Our Services

WEB APPLICATION PENTESTING

Your business website is your global identity. Your business depends on web applications for day-to-day operations and customer interaction, from ecommerce platforms to simple intranet sites.

NETWORK PENTESTING

A Network and Application Layer Penetration Test simulates a real-world attack against your network infrastructure

ANDROID APP PENTESTING

In the evolving world of technology, mobile applications are becoming more dominant than ever, this evolution has created a full range of new attacks that were not relevant in the classic web application world.

Don`t Believe us ? Ask them | Reported critical vulnerabilities

Cyber Security Research Articles

UBER Authentication Vulnerability found

UBER Authentication Vulnerability found

UBER Authentication Vulnerability found that allows anyone to change anyone’s Uber account password without any authentication. Vincenzo C., an Italian security expert who is popular on Twitter as @Procode701, has discovered a critical Authentication Vulnerability in UBER  by which anyone can reset the password for any account. The company held the Bug Bounty program which

Read More
Hackers Attacked 100 countries using NSA Spying tool

Hackers Attacked 100 countries using NSA Spying tool

Hackers Attacked 100 countries using NSA Spying tool A group called the Shadow Brokers using hacking tools leaked a global cyber-attack online believed to have been developed by the US National Security Agency (NSA). This attack is believed to be the biggest cybersecurity attacks in recent history. Hackers Attacked 100 countries using NSA Spying tool. The malicious

Read More
Urgent Malware Warning Issued by known Mac App developers

Mac App developers Issued Urgent Malware Warning

Mac App developers Issued Urgent Malware Warning Mac App developers Issued Urgent Malware Warning. Mac security has been going through some difficult times after the warning from Checkpoint to users regarding a first of a kind Trojan spreading in Europe. The latest malicious problem has been found in one of the most important video transcoding

Read More

Employee paid $300,000 for hacking employer

Employee paid $300,000 for hacking employer Employee paid $300,000 for hacking employer. Security Specialists, a former private security officer has been told to pay nearly $319,000 in damages for hacking his employer’s payroll records, so that he can fill the number of hours he had worked hard. The main culprit , Yovan Garcia later hacked

Read More
Retailer Debenhams's Flowers website hacked

Retailer Debenhams’s Flowers website hacked

Retailer Debenhams’s Flowers website hacked Retailer Debenhams’s Flowers website hacked. The news came that Retailer Debenhams’s Flowers website was hacked and up to 26,000 customers, personal data has been compromised. Department store chain Debenhams has issued a statement on the data breach, revealing payment details, names and addresses were potentially taken , which targeted Ecomnova, a

Read More
Intel fixed nine year’s old flaw

Intel fixed nine year’s old flaw

Intel fixed nine year’s old flaw Intel fixed nine year’s old flaw. Yes, after nine years a flaw was detected and patched by Intel. Intel, one of the world’s largest semiconductor chip makers, has come under fire it’s emerged that the company had sold workstation and server chips with a vulnerability that could give a remote

Read More
UIDAI rejects data leak claim

UIDAI rejects data leak claim

UIDAI rejects data leak claim On Tuesday (May 02),UIDAI rejected a report about an online leak of Aadhaar numbers and bank accounts linked to them. UIDAI rejects data leak claim which was claimed by a research report. A research report by a Bangalore-based organization, claimed that almost 13 crore Aadhar numbers have been leaked along with

Read More
App Flaw Reportedly Creates Backdoor Hacking Millions Android Phones

App Flaw Reportedly Creates Backdoor Hacking Millions Android Phones

App Flaw Reportedly Creates Backdoor Hacking Millions Android Phones It has been revealed through a recent study of an internet communication mechanism common in mobile devices that so-called ‘open ports’ are much more vulnerable to security breaches than expected. App Flaw Reportedly Creates Backdoor Hacking Millions Android Phones. Open ports are integral pieces of internet

Read More
Google Facebook $100 million email scam found

Google Facebook $100 million email scam found

Google Facebook $100 million email scam found The tech companies Google and Facebook have confirmed that they fell victim to a $100 million email scam. It was reported that a Lithuanian man had been charged over an email phishing attack against “two US-based internet companies.” Google Facebook $100 million email scam found Evaldas Rimasauskas, a

