →
Even the Tor browser can be monitored with this malicious code Specialists in digital forensics and information security have revealed a new side channel attack technique that bypasses theRead More →