Saturday , October 21 2017

RFI – LFI File Inclusion Attacks – Mitigations

file inclusion

Similar to all other cyber attacks RFI – LFI file inclusion attacks also carries a strong importance when it comes to data breach. In other words we can describe it as why the server isn’t working to load my webpages. File Inclusion File inclusion is a type of vulnerability that …

Read More »

White Hat turned into Black Hat Hackers

The very recent news exposed the reality of most cyber security experts who were paid to defend the enterprises for which they were hired (contract based or permanent). The ethical hackers were on contract to protect the credentials of any particular company. But these security researchers who were white hat …

Read More »

What is Malware and How It Can Affect Your Computer?

Malware Malware is malicious line of codes, a software or a program. Malware is short for malicious software. It can be used to bypass control, steal data, compromise systems. Malware can be anything that looks legitimate to the users but contain infected code to harm your computer, smartphone or anything …

Read More »

Hackers using Google Dorking Tool for Mayhem

Google Dorking

Its not new for hackers to get access to your account. But this time hackers are using the most useful technique for hacking into your systems. It’s Google Dorking unables an attacker to find vulnerabilities in any system and jump into system’s weaknesses.  Exploitation was always fun for hackers to …

Read More »

Who are snooping on your smartphone

Its is founded in a research which was conducted by the University of British Columbia and University of Lisbon that brought 1,381 users via Amazon’s Mechanical Turk close to know phone snooping. This is one of the big reason to protect your phone with pass-code, fingerprint or pattern that’s all …

Read More »

How To Perform Denial of Service or DDoS Attacks?

Denial of Service

What is Denial of Service? Denial of service is attempt to temporary or indefinitely interrupt the services to its intended users. This attack targets the availability of an IT System (Web Server). This attack is launched when the attacker is not able to harm the integrity and confidentiality of an …

Read More »

How To Protect Website From Defacement

website defacement

Every website that exists in today’s digital World represents some particular business. Each website is the face of that specific business. Visitors find the image of business by their website and the marketing analogies (didn’t discuss here). Website defacement is an attack where the hacker changes the visual appearance of …

Read More »

How To Prevent SQL Injection Attacks On PHP Websites

prevent sql injection

Till this point we have gathered enough information about how to exploit a website with SQL Injection attack and its related security threat known as Blind SQL Injection attack. Though both the attacks are very similar to each other but are used in different situations. Time Based SQL Injection is …

Read More »

Finding WordPress Vulnerabilities Using WpScan

WordPress Vulnerabilities

WordPress is the most popular online publishing platform, currently powering more than 26% of the web. There are approximately 76.5 million WordPress blogs. WordPress is an Open Source and anyone can start a blog or build a website in seconds without any technical knowledge. It is very easy to use. Secondly many WordPress …

Read More »

Learn About Blind SQL Injection Exploit

blind sql injection

As always before exploiting with new technique and technology, first learn what the new thing this time means in the core scenario. Learn about blind SQL Injection Exploit that enable attackers to exploit SQL Injected websites. In my previous blog, I wrote in detail about how to exploit website with …

Read More »

How To Exploit Website With SQL Injection?

SQL Injection

Before leaning how to exploit website with SQL Injection, let’s first to try learn the core methodologies and the abstraction behind the scenes. What is SQL Injection? SQL Injection is a malicious attack where malicious users can inject SQL commands (commonly referred to as malicious payload) in SQL statement that …

Read More »

32M Twitter Accounts May Have Been Hacked And Leaked

twitter accounts may have been hacked

With the passage of time, the number of hacks are increasing. Recently 32M twitter accounts may have been hacked as broadcasted. The Twitter was targeted by a malicious malware. The Hackers allegedly hacked the twitter as described by the newscasters. This is not the only one time social media was …

Read More »

How To Make SEO Based Website?

seo

What is SEO? Search engine optimization is a technical methodology of specified and tested strategies, and tactics that are used to increase the performance of a website and increase the amount of visitors on a website that helps the website to come in the top indexes defined by Google. In …

Read More »

36 Ways to Increase Blog Traffic Without Investing on Ads

increase blog traffic

Below described scenarios are truly researched from Authentic and well-known resources, who grew their blog traffic up to 100,000 in just a month. You might be thinking this is all done by advertising and promotions. Well, you aren’t thinking the right. To increase blog traffic this is all done by …

Read More »

Facebook CEO Mark Zuckerberg’s social accounts hacked

World’s biggest social media’s Founder Mark Zuckerberg busy in updating Facebook security lacked to secure his personal Facebook account. The last Sunday Facebook CEO Mark Zuckerberg’s social accounts hacked. Facebook account together with Twitter’s and Pinterest accounts were hacked by unknown Saudi Hackers. The hacker(s) — who use the name …

Read More »

Responsive WordPress Theme Freetheme wordpress magazine responsive freetheme wordpress news responsive freeWORDPRESS PLUGIN PREMIUM FREEDownload theme free