All for Joomla All for Webmasters
Home Tags Cyber News

Tag: Cyber News

cyber news

Czech police arrest Russian hacker tied to 2012 LinkedIn hack

Police in the Czech Republic have detained a Russian man suspected of participating in the breach of LinkedIn user information in 2012, the company...

What is HTTP request/response header?

World Wide Web commonly known as Web is a collection of electronic hyper text documents stored in a computer linked together like a spider's...

Russia no longer denies hacking DNC

WASHINGTON — U.S. officials blame hackers guided by the Russian government for the attacks on DNC servers earlier this year that resulted in WikiLeaks...

Server-Side Includes (SSI) Injection

SSI Injection (Server side Includes) is a server-side exploit technique that allows an attacker to send code into a web application, which will later...

Earn $1.5 million for hacking iPhone

One of the high marketplace private exploit seller Zerodium has tripled the price of iOS rewards. The engineers and penetration testers of Zerodium (a...

How do buffer overflow attack works?

When a web application is launched a process is created in a CPU where PMU (Process Management Unit) allocates temporary storage in RAM which...

Police arrested a man over Pippa Middleton iCloud hacking

Investigators have found out Pippa Middleton iCloud hacking was claimed by a 35 years old man. Pippa Middleton is an English socialite, author, columnist,...

What is DNS Spoofing? How to redirect traffic to fake website?

DNS Spoofing is also known as DNS cache poisoning. It is malicious technique used by attackers to divert legitimate traffic to attacker's fake website...

What is Man-in-the-middle attack (MITM)

In computer security and cryptography (study of techniques for secure communication in the presence of third parties), man-in-the-middle is an attack where an attacker...

Cross-Platform Malware can hack Windows, Linux, OS X Computers

The time moved on when a specially designed malware for any particular system was created. Recently at Kaspersky Lab researchers have discovered a malware...

OS Command Injection Vulnerability

Command Injection attack is also known as Arbitrary Code Execution. In Command Injection an attacker generally injects a malicious user input to the system...

How to Hack WiFi Passwords

Cracking of wireless networks is the defeating of security devices in Wireless local-area networks. Wireless local-area networks(WLANs) – also called Wi-Fi networks are inherently...

Vulnerable SQL Websites list 2017 – Updated

SQL Injection is very popular OWASP top 10 vulnerbility which allows you to hack any website that has the vulnerability. Do you want to...

What is Cross Site Request Forgery Attack (CSRF)?

Cross Site Request Forgery attack is represented by different terminologies e.g One-Click Attack, Session Riding and CSRF or XSRF. CSRF & XSS While we had learnt...

RFI – LFI File Inclusion Attacks – Mitigations

Similar to all other cyber attacks RFI - LFI file inclusion attacks also carries a strong importance when it comes to data breach. In...