web analytics
  • News and Threat Analysis,  Tools, Tricks and More

    BLUETOOTH’S KEY TO MAN IN THE MIDDLE ATTACK: BLESA VULNERABILITY

    In this growing age of technology, humans are trying to automate each and every daily task. With each electrical appliance in your house is now been called by a word “smart appliance”, for a technology geek, he identifies it as Internet of Things(IOT). In simple words if we want to explain the IOT gadgets, then it can be just explained with this phrase: “gadgets with ability of networking” or more simply as the name is revealing itself the gadgets which are the part of internet. In order to communicate with other devices across the internet, these gadgets are discoverable by anyone, either they are good or they are bad actors.…

  • Let Us Learn,  News and Threat Analysis,  Tools, Tricks and More

    FLAWS IN MOBILEIRON’S MDM SOFTWARES ALLOW RESEARCHERS TO HIJACK FACEBOOK’S SERVER

    According to recent attacks on an enterprise we have explored till now, the study shows that the causes are the common vulnerabilities which administrators give least importance. There is no doubt on the fact that these common vulnerabilities are one of the creamy things that every hacker tries to find in a system but these vulnerabilities are not the only thing that can leave a system exposed. In today’s time, every sector are somewhat dependent on third party softwares to expand their vision and functionalities. But with growing functionalities, the security of a system becomes more vulnerable as then the system has more vectors to attack. For example, every web…

  • News and Threat Analysis

    THIS NEW VARIANT OF MYKINGS BOTNET IS SUPPORTED BY PCSHARE TROJAN TO MAKE YOUR SYSTEM A SLAVE!

    All the creatures around us are either masters who control slaves or slaves that are being controlled. Every master try to spread its region, but yes the number of slaves is always limited to per master. A master can made sub masters under its control to control more slaves. When the theory of master slave is being applied to machines, it becomes a little controversial to say who is master and who is slave as they both are controlled by humans who programmed them. When the term hacking is applied to this theory, it becomes a revenge. In the past, we have seen many trojans that are proved dangerous for…

  • News and Threat Analysis,  Tools, Tricks and More

    CRYLOGGER: A TOOL THAT MADE 306 APPS CRY FOR CRYPTOGRAPHY

    The place where the 21 century humans as well as bot resides together is the Internet. Either it is social media or it is just any other application, with the advancement of Machine Learning and Artificial Intelligence, it becomes difficult to identify whether the counterpart on the other side is a human being or a programmed bot. As a result, humans exchange information with such bots that lead to privacy issues. With the increase in traffic on the internet from last decade, tech giants Google, Facebook, Whatsapp are still regularly questioned on user’s privacy. There is no doubt on the fact that these giants have answered most of the questions…

  • News and Threat Analysis

    BEWARE! YOUR TRUST ON WINDOWS DEFENDER MIGHT LET YOU DOWNLOAD MALWARE

    One of the most popular Operating systems around the internet, Microsoft Windows, is know well known among developers, security researchers, attackers to test, build and execute their strategies. The most sophisticated reason for this is that, for over 2 decades, Microsoft has billions of users from tech as well as non tech background. The company has worked well on its vulnerabilities, loopholes and provide timely updates to its users that helps them to be in sync with the internet and has protected them from greater damages. When it comes to security of windows operating system, it has a well known feature named Windows Defender. There is no doubt on the…