In this video, see NSA hacking tools in action. It is easy to hack Windows machines using these tools. It uses EternalBlue vulnerability and DoublePulsar backdoor implant tool.
Hack Windows 7 SP1 in 3 mins: Using NSA Hacking Tools
Durpalgeddon2: Patch or Be Hacked
This video gives a brief overview of Drupal vulnerability, Drupalgeddon 2. It also shows how to exploit drupalgeddon2.
Google Play Protect: Android’s New Security System
Now more than ever, mobile device users are conscious about significant advances in both device and OS security. Every time a new build of a mobile operating system is released, it includes a variety of new safety features. This time Google has taken a significant step forward with Google Play Protect. Since it was launched […]
Here’s how to ensure online safety of your children
The BlueWhale challenge has been an eye-opener for parents across the world. It has revealed another ugly side of the internet connected world. Easy manipulation of vulnerable children and teenagers by unknown people. This has now become an additional online safety concern for parents along with online pedophiles, cyberbullying, cyberstalking and internet-trolling. Dealing with proliferation […]
BlueBorne: Turn that Bluetooth off
A cool thing about Person of Interest, a popular television show, is it’s depiction of how easily mobile devices can be broken into. On a typical day, John Reese (played by Jim Cviezel) would walk by the person of interest, tap a few times on his phone and gets full access to the target’s mobile device. […]
5 Tips for Safe Digital Payments
Today, there are at least six methods through which goods and services can be paid for. These are net banking, mobile wallets, Unified Payments Interface (UPI) based apps, Aadhaar Enabled Payments System (AEPS), cards, USSD banking, Point of Sale (PoS), mobile banking, micro ATMs etc. All of these payment methods are geared towards promoting cashless […]
Games can be replayed; not life – Bury the Blue Whale
What is this Blue Whale Game? The Blue Whale Game is an internet game. It consist of series of tasks assigned to players / participants by administrators during a 50-day period. The final challenge requires the participants to commit suicide. What is the purpose of the game? The game is claimed to be invented by […]
Would Trump trump his promise on Cybersecurity?
It’s been almost a week since American citizens elected Donald J. Trump as their 45th president. Ever since, there have been a variety of speculations on what his presidency would mean for the USA and world at large. Many are worried that his victory may have initiated a new trend which could affect the upcoming […]
Effects of Currency Ban on Cyber Security
On 8th November, 2016, our honorable Prime Minister Shri. Narendra Modi, in his speech addressing the nation, announced that the currency notes of denomination 500 and 1000 would cease to be legal tender from the midnight of November 8. Following are key points concerning the currency ban (source: The Hindu): These notes can be deposited […]
Are you sharing sensitive information over WhatsApp?
Disclaimer: The views/opinions/arguments expressed here are solely those of the author and contributors, as named therein, in their private capacity and do not in any way represent the views of any entity of the Indian Government or any private organization(s) they are associated with. The views/opinions/arguments of the contributors are re-produced here with due permission. […]
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- 7
- …
- 9
- Next Page »