All the creatures around us are either masters who control slaves or slaves that are being controlled. Every master try to spread its region, but yes the number of slaves is always limited to per master. A master can made sub masters under its control to control more slaves. When the theory of master slave is being applied to machines, it becomes a little controversial to say who is master and who is slave as they both are controlled by humans who programmed them. When the term hacking is applied to this theory, it becomes a revenge. In the past, we have seen many trojans that are proved dangerous for…
-
-
OPERATION EPIC MANCHEGO- MALDOCS DELIVERING EPIC INFOSTEALERS
At some point in our life, we all come across some leadership responsibilities. For a leader, the most important characteristics is to get himself updated with his user’s data in order to analyze and increase their efficiency. Thus, a leader has to maintain a proper database that has both integrity and authenticity. These two features of a database determine its strength and lifeline. Popular for some past years, Microsoft’s Excel Spreadsheets are one of the most common utility used by many officials and staffers in every sector. From tourism to IT industry, every organization from different industries maintain several databases. In case of large and dynamic records, there is a…
-
MIRAI BOTNET IS TASTING WEAK PASSWORD PROTECTED LINUX SERVERS. HOW IS YOURS?
In the last 5 years, the botnet which made its appearance in every sector, infecting system with its own made custom malware is the Mirai Botnet. This botnet is known for launching large scale DDOS attacks and if still you don’t know about it and your organization architecture is based on Linux platforms with weak security, you might be their next target in their botnet attacks. In today’s time, every sector either it is food industry or a normal service provider, everyone is going digital. For going digital, the basic need for every startup is to maintain a team of IT professionals that can handle all the frontend and backend…
-
DURI CAMPAIGNERS ARE USING HTML SMUGGLING ATTACK TO DELIVER MALWARE
To talk with computer, you need to talk in its language. Computers can’t understand your mother tongue and thus we have to understand it to use it for our tasks. There were many computer scientists who devoted all their life to understand computers, many even died exploring computer, but the computer technology is the only thing which is getting advanced day by day. As it is going advanced, the security infrastructure of technology is getting more complex to handle because there are many experts available but not every expert is working for welfare. There are still many experts who are under the hood and are regularly working to exploit your…
-
MEET THIS NEW BORN INFOSTEALER IN RUSSIA NAMED PURPLEWAVE
We all know that in this outbreak, we all have suffered a lot. Someone who knows about technology also knows that everyone’s privacy on the internet has been breached in someway, whether by the government or cyber criminals or the reputed brands. It is a different fact that experts know the way to protect themselves and their loved ones and thus are successful to escape from the breaches but for a normal guy, still it is a bitter truth that the word “privacy” is now the only shit to say our data is secure. Trackers and infostealers are everywhere either behind us or ahead of us. Exceptions are always there…