What is Phishing? Phishing is the fraudulent effort to get hold of sensitive information such as user names, passwords and bank card details with disguising like a trusted thing in an electronic communication. Typically performed by e-mail or instant messaging,it frequently sends users to input private information in a bogus site, the design and texture […]
Category Archives: Security
DNS Cache Poisoning A DNS cache can get poisoned in case it includes a wrong entry. By way of instance, if an attacker will get hands of a DNS host also alters some of the info on it for instance, they might state that google.com really refers to an IP address that the attacker possesses […]
What is Doxing? Researching and broadcasting private or identifying information (especially personally identifying information) about an individual or organization. The methods used to obtain this information include searching publicly available databases and social media websites (such as Facebook), hacking, and social technology. It is closely linked to international vigilantism and hacktivism. Now you have their […]
Physical Security – Tailgating Tailgating (also referred to as piggybacking)is a social engineering technique meant to give an individual physical access to an area without proper authorization. At its most basic, the attacker will wait for an authorized person to use their access card or a biometric credential to open an electronic access control […]
Do You think about securing your laptop, but what about your desk phone, monitor, or printer?
Facebook is looknig for each account Documents !!!!! is that true ? !!! yes !!! Why They need document : From Facebook info ” We ask everyone on Facebook to use the name they go by in everyday life so friends know who they’re connecting with . Please provide identification that displays the name you’d […]
Enable SSH (Secure Shell) in Ubuntu 14.04 ( Trusty Tahr) -How-to-Guide This tutorial shows you how to enable SSH in Ubuntu 14.04 ( Trusty Tahr) you may already know, SSH is a secure communication protocol that lets you remotely access to our Linux and Unix based systems. SSH is a replacement for Telnet.Telnet is very […]
WASHINGTON: It started with hactivists defacing websites and a e-mails pointing users to links that stole data. Soon, Ragnar Rattas and his team of Estonian computer security experts were battling the heaviest and most sophisticated cyberattacks they had ever encountered. As the situation worsened, they abandoned some networks including a major public facing […]
BOSTON: In an unprecedented, three-year cyberespionage campaign, Iranian hackers created false social networking accounts and a fake news website to spy on military and political leaders in the United States, Israel and other countries, a cyberintelligence firm said. ISight Partners, which uncovered the operation, said the hackers’ targets include a four-star US Navy admiral, US […]