Read More
SNMP fault affects online devices

SNMP flaw affects online devices

SNMP flaw affects online devices A serious security flaw in the application of the SNMP (Simple Network Management Protocol) allows an attacker to gain control over at least 78 cable modem models. SNMP flaw affects online devices  which gives a green signal to the attackers. SNMP (Simple Network Management Protocol) is used for automated network device

Read More
Karmen low-cost ransomware found

Karmen low-cost ransomware found

Karmen low-cost ransomware found Karmen low-cost ransomware found. Yes, security experts have spotted a new “ransomware as a service” (RaaS) called Karmen from threat intelligence firm Recorded Future. This service permits anyone to set up an account and customize their own ransomware campaign. Ransomware is malware for data kidnapping, an exploit in which the attacker encrypts the victim’s data and demands

Read More
Suspected Russian hackers targeting French Presidential elections

Suspected Russian hackers targeting French Presidential elections

Suspected Russian hackers targeting French Presidential elections It was Suspected Russian hackers targeting French Presidential elections in France by launching a new cyber attack against the campaign offices of the front-runner candidate Emmanuel Macron, claimed by Trend Micro, A Tokyo-based cyber security firm. On Tuesday the report was released by the firm. The researchers doubted

Read More

1.4 Million citizens Aadhaar card leaked

1.4 Million citizens Aadhaar card leaked Though India goes ahead in its digital India, Security practices left behind a huge remark when coming to Indian Document Security. An incident in Jharkhand again seems to have raised some serious questions of Aadhaar’s data-breach vulnerabilities. 1.4 Million citizens Aadhaar card leaked which need to be secured in

Read More
Facebook Twitter Snapchat paying hackers to recover technical bugs

Facebook Twitter Snapchat paying hackers to recover technical bugs

Facebook Twitter Snapchat paying hackers to recover technical bugs In our day to day lives we socialize and interact with many different types of people, including family, friends, colleagues, or even complete “strangers”. Yes, most of the people we meet on social sites are strangers. Many have fake accounts, sending requests to people and people

Read More
Hackers collecting Pre-Hack data using Pixel tracking.

Hackers Collecting Pre-Hack data

Hackers Collecting Pre-Hack data Marketers and Advisers use a simple trick to track web users and email recipients. It is email marketing. This also been abused by cyber criminals and online spies to collect information on possible targets or to improve the efficiency of phishing attacks, both mass and targeted in scope. Hackers  collecting Pre-Hack

Read More
Protect Your Device From Hackers

Protect Your Device From Hackers

Protect Your Device From Hackers First thing to keep in mind that hacking a system for unauthorised access that does not belong to you is an illegal practice, whatever intention it may be. This is not the first time when any hacker has been watchful, we have seen many more cases in which hackers have

Read More
Phishing Attack Affects Browser

Phishing Attack Affects Browser

Phishing Attack Affects Browser A Chinese security researcher has revealed a scary phishing attack that is almost impossible to detect in web browsers like Chrome, Firefox, and Opera. The attack uses unicode characters in domains that look exactly like the common ASCII characters. For example, “xn--pple-43d.com” is equivalent to “аpple.com”. This Phishing Attack Affects Browser. Punycode is

Read More
Hackers announces NSA’s powerful Windows hacking tool

Hackers announces NSA’s powerful Windows hacking tool

Hackers announces NSA’s powerful Windows hacking tool Hackers announces NSA’s powerful Windows hacking tool .The Shadow Brokers, a hacking group, who previously stole and leaked a portion of the NSA hacking tools has just released a collection of spy tools that is allegedly used by the National Security Agency online. On Friday, the group published the

Read More
Five Prisoners hacked prison network

Five Prisoners hacked Prison Network

Five Prisoners hacked Prison Network Official Inspector General of the State of Ohio reported a 50-page investigative report of the incident which now came in public domain, that took place back in 2015. It came to know that Five Prisoners hacked Prison Network. According to the reports, five prisoners from the Marion Correctional Institution (MCI)

