Tabnabbing

| | Phishing
What is Tabnabbing? As described by Aza Raskin, tabnabbing goes like this: when a simple JavaScript detects that the user has moved to another browser tab or has been inactive for some time, a URL in... Go on to the site to read the full article ... Read More

Password Spraying

| | Hacking
As we are witnessing many organizations moving aggressively towards cloud-based platforms, we are also coming more into contact with Federation services. Federations extend the authentication process... Go on to the site to read the full article ... Read More
Pentester Academy Command Injection ISO: SugarCRM 6.3.1 Exploitation

Pentester Academy Command Injection ISO: SugarCRM 6.3.1 Exploitation

| | Hacking
Introduction The Pentester Academy by Vivek Ramachandran had compiled a virtual machine that consists of various vulnerable real-world application. All the application is vulnerable to Command... Go on to the site to read the full article ... Read More
QRL Jacking

QRL Jacking

| | Hacking
Quick Response Code Login Jacking (also known as QRL Jacking) is a social engineering attack by which the attacker can hijack the session, affecting all applications that depends on the “Login... Go on to the site to read the full article ... Read More
All about SamSam Ransomware

All about SamSam Ransomware

Ransomware: Perhaps Today’s No.1 Security Threat Threatening and Risky for you and fruitful for hackers, ransomware has taken over as today’s no. 1 security threat. Attacks related to... Go on to the site to read the full article ... Read More

Importance of IP Fragmentation in Penetration Testing

| | Penetration Testing
Introduction Penetration testing is an extremely important testing aspect when we consider the optimum level of security for any system pertaining to crucial importance. It can be defined as a... Go on to the site to read the full article ... Read More

5 Business Email Compromise Attack Examples We Can Learn From

| | Phishing
Business email compromise (BEC) is a type of phishing scheme where the cyber attacker impersonates a high-level executive (CIO, CEO, CFO, etc.) and attempts to get an employee or customer to... Go on to the site to read the full article ... Read More
Top 5 Password Managers in 2017

Top 5 Password Managers in 2017

Introduction The Password manager generates and retrieves complex and long passwords that are extremely difficult to guess, and stores these passwords in an encrypted database for safe and quick... Go on to the site to read the full article ... Read More
Top 10 Tips for Keeping Your Smartphone Secure

Top 10 Tips for Keeping Your Smartphone Secure

Introduction In this digital era, with the increasing technological advances, handheld devices have gained much importance in our lives. In recent years, with the advent of multitasking and... Go on to the site to read the full article ... Read More
Pentester Academy Command Injection ISO: AjaXplorer 2.5.5 Exploitation

Pentester Academy Command Injection ISO: AjaXplorer 2.5.5 Exploitation

| | Penetration Testing
Introduction: The Pentester Academy has created a virtual machine that consists of various vulnerable real-world applications. These applications are vulnerable to the “Command Injection”... Go on to the site to read the full article ... Read More
Loading...