Saturday , November 18 2017
Home / Tag Archives: TECH

Tag Archives: TECH

Google Bangladesh hacked by Pakistani hackers

Google Bangladesh hacked

Google’s Bangladesh domain came under attack by some Pakistani hackers. The said hackers altered the domain address in BTCL’s DNS entry to redirect users to a custom page. Google Bangladesh hacked. Pakistan-based hackers, going by the name Team Pak Cyber Attackers, allegedly hacked and defaced Google’s Bangladesh domain with a …

Read More »

U.S. Govt. Hackers Ready to Hit Back If Russia Tries to Disrupt Election

U.S. Govt. Hackers

According to NBCnews, U.S. military hackers have penetrated Russia’s electric grid, telecommunications networks and the Kremlin’s command systems, making them vulnerable to attack by secret American cyber weapons should the U.S. deem it necessary, according to a senior intelligence official and top-secret documents reviewed by NBC News. Russia no longer …

Read More »

Massive DDOS attack against Dyn DNS knocked out Popular Websites

ddos attack

According to krebsonsecurity, criminals this morning massively attacked Dyn, a company that provides core Internet services for Twitter, SoundCloud, Spotify, Reddit and a host of other sites, causing outages and slowness for many of Dyn’s customers. A widespread cyber-attack was carried out against some of the world’s biggest websites on …

Read More »

Czech police arrest Russian hacker tied to 2012 LinkedIn hack

Police in the Czech Republic have detained a Russian man suspected of participating in the breach of LinkedIn user information in 2012, the company said Wednesday. Czech police said the Russian was arrested in cooperation with the FBI within 12 hours, thanks to a rapid exchange of information with American …

Read More »

What is HTTP request/response header?

http header

World Wide Web commonly known as Web is a collection of electronic hyper text documents stored in a computer linked together like a spider’s web which can be accessed via internet. The web browser is a software program that acts like a computer program e.g firefox, chrome, safari (Web clients). …

Read More »

Russia no longer denies hacking DNC

russia no longer denies hacking dnc

WASHINGTON — U.S. officials blame hackers guided by the Russian government for the attacks on DNC servers earlier this year that resulted in WikiLeaks publishing about 20,000 private emails just before Hillary Clinton’s nominating convention in July. Russia no longer denies hacking DNC. Vladimir Putin said the hacking of thousands …

Read More »

Server-Side Includes (SSI) Injection

server side includes

SSI Injection (Server side Includes) is a server-side exploit technique that allows an attacker to send code into a web application, which will later be executed locally by the web server. SSI Injection SSI are generally the directives that are present on the web applications which are used to feed …

Read More »

Earn $1.5 million for hacking iPhone

hacking iPhone

One of the high marketplace private exploit seller Zerodium has tripled the price of iOS rewards. The engineers and penetration testers of Zerodium (a premium exploit platform) who purchases zero-day vulnerabilities and exploits decided to pay heavy rewards to researchers who are showing interest that ultimately results in discovering unknown …

Read More »

What is DNS Spoofing? How to redirect traffic to fake website?

DNS Spoofing

DNS Spoofing is also known as DNS cache poisoning. It is malicious technique used by attackers to divert legitimate traffic to attacker’s fake website for his own sake. DNS Spoofing The main idea behind DNS spoofing is that attacker introduces a corrupt domain name in the DNS resolver’s cache, where …

Read More »

What is Man-in-the-middle attack (MITM)

man-in-the-middle

In computer security and cryptography (study of techniques for secure communication in the presence of third parties), man-in-the-middle is an attack where an attacker secretly keeps an eye on the communication happening in between two legitimate users while they are not aware of any external threat. Man-in-the-middle attack is one …

Read More »

36 Ways to Increase Blog Traffic Without Investing on Ads

increase blog traffic

Below described scenarios are truly researched from Authentic and well-known resources, who grew their blog traffic up to 100,000 in just a month. You might be thinking this is all done by advertising and promotions. Well, you aren’t thinking the right. To increase blog traffic this is all done by …

Read More »

Google Introduces Voice Guided Turn by Turn Navigation for Pakistan

The big fascinating news has finally come. After real time traffic updates Google Introduces Voice Guided Turn by Turn Navigation feature for users in Pakistan. Currently in beta version, now the Google Navigation is offered through Google Maps to the users so anyone with an Android phone and having the …

Read More »

Apple Tests Ultra-Fast LiFi Technology For iPhone 7

lifi tech

What is Li-Fi Technology? Li-Fi, a next-generation technology invented by Professor Harald Hass of the University of Edinburgh in 2011, is capable of transmitting data via light (i.e. Visible Light Communication or VLC). The thing that makes Li-Fi so compelling is its fastest data transferring speed. “LiFi is a wireless …

Read More »

New Computers can use only Windows 10

Windows 10

Well its actually ridiculous idea the Microsoft made to their Windows support policy. Now the question arises why Microsoft doesn’t want to allow new computers to work with Windows 7 or Windows 8.1 ? Microsoft says new processors will work only with Windows 10. Windows 7 and 8.1 won’t be …

Read More »

Responsive WordPress Theme Freetheme wordpress magazine responsive freetheme wordpress news responsive freeWORDPRESS PLUGIN PREMIUM FREEDownload theme free