This video demonstrates the recently discovered NTLM hash leak vulnerability via the PDF files.
In this video, see NSA hacking tools in action. It is easy to hack Windows machines using these tools. It uses EternalBlue vulnerability and DoublePulsar backdoor implant tool.
This video gives a brief overview of Drupal vulnerability, Drupalgeddon 2. It also shows how to exploit drupalgeddon2.
Now more than ever, mobile device users are conscious about significant advances in both device and OS security. Every time a new build of a mobile operating system is released, it includes a variety of new safety features. This time Google has taken a significant step forward with Google Play Protect. Since it was launched […]
The BlueWhale challenge has been an eye-opener for parents across the world. It has revealed another ugly side of the internet connected world. Easy manipulation of vulnerable children and teenagers by unknown people. This has now become an additional online safety concern for parents along with online pedophiles, cyberbullying, cyberstalking and internet-trolling. Dealing with proliferation […]
A cool thing about Person of Interest, a popular television show, is it’s depiction of how easily mobile devices can be broken into. On a typical day, John Reese (played by Jim Cviezel) would walk by the person of interest, tap a few times on his phone and gets full access to the target’s mobile device. […]
Today, there are at least six methods through which goods and services can be paid for. These are net banking, mobile wallets, Unified Payments Interface (UPI) based apps, Aadhaar Enabled Payments System (AEPS), cards, USSD banking, Point of Sale (PoS), mobile banking, micro ATMs etc. All of these payment methods are geared towards promoting cashless […]
I came across The Florentine Deception in the Cybersecurity Canon List. It was listed as a gateway book for 2016. Written by, Carey Nachenberg, co-inventor of Norton Antivirus, it is a suspense thriller novel with cybersecurity as an underlying theme. It is one of those cybersecurity focused novels which amalgamate the two worlds in a […]
What is this Blue Whale Game? The Blue Whale Game is an internet game. It consist of series of tasks assigned to players / participants by administrators during a 50-day period. The final challenge requires the participants to commit suicide. What is the purpose of the game? The game is claimed to be invented by […]
It’s been almost a week since American citizens elected Donald J. Trump as their 45th president. Ever since, there have been a variety of speculations on what his presidency would mean for the USA and world at large. Many are worried that his victory may have initiated a new trend which could affect the upcoming […]