Call Us : +91-771045-0011 | +91-771045-0022
Filter

GhostScript Bug! Allowing Remote Access to Systems For BlackHats

2018-08-23

A suite named GhostScript which is based on an interpreter for the organizations like Adobe System PostScript and PDF page deion languages used by a huge amount of IT companies around the globe is found to be infected with a potential flaw in it. Thi...

JavaScript Web server and apps are Vulnerable to DoS attack.

2018-08-20

JavaScript-based web apps and server are found vulnerable to a particular type of DoS attack i.e. ReDoS. ReDoS stands for Regular Expression (regex) Denial of Service attack.This vulnerability comes into the execution when a victim is flooded by a la...

How To Make Metasploit Venom

2017-09-11

Creating Metasploit Venomis the most simplest way to make a metasploit payload. in this you have to only write the one line of code and create a file with the extension of your choice like exe,docx etc and send that file to your victims pc once the v...

Wi-Fi HACKING- (how to hack a Wi-Fi)

2017-09-11

Wireless Fidelity (Wi-Fi) is a technology used for wireless local area network i.e. allowing devices to communicate without cords. The devices used for this particular purpose is based on theIEEE 802.11standards. Wi-Fi allows us to access digital ...

Snapchat Controversy- Indian Hackers Hacked Snapchat And Leaked 1.7 Million User Details On Dark Web

2017-04-19

Snapchat is in news these days, as its CEO Evan Spiegel made a disrespectful comment on INDIA. The hashtags #boycottsnapchat and #uninstallsnapchat are trending social media as well. The CEO Evan Spiegel said that Snapchat is only for rich people ...

MAN IN THE MIDDDLE ATTACK (ROGUE DHCP ATTACK)

2017-03-14

One of the powerful Internet attack which is commonly used by an attacker is MITM attack.Suppose you are seating in your office and surfing and sharing some confidential data with someone, and in between, one of your company’s bad guy is seating in...

Your Android device's Pattern Lock can be cracked within five attempts

2017-03-10

The popular Pattern Lock system used to secure millions of Android phones can be cracked within just five attempts -- and more complicated patterns are the easiest to crack, security experts reveal.Pattern Lock is a security measure that protects dev...

Beware Amazon Users- Sc-Elegance Named Merchant is Running Phishing Campaign

2017-01-13

Running phishing campaigns is quite easy for hackers since the people started using e-commerce websites to do shopping online. Hackers are targeting users of well-known e-commerce websites such as ebay, Shopify, and Amazon. A new phishing campaign ha...

The FBI Website Hacking News is Just A Hoax Plone CMS Said

2017-01-06

A new twist has come in the latest “FBI Website Hacking Incident”. In yesterday’s article, we wrote that the CyberZeist (@cyberzeist) hacker claimed on twitter that he has hacked FBI website. He also leaked the stolen 155 FBI accounts on “...

Security Mistakes of GDSs Allowing Attackers To Modify and Steal Random Flight Booking Details

2016-12-30

Thousands of flights take off daily and millions of people travel around the world through these flights. All travel agencies are using Global Distribution System (GDS) to book flights. A Global Distribution System (GDS) is an online network which al...

Contact Us

+91-771045-0011

Request more information

suggested for you

Proudly Operated from India

© 2016 Copyrights. All Rights Reserved

Bootstrap Example

See more of Cyber Intelligence by logging in.
Connect with cyber security experts,Discover job opportunities,Online Training, Information Security Advisory and lot more.

Sign Up Log In