Read More
Indian Election Commission throws open challenge

Indian Election Commission throws open challenge

The  Indian Election Commission throws open challenge to hack its electronic voting machines (EVMs). This step is being taken by different political parties due to some rise of allegation, which claimed that machines used in UP elections only voted for BJP. The opposition parties have also demanded that paper trail of voting should be re-introduced in the

Read More
Unique Ransomware Vulnerability Attack

Unique Ransomware Vulnerability Attack

Unique Ransomware Vulnerability Attack In the Past few days, you might have heard about various news of hackers using malicious ransomware forcing users to pay huge amounts of money but  today’s scenario is something different. Today, we bring you a unique kind of ransomware which forces its victims to make a high score of at

Read More
Smartphone Update Vulnerability Found

Smartphone Update Vulnerability Found

Smartphone Update Vulnerability Found A Google Project Zero researcher, Gal Beniamini has found some vulnerabilities including a remote code execution in Broadcom’s Wi-Fi system-on-chip (SoC) which if exploited can allow attackers to compromise Smartphone devices like iPhone, Samsung, and Google Nexus. Smartphone update vulnerability found. Broadcom’s Wi-Fi chips are used in a number of well-known devices and any

Read More
North Korean hackers breached overseas banks

North Korean hackers breached overseas banks

North Korean hackers breached overseas banks North Korean hackers breached overseas banks to create a network of accounts to move around embezzled funds. CNN reported on Tuesday that “Funds from the operation are most likely being used to finance Pyongyang’s nuclear weapons development”. According to Kaspersky, a Russian cybersecurity firm, North Korea is linked to cyberattacks on

Read More
Anonymous hacks ISIS website; infecting users with malware

Anonymous Hackers Hacked ISIS site

Amaq, the official news agency of ISIS or Daesh terrorist group informed its users about a huge compromise in the security of its website. They said Anonymous Hackers Hacked ISIS site which is now infecting thousands of users. When visiting the site, the following message keeps appearing:- “The site ahead contains malware, and that attacker might attempt to install

Read More
Scareware scammers lock iOS Safari

Scareware scammers lock iOS Safari

Scareware scammers lock iOS Safari Scareware scammers lock iOS safari to extort ransom money from iOS users. As researchers Andrew Blaich and Jeremy Richards at the San Francisco- firm explain in a blog post based mobile security: “The user reported that he had lost control of Safari after visiting a website and was no longer

Read More

Sensitive Information Leaked Publicly

Sensitive Information Leaked Publicly “Think twice before you click” We often shared to computer users to help them protect from unreliable links and malware infected email links. Wait a moment and look at the pop-up “Do not show this message again”. This is a warning message which we face daily. It is trying to say

Read More

How to generate Word list using Crunch ?

How to generate Word list using Crunch ? How to generate Word list using Crunch ? In our previous blog, we discussed about how to hack or recover any unknown passwords. In this blog, we will tell you how to generate word list using Crunch. In password cracking, we often need to use a word

Read More
Crack Any Password And Identify Unknown Password

Crack Any Password And Identify Unknown Password

Crack Any Password And Identify Unknown Password Crack Any Password And Identify Unknown Password. Password Cracking refers to guess or crack passwords to gain access to a computer system. It is a common approach to identify an unknown or forgotten password. Password crackers will usually use a variety of tools, scripts or software to crack a

Read More
USG Protects Hacking Attacks

USG Protects Hacking Attacks

USG Protects Hacking Attacks USG Protects Hacking Attacks. Do you ever feel the need for a hardware firewall for your USB ports? USG v1.0 is one such effective device that users can use to identify the maliciousness stored on suspicious USB drive. It is fully open firmware and two STM32F4 microprocessors make this possible. So,

Read More
Student Hacked Professors’ Emails

Student Hacked Professors’ Email

Student Hacked Professors’ Email Student Hacked Professors’ Email. A University has expelled a student for hacking their several Professors’ email. Technion Institute of Technology, a public research institute based in Haifa, Israel, revealed the disciplinary actions it took against the student to Ynetnews: “We are taking this case very seriously, as it is very unusual. The student, who

