Thursday , April 18 2019

Hackers using Google Dorking Tool for Mayhem

Google Dorking

Its not new for hackers to get access to your account. But this time hackers are using the most useful technique for hacking into your systems. It’s Google Dorking unables an attacker to find vulnerabilities in any system and jump into system’s weaknesses.  Exploitation was always fun for hackers to …

Read More »

Who are snooping on your smartphone

Its is founded in a research which was conducted by the University of British Columbia and University of Lisbon that brought 1,381 users via Amazon’s Mechanical Turk close to know phone snooping. This is one of the big reason to protect your phone with pass-code, fingerprint or pattern that’s all …

Read More »

How To Perform Denial of Service or DDoS Attacks?

Denial of Service

What is Denial of Service? Denial of service is attempt to temporary or indefinitely interrupt the services to its intended users. This attack targets the availability of an IT System (Web Server). This attack is launched when the attacker is not able to harm the integrity and confidentiality of an …

Read More »

How To Protect Website From Defacement

website defacement

Every website that exists in today’s digital World represents some particular business. Each website is the face of that specific business. Visitors find the image of business by their website and the marketing analogies (didn’t discuss here). Website defacement is an attack where the hacker changes the visual appearance of …

Read More »

How To Prevent SQL Injection Attacks On PHP Websites

prevent sql injection

Till this point we have gathered enough information about how to exploit a website with SQL Injection attack and its related security threat known as Blind SQL Injection attack. Though both the attacks are very similar to each other but are used in different situations. Time Based SQL Injection is …

Read More »

Finding WordPress Vulnerabilities Using WpScan

WordPress Vulnerabilities

WordPress is the most popular online publishing platform, currently powering more than 26% of the web. There are approximately 76.5 million WordPress blogs. WordPress is an Open Source and anyone can start a blog or build a website in seconds without any technical knowledge. It is very easy to use. Secondly many WordPress …

Read More »

Learn About Blind SQL Injection Exploit

blind sql injection

As always before exploiting with new technique and technology, first learn what the new thing this time means in the core scenario. Learn about blind SQL Injection Exploit that enable attackers to exploit SQL Injected websites. In my previous blog, I wrote in detail about how to exploit website with …

Read More »

How To Exploit Website With SQL Injection?

SQL Injection

Before leaning how to exploit website with SQL Injection, let’s first to try learn the core methodologies and the abstraction behind the scenes. What is SQL Injection? SQL Injection is a malicious attack where malicious users can inject SQL commands (commonly referred to as malicious payload) in SQL statement that …

Read More »

32M Twitter Accounts May Have Been Hacked And Leaked

twitter accounts may have been hacked

With the passage of time, the number of hacks are increasing. Recently 32M twitter accounts may have been hacked as broadcasted. The Twitter was targeted by a malicious malware. The Hackers allegedly hacked the twitter as described by the newscasters. This is not the only one time social media was …

Read More »

How To Make SEO Based Website?


What is SEO? Search engine optimization is a technical methodology of specified and tested strategies, and tactics that are used to increase the performance of a website and increase the amount of visitors on a website that helps the website to come in the top indexes defined by Google. In …

Read More »

36 Ways to Increase Blog Traffic Without Investing on Ads

increase blog traffic

Below described scenarios are truly researched from Authentic and well-known resources, who grew their blog traffic up to 100,000 in just a month. You might be thinking this is all done by advertising and promotions. Well, you aren’t thinking the right. To increase blog traffic this is all done by …

Read More »

Facebook CEO Mark Zuckerberg’s social accounts hacked

World’s biggest social media’s Founder Mark Zuckerberg busy in updating Facebook security lacked to secure his personal Facebook account. The last Sunday Facebook CEO Mark Zuckerberg’s social accounts hacked. Facebook account together with Twitter’s and Pinterest accounts were hacked by unknown Saudi Hackers. The hacker(s) — who use the name …

Read More »

Acunetix Website Hacked by Croatian Hackers

Acunetix hacked

Acunetix, a famous Automated Web Application Scanner is a Windows software application with which you can perform a full web scan from your computer. Yesterday Acunetix website was hacked by Croatian Revolution hackers, best known for using DDoS, defacement. After the hack, the website was giving a 403 error that …

Read More »

USB Charger Wirelessly Captures Whatever You Type

USB Charger Wirelessly Captures Whatever You Type

FBI warns public intentionally about the tracking USB charger that captures all the typos you done on your device. The USB charger wirelessly captures whatever you type. The news was heard anonymously when last year somewhere a white hat hacker has developed a charger which was named Arduino-based a cheap …

Read More »

Pakistani No.1 Property Website hacked by Bangladeshi Hackers

Pakistani No.1 Property Website hackedPakistani No.1 Property Website hacked

The cyber attack is a big blow to, which entered the market in 2006 and has since then become one of the most widely used property portals in Pakistan, popular among ordinary home buyers and real estate agents alike. Pakistani No.1 Property Website hacked by Bangladeshi hackers. Many …

Read More »

Responsive WordPress Theme Freetheme wordpress magazine responsive freetheme wordpress news responsive freeWORDPRESS PLUGIN PREMIUM FREEDownload theme free