Sunday , April 28 2024 11:14 PM

TimeLine Layout

January, 2016

  • 18 January

    602 Gbps! This May Have Been the Largest DDoS Attack in History

    Cyber attacks are getting evil and worst nightmare for companies day-by-day, and the Distributed Denial of Service (DDoS) attack is one of the favorite weapon for hackers to temporarily suspend services of a host connected to the Internet. Until now, nearly every big website had been a victim of this …

    Read More »
  • 18 January

    The Most Trusted Messenger for Private Chat

    Telegram Messenger – what’s good? I’ve been using WhatsApp for more than 3 years now but lately it has been getting slow. A notification will be delayed by a couple of minutes, that funny video shared in the hilarious group will time out – little things like that. Granted, I got …

    Read More »
  • 14 January

    HOW TO RUN NOT WORKING APPS ON ROOTED ANDROID

    HOW TO RUN NOT WORKING APPS ON ROOTED ANDROID We all know how useful is a rooted android phone. Mostly when we want to gain access to several Android applications and require root menu access. But what happens when some apps refuse to run on rooted mobile phones.  Don’t worry, …

    Read More »

December, 2015

  • 30 December

    How To Install and Configure Elasticsearch on Ubuntu 14.04

    Introduction Elasticsearch is a platform for distributed search and analysis of data in real time. Its popularity is due to its ease of use, powerful features, and scalability. Elasticsearch supports RESTful operations. This means that you can use HTTP methods (GET, POST, PUT, DELETE, etc.) in combination with an HTTP …

    Read More »

October, 2015

  • 29 October

    How Hackers Can Hack Your Chip-and-PIN Credit Cards

    Now, a group of French forensics researchers have inspected a real-world case in which criminals played smart in such a way that they did a seamless chip-switching trick with a slip of plastic that it was identical to a normal credit card. The researchers from the École Normale Supérieure University …

    Read More »
  • 14 October

    Google Secretly Records Your Voice

    OK, Google is Listening… and Recording too. Google is not just listening to your searches, but the search engine is also recording and storing every single voice search you make. Google is incredibly accurate at understanding your voice. The company secretly stores its users’ searches from its voice-activated assistant Google’s …

    Read More »
  • 11 October

    Multiple XSS security vulnerabilities in the Visual Composer WordPress plugin

    There are multiple XSS security vulnerabilities in the Visual Composer WordPress plugin versions prior to 4.7.4 (releases prior to October 2, 2015). Finally WP Bakery, the creators of Visual Composer, who have addressed all identified vulnerabilities and undertaken a code audit to ensure that it is as secure as possible.Developers  whose …

    Read More »
  • 8 October

    Terrorists Targeting Indian Government

    The Potential threat, range from very narrow to very broad, posed by Cyber-Terrorism has provoked considerable alarm. Terrorists involved in Cyber Espionage and Operations aim at gaining access to Nation’s critical infrastructure involving both Government as well as Private sectors. The Frequency and Intensity of such Cyber-attacks are increasing rapidly …

    Read More »
  • 8 October

    LockerPin Ransomware Resets PIN and Permanently Locks Your SmartPhones

    Your device’s lock screen PIN is believed to keep your phone’s contents safe from others, but sadly not from a new piece of ransomware that is capable of hijacking safety of your Android devices. A group of security researchers has uncovered what is believed to be the first real example …

    Read More »
  • 8 October

    SQL Injection : How It Works

    Introduction Lets get started at an apparently unrelated point. Lets assume we create a table in SQL. Now there are three main parts of a database management system, like SQL. They are – Creating structure of table Entering data Making queries (and getting meaningful results from data) Now, when SQL …

    Read More »