Read More
US Air Force documents backup leaks

US Air Force documents backup leaks

US Air Force documents backup leaks US Air Force documents backup leaks. Sensitive information of United States Air Force got exposed publicly on Internet. It allows anyone to use them without any authorisation and password. Only via web connection anyone can access it. Security researchers at MacKeeper discovered that they found gigabytes of files on

Read More
Popular Smartphone Infected with Malware

Popular Smartphone Infected with Malware

Popular Smartphone Infected with Malware Want to buy a new android Smartphone? Or Already bought new android Smartphone? Do not expect it to be a clean sheet. Popular Smartphone Infected with Malware.  Pre-installed android malware found in 36 Smartphone’s. Popular manufacturing companies like Samsung, LG, Xiaomi , Asus, Nexus, Oppo and Lenovo distributed by two

Read More
Fortune 1000 Companies Vulnerability

Fortune 1000 Companies Vulnerability

Fortune 1000 Companies Vulnerability Fortune 1000 Companies Vulnerability. A recent report reveals about the Fortune 1000 Companies Face Data Breaches. This Fortune 1000 company suffer twice the amount of data breaches their peers. BitSight’s latest report revealed “How Secure Are America’s Largest Business Partners? and Rating Cybersecurity Performance of Fortune 1000,” companies which are part

Read More
DNA Digital Data Storage

DNA Digital Data Storage

DNA Digital Data Storage DNA Digital Data Storage. Usually , You all have heard about computer storage devices like floppy disks, USB flash drives, memory cards, memory sticks, tape cassettes, zip cassettes, computer hard drives, CD’s and DVDs etc Have you ever heard about DNA storage? Yes, Researchers are discovering and investing lots of efforts into new storage

Read More
Bypass Google’s ReCaptcha v2 anywhere

Bypass Google’s ReCaptcha v2 anywhere

Bypass Google’s ReCaptcha v2 anywhere We can easily Bypass Google’s ReCaptcha v2 anywhere on the web . Yes, you heard it right. ReBreakCaptcha is a new bypassing technique for Google ReCaptcha v2. The three steps of ReBreakCaptcha :- Audio Challenge Recognition – Converting the audio and sending it to Google’s Speech Recognition API. Verification –

Read More
Scam iTunes Receipt Found

Scam iTunes Receipt Found

  Scam iTunes Receipt Found Scam iTunes Receipt Found.  Want to go for a Movie?  Everyone loves to.  But before booking the Movie Ticket you should check whether it’s legit or not. Yes, you heard it right. A new campaign started a fake iTunes for buying movie tickets online and taking Apple users sensitive information.

Read More
Web mail disasters

Web Mails disasters

Web Mails disasters Web Mails disasters. Checking mails is the regular schedule in everyone’s daily life. But one hacker will think who else has read his emails. Sounds Strange? It’s obvious. If you used a web based email services like Gmail, Outlook365 , the answer can be shocking. Have you ever seen after reading your

Read More
Android Malware to hack Bank Accounts

Android Malware Hack Bank Accounts Credentials

Android Malware Hack Bank Accounts Credentials Android Malware  Hack Bank Accounts Credentials. Few Days back a New Android Banking Malware ESET discovered on Google Play was spotted. Recently one more Malware was spotted which is targeting banks and taking their important credentials. Through investigation, threat has uncovered its code which was build using source code was

Read More
Ransomware targets Mac

MacOS under Ransomware attack

MacOS under Ransomware attack MacOS under Ransomware attack. Crypto-ransomware is more popular nowadays and is more common amongst cybercriminals. Mostly it affects windows systems  but also affected Linux or macOS in 2016 like  KillDisk affecting Linux and KeRanger attacking OS X. We have seen a new Ransomware campaign for Mac, last week. This new ransomware, written in Swift, is

Read More
SBI Vulnerability Exposed

SBI Vulnerability Exposed

SBI Vulnerability Exposed SBI Vulnerability Exposed….A One-Time Password (OTP) is an automatically generated numeric or alphanumeric string of characters that authenticates the user for a single transaction or session. An OTP is more secure than a static password, especially a user-created password, which is typically weak. OTPs may replace authentication login information or may be

