In today’s time, providing users with unjustified administrator access on their work systems, could lead to significant business loss. A careless user may download a benign looking file and the next moment you may find yourself battling an organization wide ransomware attack. Here’s a quick guide for small business owners on how to tame this […]
Steal Windows Credentials using a PDF File (NTLM Hash)
This video demonstrates the recently discovered NTLM hash leak vulnerability via the PDF files. Uday MittalUday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such as CRTP, OSCE, OSCP, CISSP, CISA, CISM, CRISC among others. He speaks on cybersecurity […]
Hack Windows 7 SP1 in 3 mins: Using NSA Hacking Tools
In this video, see NSA hacking tools in action. It is easy to hack Windows machines using these tools. It uses EternalBlue vulnerability and DoublePulsar backdoor implant tool. Uday MittalUday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such […]
Durpalgeddon2: Patch or Be Hacked
This video gives a brief overview of Drupal vulnerability, Drupalgeddon 2. It also shows how to exploit drupalgeddon2. Uday MittalUday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such as CRTP, OSCE, OSCP, CISSP, CISA, CISM, CRISC among others. […]
Here’s how to ensure online safety of your children
The BlueWhale challenge has been an eye-opener for parents across the world. It has revealed another ugly side of the internet connected world. Easy manipulation of vulnerable children and teenagers by unknown people. This has now become an additional online safety concern for parents along with online pedophiles, cyberbullying, cyberstalking and internet-trolling. Dealing with proliferation […]
BlueBorne: Turn that Bluetooth off
A cool thing about Person of Interest, a popular television show, is it’s depiction of how easily mobile devices can be broken into. On a typical day, John Reese (played by Jim Cviezel) would walk by the person of interest, tap a few times on his phone and gets full access to the target’s mobile device. […]
5 Tips for Safe Digital Payments
Today, there are at least six methods through which goods and services can be paid for. These are net banking, mobile wallets, Unified Payments Interface (UPI) based apps, Aadhaar Enabled Payments System (AEPS), cards, USSD banking, Point of Sale (PoS), mobile banking, micro ATMs etc. All of these payment methods are geared towards promoting cashless […]
Games can be replayed; not life – Bury the Blue Whale
What is this Blue Whale Game? The Blue Whale Game is an internet game. It consist of series of tasks assigned to players / participants by administrators during a 50-day period. The final challenge requires the participants to commit suicide. What is the purpose of the game? The game is claimed to be invented by […]
Would Trump trump his promise on Cybersecurity?
It’s been almost a week since American citizens elected Donald J. Trump as their 45th president. Ever since, there have been a variety of speculations on what his presidency would mean for the USA and world at large. Many are worried that his victory may have initiated a new trend which could affect the upcoming […]
Effects of Currency Ban on Cyber Security
On 8th November, 2016, our honorable Prime Minister Shri. Narendra Modi, in his speech addressing the nation, announced that the currency notes of denomination 500 and 1000 would cease to be legal tender from the midnight of November 8. Following are key points concerning the currency ban (source: The Hindu): These notes can be deposited […]