Mitigation Strategies – Web Application Security
Hello Techies! In this blog, I'm sharing mitigation strategies points which you should be knowing when you are going for a cyber-security Analyst/Consultant interview. I have noted down these point from portswigger. Below is the list of vulnerabilities: 01.Web Cache...
Hiding secret message using steghide – Stegnograpy Tool
In this blog, we will learn hiding secret message using a tool called steghide. This tool can be used to hide your data into any format of file like jpg, png, execl, pdf etc. Use of this tool is very simple and you can hide your secret file with password protection....
How Hackers steal credentials by phishing attack?
In this blog we will see that how hacker can steal data using phishing attack. Phishing attacks are one of the oldest attacks, but still in trends because of various new methodologies. The only aim of phishing attack is to steal victims sensitive data falling them...
How to Setup Private Search Engine?
In this blog we will setup private search engine. Yes! you heard it right, we will be setting up custom search engine which will be running on the localhost. This search engine will give out all the information on the localhost. Now, to get an idea about how it work,...
Hacking Webcam with just one link – Saycheese
https://www.youtube.com/watch?v=_hO5uFlKsJI Subscribe to our channel In this blog we'll see that how easily hacker can compromise your privacy by hacking webcam. By term "Hacking Webcam", I don't mean only computer webcams, it can be your phone's front camera or...
Hacking Android Over Internet – Any device WAN/LAN
In this blog we will practically Hacking Android Over Internet step by step, no matter its on the WAN (internet) or Local network. This blog is mean to be knowledge purpose only and to get aware about the strategies which Blackhat hackers use to hack android devices....
Install and Setup Ngrok in Kali Linux
In this blog, we will install and setup Ngrok tool, which is an open source tool used by large number of infosec community. https://youtu.be/750XPaLHRAM Subscribe Our Youtube Channel This tool provides a tunnel like feature. It will work as request forwarding all your...
CrySIS aka Dharma Ransomware
Hey Techies! Back again with a new blog. In this blog, I will be talking about CrySIS Ransomware which is also known as Dharma Ransomware. This ransomware is again in light these days and affecting businesses running Windows systems Dharma Ransomware is in the market...
Facebook Link Shim Security Bypass – Issue that can’t be mitigated
The story of this write-up "Facebook Link Shim Security Bypass" came into existence when there were lots of phishing attacks going-on in the market, Still attacks are in market I must say. đ At that time, Facebook came up with an added layer of security. When a user...
How to add Guest User in Windows 10 – It’s not simple as you think
Hey techies! I'm back again with a new tutorial in which we are going to add guest user in Windows 10. Yes, I know it's very simple, go to user account and activate Guest user in Windows 10, Right? No, it's not. I was also thinking that I will find Guest user in...
Kali Linux on Windows CMD – Easy Setup Guide
Hello Techies! In this blog, we will install Kali Linux on Windows as a sub-system so that we can use it with Windows using command line interface. Here I'm not talking about installing Kali Linux using Virtual box or VMware. Installing Kali as subsystem will be...
Nmap in Windows Command Line Interface
Hey Techies! In this blog, I will be showing you quick steps, following which you can install Nmap in Windows command line interface and you can use it just link Kali Linux, inside windows CLI (Command Line Interface). I'm using updated Windows 10, so you can consider...
Top 10 Hollywood Movies – Combination of top Movies and Series
Hey Techies, I have shared the list of top 10 Hollywood movies and series combine list, which you must watch if you are working in infosec or the cyber security field. Watch it guys and see the difference in your life, maybe you will start finding more bugs...
Facebook 3D Photo – Turn your portraits to 3D
Facebook is continously developing their platforms into the field of Virtual Reality (VR) and great example of it is Facebook360 and Facebook 3D Photo. Few months ago, Facebook has released a new feature to its users. This feature is know as "3D Photo". Now there are...
Faceapp Pro – Is it really free?
We have been watching social media from few days, Faceapp is trending at peak and everyone is busy posting their smart looking pic in 50's. Faceapp was launched in 2017. It is a Russian Photo editing app, currently ranking at No.1 on iOS App Store in Photo Editing...
VLC Player Download – The Secure Way!
Recently, a news has been booming online that German national Computer Emergency Response Team i.e. CERT-Bund has identified a buffer-overflow issue in the latest version of the VLC player. The buffer-overflow is the issue related to memory and arise when the buffer...
Nmap top 10 commands you should know
Hey there Techies! In this blog we will be looking at Nmap top 10 commands you should know. It will be helpful if you are working or want to work in the field of network security, network architecture development, information security, information technology, ethical...
All you need to know about the new cryptoasset IOTA
In this cyber world, the need for decentralized and permission less systems is increasing day by day. Though Blockchain promised a compelling vision of decentralized networks their networks in recent times have become increasingly centralized around a few powerful...
How to protect crypto wallets in 2019
In this tech world, Security is a very complex issue. As every day we encounter with a report of a major hacking or ransomware violation. Moreover, millennialâs are investing more in Bitcoin, Ethereum, and a host of other cryptocurrencies making crypto security so...
5G and IoT : A New Global Era
When the fifth generation of wireless communications technology i.e. 5G arrives in 2020, engineers are expecting that it will become the backbone of the Internet of Things. As  5G is capable of data transmission ten times faster than todayâs 4G networks, meaning data...
All you need to know about Blockchain
We are in the generation of cryptocurrency. You might have heard news about people getting rich by investing in Bitcoins and Etherum but to understand about it you need to understand the technology behind it â Blockchain. The blockchain is a distributed ledger...
