As Apple announced macOS 11 Big Sur at WWDC 2020, claiming that it will have major improvements as compared to macOS Catalina , a professional MAC and IOS developer reveals a Mac privacy bug . When MacOs Mojave was introduced , Apple claimed that it would provide additional protection for the user’s private data. A privacy protections system (TCC : Transparency ,Consent, Control) was introduced in Mojave to protect the files on our Mac from access by unauthorised applications. A researcher found a way to hinder the private data of users that too with an unauthorised app , thus bypassing the privacy of the users . He claimed that this…
-
-
WAYS TO SPEED UP WINDOWS 10
Apart from being the 10th version of “MICROSOFT WINDOWS”, being user friendly and having better GUI as compared to its previous versions ,WINDOWS 10 is considered to be the slowest version of Microsoft Windows. There are many reasons behind this . It may not be compatible with your laptop ( hardware requirements such as RAM , processor , hard disk may not be met properly) . be simultaneously running many tasks in the background that you may not know . be automatically updating its services or applications in the background . have corrupted windows file in it . Due to these factors, professionals do not recommend to use Windows 10…
-
MSFVENOM: CREATE YOUR OWN PAYLOAD
Let’s generate our own payload ! In a previous article , we discussed about the pentesting tool msfconsole and how we can use it to exploit the vulnerability and gain access on our target’s machine . In this article, we will talk about about the tool msfvenom (preinstalled in Kali Linux) which comprises of another two tools namely msfpayload and msfencoder. In our article about meterpreter, we talked about how payload is important to make a attack functionable and get most out of the attacked machine. The msfvenom does the same thing! It generates a payload according to the platform selected by you and let you access the target’s device…
-
HOMOGRAPH ATTACK-THE MOST DANGEROUS PHISHING ATTACK
In the past few years ,there has been a significant increase in the cyber crime across the world. New attacks make the innocent users fall in a trap of fraud. Some attacks like social engineering, have also let even non-tech savvy to attack targets. One of the application of social engineering attack is Phishing. Some years ago, attackers found a new technique of doing Phishing, known as Homograph Attack. This attack can also be known as the Advanced Phishing. But why are we calling this attack as the advanced version of phishing attack? Because this attack is that much difficult to detect that normal person who just surfs internet can not…
-
VERIFY THE DOCUMENTS DIGITALLY
PRIVACY! Is it important for you? Can you compromise with it? Of course , A big NO! We all know that how much privacy matters to all of us. We can’t compromise our privacy at any cost. To maintain this privacy, we sometimes spend thousands of dollars just because we don’t want anyone to interfere in our job. In this article, we will be discussing about privacy issue. Let us take an example ! You send important data in the form of PDF across the internet but have you wondered that how much secure your PDF would be when it would roam around the internet? If by chance ,hackers tapped…