In this article we are going discuss about Encoding vs Encryption vs Hashing.
In this article we are going to talk about sock puppets and how to create one
In this article we are going to see about Man In the middle attack and types of MITM attacks
Cross-Site Request Forgery also known as CSRF, XSRF, sea surfing, the one-click attack is another common web application web vulnerability. It tricks the user’s web browser to do the things it doesn’t intend to do. The attacker tricks the victim browser into generating requests to a website that performs certain actions on behalf of the […]
In this article we’re going to learn about cross-site scripting
In this article we are going to talk about Remote Access Trojan (RAT)
In this article, we’re going to talk about password attacks. Nowadays everyone uses passwords to keep their file protected and safe. But is your password really secure? On websites or even in your operating system when the password is created the password got encrypted using one-way hash algorithms. these algorithms are irreversible that makes your […]
Nowadays Facebook is one of the most popular social media websites in the world. The more it became popular the more ways hacker finds a way to hacking Facebook account. In this article, we’re going to see 5 ways of hacking Facebook. 1. Using Tabnapping Tabnapping is a technique which is involves phishing and scripts, […]