Social Engineering Attacks involve manipulating the human psychology through – 01 Phishing, 02 Scareware, 03 Quid pro quo, 04 Tailgating.
Phishing is a form of cyber attack which typically relies on email or other electronic communication methods such as text messages and phone calls.
Two-factor Authentication is used to add an extra layer of security. Quick Bite – 01 SMS verification, 02 Google Authenticator, 03 Reddit.
Burp Suite is a Penetration Tester’s go-to tool when performing a Web Penetration test. Quick Bite – Scope and Intercept, Repeater, Intruder, Voila!
Current Situation – If Database of Aadhaar can be hacked then it may jeopardise the lives of 1.2 billion people. Quick Bite: Most Recent Plight.
A few days back Cisco faced a massive cyber attack by a group of hackers. Quick Bite: The Target, The Vulnerabilities, Safety Measures.
Quick Bite: The basics, Things to know about Application Layer DDoS Attacks, What exactly happens in the attack, Protection against the attack.
Quick Bite: Flaws in the Whats App Security, Fake Whats App Web and the Risks, Whats App Backup Flaw, Safeguarding our Identity.
Quick Bite: Insecure Cryptographic Storage, Security Misconfiguration, Insecure Direct Object References, SQL Injection, Cross Site Scripting.
In this blog post we list down all the pros, cons and, frank observations that you need to know before you decide to take the plunge.