Read More
Google Disclosed Microsoft vulnerability

Google Disclosed Microsoft Vulnerability- Microsoft’s Delay Their Latest Updates

Google Disclosed Microsoft Vulnerability- Microsoft’s Delay Their Latest Updates                 Google Disclosed Microsoft Vulnerability and in the eleventh hour Microsoft decided to delay their latest updates. All Windows users are so accustomed on getting updates on windows gadgets and waited for their latest updates to come on public…On Second

Read More
hacking your voice

Hacking your voice to perform social engineering attack

Hacking your voice to perform social engineering attack Hacking you voice is real and possible as Hackers can use photoshopping voiceover . An engineer’s dream is “project voco” where the software allows the controller to edit and insert words into an audio recording without bringing back the original vocalist back to the studio. Hacking your

Read More
mongo db databases

Mongo DB Databases hijacked

Mongo DB Databases wiped out Mongo DB databases had been kidnapped by the hackers. The hackers have deleted mongo DB databases from the company servers and are demanding ransom for safely return of the information. The victims are hospitals, small businesses and educational institutes. Nearing 27,000 database could be hacked. There are security measures built

Read More

WiFi phishing attack

WiFi phishing attack – You can be the next target? Wifi phishing attack is the next level attack even though the wifi in modern days are secured with wifi Protected Access II (WPA2) a security protocol which has a strong cryptographic hash function to protect the pre-shared key (PSK). During a penetration testing it is

Read More
virtual reality

Virtual Reality – Are we thinking of Security?

Virtual Reality and its security Virtual Reality making it big in the market and every individual is keen to use it.  What we need to worry is its security? It is not a big target for hackers still now. Bulky prototype virtual reality devices were being tested in labs as early as 1960, but there

Read More

Dark Web

Dark Web – The internet beyond Google   Dark Web which is indeed a very interesting topic to talk about as due to recent hacks and terrorist activities which took place took the help of the dark web. In this article, we will explain how one novice interest and curiosity can be dangerous in the

Read More
ransomware

Ransomware Top 10 list of 2016

Ransomware Top 10 list of 2016 Ransomware attack in corporate houses in 2016 was very common. Some ransomware attacked the critical infrastructure of organizations. Ransomware attacks panicked the entire corporate world. There are hundreds of ransomware families which came into lam light after they attacked many organizations. Some of the most dangerous ransomware of 2016

Read More

Internet Safety Manual for family & friends to support digitalization in India

Internet Safety Manual for family & friends   Internet safety manual or common hygiene to be maintained by common people while they are on the internet is really missing in India. We at Indian Cyber Security Solutions have taken the major step to educate the common people how to use internet safely. Do`s and don’ts

Read More
Hacking Sony security cameras

Sony IP Cameras are vulnerable to be Hacked

Hacking Sony security cameras by backdoor attacks   Hacking Sony security cameras took the industry by a storm. If you have a Sony IP based camera installed at your house or office premises you must be aware of this fact.   SEC Consultant researchers have found out a real flaw (0-day vulnerability) in Sony IP

Read More

IOT Devices and Cyber Security are major concern for the future

IOT devices are more vulnerable to hack   IOT devices and Cyber Security goes hand in hand. Every day there is increase in devices which are being connected to internet. Development in the field of machine learning and artificial intelligence had increased dramatically due to increase of interconnected devices and growth of IOT devices in

Read More

Ransomware attack on hospital forces the hospital authority to cancel 2,800 operations and completely shut down the system.

