Monday , June 3 2019
Home / Cyber News (page 4)

Cyber News

What is Cross Site Request Forgery Attack (CSRF)?

cross site request forgery

Cross Site Request Forgery attack is represented by different terminologies e.g One-Click Attack, Session Riding and CSRF or XSRF. CSRF & XSS While we had learnt about Cross Site Scripting (short for XSS), let’s try to learn the different between cross site request forgery and cross site scripting. In XSS, …

Read More »

RFI – LFI File Inclusion Attacks – Mitigations

file inclusion

Similar to all other cyber attacks RFI – LFI file inclusion attacks also carries a strong importance when it comes to data breach. In other words we can describe it as why the server isn’t working to load my webpages. File Inclusion File inclusion is a type of vulnerability that …

Read More »

White Hat turned into Black Hat Hackers

The very recent news exposed the reality of most cyber security experts who were paid to defend the enterprises for which they were hired (contract based or permanent). The ethical hackers were on contract to protect the credentials of any particular company. But these security researchers who were white hat …

Read More »

What is Malware and How It Can Affect Your Computer?

Malware Malware is malicious line of codes, a software or a program. Malware is short for malicious software. It can be used to bypass control, steal data, compromise systems. Malware can be anything that looks legitimate to the users but contain infected code to harm your computer, smartphone or anything …

Read More »

Hackers using Google Dorking Tool for Mayhem

Google Dorking

Its not new for hackers to get access to your account. But this time hackers are using the most useful technique for hacking into your systems. It’s Google Dorking unables an attacker to find vulnerabilities in any system and jump into system’s weaknesses.  Exploitation was always fun for hackers to …

Read More »

Who are snooping on your smartphone

Its is founded in a research which was conducted by the University of British Columbia and University of Lisbon that brought 1,381 users via Amazon’s Mechanical Turk close to know phone snooping. This is one of the big reason to protect your phone with pass-code, fingerprint or pattern that’s all …

Read More »

How To Protect Website From Defacement

website defacement

Every website that exists in today’s digital World represents some particular business. Each website is the face of that specific business. Visitors find the image of business by their website and the marketing analogies (didn’t discuss here). Website defacement is an attack where the hacker changes the visual appearance of …

Read More »

32M Twitter Accounts May Have Been Hacked And Leaked

twitter accounts may have been hacked

With the passage of time, the number of hacks are increasing. Recently 32M twitter accounts may have been hacked as broadcasted. The Twitter was targeted by a malicious malware. The Hackers allegedly hacked the twitter as described by the newscasters. This is not the only one time social media was …

Read More »

Facebook CEO Mark Zuckerberg’s social accounts hacked

World’s biggest social media’s Founder Mark Zuckerberg busy in updating Facebook security lacked to secure his personal Facebook account. The last Sunday Facebook CEO Mark Zuckerberg’s social accounts hacked. Facebook account together with Twitter’s and Pinterest accounts were hacked by unknown Saudi Hackers. The hacker(s) — who use the name …

Read More »

Acunetix Website Hacked by Croatian Hackers

Acunetix hacked

Acunetix, a famous Automated Web Application Scanner is a Windows software application with which you can perform a full web scan from your computer. Yesterday Acunetix website was hacked by Croatian Revolution hackers, best known for using DDoS, defacement. After the hack, the website was giving a 403 error that …

Read More »

USB Charger Wirelessly Captures Whatever You Type

USB Charger Wirelessly Captures Whatever You Type

FBI warns public intentionally about the tracking USB charger that captures all the typos you done on your device. The USB charger wirelessly captures whatever you type. The news was heard anonymously when last year somewhere a white hat hacker has developed a charger which was named Arduino-based a cheap …

Read More »

Pakistani No.1 Property Website hacked by Bangladeshi Hackers

Pakistani No.1 Property Website hackedPakistani No.1 Property Website hacked

The cyber attack is a big blow to, which entered the market in 2006 and has since then become one of the most widely used property portals in Pakistan, popular among ordinary home buyers and real estate agents alike. Pakistani No.1 Property Website hacked by Bangladeshi hackers. Many …

Read More »

Hack with Cross Site Scripting (XSS)

Cross Site Scripting

Before hacking with Cross Site Scripting (XSS), lets first learn about what is XSS? What is XSS? Inserting malicious client side script into the web applications, and retrieving the scripts appearing to be coming from a trusted source (server) is termed as cross site scripting. XSS differs from other web …

Read More »

Hack with Base64 Encoding


Base64 encoding is nothing else but the conversion of binary values into ASCII representations. This allows a launching of phishing attacks without the need to host index.html file anywhere on the server. Hack with Base64 encoding is the new and most famous way to get someone’s credentials easily. Hence being …

Read More »

Learn about Phishing


What is Phishing? Phishing is an attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons and by masquerading as a trustworthy entity in an electronic communication. Phishing a threat? Phishing is a serious problem beside its a continual …

Read More »

Responsive WordPress Theme Freetheme wordpress magazine responsive freetheme wordpress news responsive freeWORDPRESS PLUGIN PREMIUM FREEDownload theme free