web analytics
  • News and Threat Analysis,  Tools, Tricks and More

    ATTACKERS CAN HIJACK YOUR IPHONE SILENTLY WITH THIS VULNERABILITY. MORE DANGEROUS THAN YOU THINK!

    Completing its benchmark of 1 billion sales across the globe, Apple devices are always among on top of the best devices that are known to provide the ultimate privacy and keep its users up to date about security-related issues. These devices are sometimes also called hack-proof because either they are very difficult to hack or they require extensive knowledge of hardware underlying its devices to explore the bug and exploit it. From the last decade, be it any industry of entertainment across the globe, the scenario of hacking is shown as a hot cream (with 3-4 consoles running simultaneously and a person is hacking or taking the control of the…

  • News and Threat Analysis,  Tools, Tricks and More

    BLUETOOTH’S KEY TO MAN IN THE MIDDLE ATTACK: BLESA VULNERABILITY

    In this growing age of technology, humans are trying to automate each and every daily task. With each electrical appliance in your house is now been called by a word “smart appliance”, for a technology geek, he identifies it as Internet of Things(IOT). In simple words if we want to explain the IOT gadgets, then it can be just explained with this phrase: “gadgets with ability of networking” or more simply as the name is revealing itself the gadgets which are the part of internet. In order to communicate with other devices across the internet, these gadgets are discoverable by anyone, either they are good or they are bad actors.…

  • Let Us Learn,  News and Threat Analysis,  Tools, Tricks and More

    FLAWS IN MOBILEIRON’S MDM SOFTWARES ALLOW RESEARCHERS TO HIJACK FACEBOOK’S SERVER

    According to recent attacks on an enterprise we have explored till now, the study shows that the causes are the common vulnerabilities which administrators give least importance. There is no doubt on the fact that these common vulnerabilities are one of the creamy things that every hacker tries to find in a system but these vulnerabilities are not the only thing that can leave a system exposed. In today’s time, every sector are somewhat dependent on third party softwares to expand their vision and functionalities. But with growing functionalities, the security of a system becomes more vulnerable as then the system has more vectors to attack. For example, every web…

  • News and Threat Analysis,  Tools, Tricks and More

    CRYLOGGER: A TOOL THAT MADE 306 APPS CRY FOR CRYPTOGRAPHY

    The place where the 21 century humans as well as bot resides together is the Internet. Either it is social media or it is just any other application, with the advancement of Machine Learning and Artificial Intelligence, it becomes difficult to identify whether the counterpart on the other side is a human being or a programmed bot. As a result, humans exchange information with such bots that lead to privacy issues. With the increase in traffic on the internet from last decade, tech giants Google, Facebook, Whatsapp are still regularly questioned on user’s privacy. There is no doubt on the fact that these giants have answered most of the questions…

  • News and Threat Analysis,  Tools, Tricks and More

    VULNERABILITY IN VISA CONTACTLESS CARD TRANSACTIONS COULD ALLOW HACKERS MAKE MILLIONS WITHOUT ANY ACTION

    In last 6 months, COVID-19 has make all of us to believe on the fact that no surface is absolutely safe to touch. As a result, people had to adopt new normal in order to survive and earn living. Welcoming this new normal, we all have learnt to abide on two most important rules which are: Social distancing. Conduct contactless meetings as much as possible. Therefore, anyone who has still not adopted the new normal is considered to be of no use by the society. If we talk about new normal in context to payments and transactions, obviously cashless or plastic payments have become the priority over cash payments. From…