How quantum computing impacts cryptography
A classical computer encodes data in binary digits that can only be a â1â or a â0â which we refer as bits whereas a quantum computer uses âqubitsâ. A single qubit can encode more than two states. And the Quantum computers that exist today canât perform more complex...
Mega breaches of 2018 exposing 3.6 billion records
In the year 2018 Data Breaches Have Exposed 3.6 Billion Records making its second-worst year on record after 2017 which exposed seven billion records in total. Hacking is the leading cause for data breaches, accounting up to 57.1 percent in total and fraud was another...
The impact of hackers targeting small businesses
A recent SMB Group report says more than 70% of hackers are going to target small businesses. And due to weak cybersecurity protection and a lack of cash to cover the damages as many as 60 percent of hacked small-to-midsize businesses go out of business after six...
Read this before using a public WiFi
In 2018 where ever you go one thing you can find common i.e. Public Wi-Fi whether it may be a local coffee shop, libraries or a hotels or even airports you visit while traveling. Though these WI-Fi hotspots are everywhere, they're often not secure as you thought. They...
What you need to know about TalkTalk hack?
The UK based 20 years experienced TalkTalk Company which had businesses in broadband, telecoms and mobile network solutions got hacked in 2015.yesterday two friends who took part in TalkTalk website have been jailed. So hereâs all you should know about the ÂŁ77m hack....
How to protect your Facebook account from hackers in 2019?
The most popular social networking website Facebook with more than 2.23 billion active users has become a target for hackers this year. Recently Facebook announced a massive security breach affecting at least 50 million active users. As Facebook data is very unique...
All you need to know about âMasked Aadhaarâ
The recent Supreme Court verdict of India on UIDAIâs Aadhaar has ensured stronger data protection safeguards which will accelerate Indiaâs digital journey. In the landmark verdict, it restricted the use of Aadhaar authentication by private entities and allowed its...
The ultimate guide to choose a strong unhackable password
A few years back internet search giant Google released a list of the most common passwords, all of which are considered easily hackable and most insecure passwords which are too easy to guess such as the word "password" itself or name of a child, pet and family...
What is ethical hacking and skills required to become an ethical hacker?
In the Internet world, computer security has become a major concern for governments, businesses and even to common people. Organizations are using the Internet to their advantage by utilizing it as a medium for, advertising, e-commerce, information distribution and...
The Essential Security Tips to protect Your Instagram Account
Instagram is a platform for todayâs generation to explore their creative side while taking photos and sharing them with their friends. Most People share their work and they create their own personal brand and itâs the most amazing app to discover great content from...
How to Secure Gmail in 2019
We are in a generation of the Internet which is offering too many features and opportunities to create collaborate and explore. And in that email is the most critical aspect of our digital identities. So it is important to keep our account safe and secure as it...
How to Secure Your Digitized Home?
We are the generation of people living in smart homes in a digitized world. Everything out there is connected to the internet via WiFi. Cool gadgets are making our lives smarter. Everything is virtually connected but these connections arenât secure as you...
How secure is using GB Whatsapp in 2018?
WhatsApp is a most powerful messaging app owned by Facebook. It allows users to send text messages, voice calls, video calls, images, documents and user location at free of cost. Although it has lots of features;Â it has limitations too such as we can only use a single...
How to secure your car from hackers in an autonomous world?
Automakers are progressing in protecting vehicles from cyber attacks, but the car hacking threat is still real and it may get increasingly serious once autonomous vehicles start hitting the roads in significant numbers in the 2020's. In the action movie The Fate of...
Top 12 Security Tips to Secure your iPhone from Hackers
There was a time when we used to think iPhones are most secure but now we know iPhones can be hacked too, even with the ever-increasing layers of security. Itâs now possible for cybercriminals to hack an iPhone remotely via iCloud. To avoid hackers having access to...
How to Think Like Hacker for a Secure Business
With every new innovation, hackers are adapting themselves to the new environment. As technology becomes accessible younger generations are enjoying hacking simply for the challenge and thrill of it & of course for an added bonus of money and media attention. For...
How to Secure Android Mobile Phones from Getting Hacked
Despite having enhanced features, Android mobiles still remain susceptible to security threats. A hacker can distribute malicious Trojans capable of compromising device security, stealing personal and financial information most of the times. By following some security...
Tips and tricks to Prevent WordPress from getting Hacked
Over the past few years, hacking incidents have become too common. Your website can be easily hacked if it lacks computer security or if you use poor 3rd party applications or outdated scripts, or by simply responding to phishing emails. In a world of a hacking era,...
Facebook Zero Day Flaw: Hackers stolen 50 Million Users Access Tokens
Facebook Zero Day Flaw lets hackers to stole 50 Million users Access Tokens! Guys!! On Friday, we all got a shocking news about Facebook Zero Day flaw. About 90 Million accounts got logged out of Facebook automatically and 50 Million users access token got leaked. In...
How to Boost Your WordPress Website Speed?
Boost your WordPress Website Speed! Hello Everyone! In this blog I will be talking about how to boost your wordpress website loading speed. When we open any website link, there is lots of things happening in back-end to satisfied our request. Now imagine that a...
Top 6 Tools for Information Gathering
Top 6 Tools I use for Information Gathering Hello Everyone!! Today I will be sharing 6 tools which I use for quick information gathering of a target web application. If you are a web application security expert, pentester or ethical hacker, you must be knowing that...
What you know about Cyber Security?
What is Cyber Security? Hello guys! Today I will be talking on cyber security. It is a very common word which almost every one of you have heard. But still there are people who have only heard about it and donât have any idea what does cyber security represents? I...