Ransomware attack on Hospital – New Blackmailer Game   Ransomware attack on hospitals had increased in recent past. With Locky Ransomware attacking the healthcare industry recently. Different industries had been attacked in India and abroad with ransomware. Numerous cases had been registered in India with Bangalore based IT companies are falling pray to ransomware. To

Read More
Russian central bank hacked

$31 million hacked from Russian Central Bank

Russian Central Bank Hacked – $31 million stolen from Bank Russian central bank hacked as millions of dollars of customers were stolen on Friday as disclosed by bank authority. This is the latest example of a planned cyber-attack on the financial institutions. After the Russian central bank hacked the officials came out with a stunning

Read More
pacemaker hacking

Pacemakers are the target for hackers

Hackers can target pacemakers Hackers can target pacemakers remotely as researchers have found security flaws in the device that can be exploited and hacked. Hackers can target the pacemakers remotely from a distance by sending malicious codes which can trigger fatal shocks can cause death. Using common equipment’s the researchers were able to find loopholes

Read More
winter training

Router hack makes 9,00,000 Germans go offline

Router hack makes 9,00,000 Germans go offline   Router hack forces 9,00,000 Deutsche Telekom customers offline on this Sunday and Monday.  Serious attempts were made to compromise  broadband routers and turn them into a botnet. Zyxel and Speedport router hack by malicious hackers as the vulnerabilities were exploited. Routers were coded to transform into botnet

Read More

Android Banking Malware uses social engineering to bypass battery saving process

Android Banking Malware  uses social engineering to bypass battery saving process   Android banking malware can stay connected with its control servers even after the android device is off.     Flaw in Doze functionality in Android     Doze is a power mode that activates once the android device haven’t been interacting with the

Read More
IPhone passcode bypass

IPhone passcode bypass – IOS vulnerability

 IPhone passcode bypass   IPhone passcode bypass is not new as attackers had been attacking your IOS devices and accessing your private data. IPhone users were exited as the new IOS 10 from Apple would prevent IPhone passcode bypass. Hackers got better of it and still can bypass the passcode of IOS 10.    

Read More
android trojan

Million Android users downloaded Trojan from Google Play Store

Android Trojan downloaded from Google Play Store   Android Trojan is now being downloaded by millions of users from the Google Play Store.  The Russian Security Agency “Doctor Web” found the malware popularly known as Android.MulDrop.924. The new Android Trojan disguise itself as games and other apps in Google play store.  The Android Trojan can

Read More

Pupy RAT

Pupy a Killer RAT   Pupy is an open source Remote Administration Tool which have an embedded Python interpreter. It is a cross platform based interpreter which allows to load Python packages from memory and access python objects. As it uses reflection dill injection in windows leaving no traces of it on the disk. Due

Read More
facebook spam

Facebook spam – New way to hack Android Devices – Be aware

Facebook spam to hack your android devices   Facebook spam with a news of DONALD TRUMPH dead in a heart attack is new way to hack into your android device.   What it Does ? Victims if click on the Facebook spam post are redirected to new page and the phone starts vibrating. Victim is

Read More
sms phishing

SMS phishing scam to hack into Apple ID

SMS phishing scam to hack into Apple ID   SMS phishing also known as smishing is not new to the world of technology. We at Indian Cyber Security Solutions think that this SMS phishing scams are increasing in huge numbers and victims have no clue how to be safe. In this article today we will

Read More
Tesco bank

Tesco Bank Hacked

Tesco Bank Hacked – 20,000 Accounts are compromised by a Black Hat Hacker   Tesco Bank Hacked as over 20,000 bank accounts of customers where compromised in United Kingdom. After the Tesco bank hacked bank authority had frozen all online transactions from those accounts. Tesco bank hacked had forced the bank authority to implement a quick contingency

Read More
DDoS attack

DDoS attack

DDoS attack set Liberia out of internet- culprit Mirai Botnet   DDoS attack had put the whole country of Liberia under distress, when people of the country could not access to internet. The culprit used Mirai malware to shut down the internet of insecure IoT devices. Mirai malware is remotely controlled by the bots, the systems

Read More

Linux is hacker’s first choice

Linux is hacker’s first choice Linux is hacker’s first choice as it is an operating system that is based on open source. By open source we mean, the user or the programmer can use source code that has been applied to design Linux as per programmers or developers requirement. Hence one can easily modify the

Read More

Whatsapp Hacking – Your Privacy is at STAKE !!

Whatsapp Hacking – Your Privacy is at STAKE !! Whatsapp Hacking is an interesting topic where all are interested to know in details. Today we will unleash the real details and how a hacker can conduct a watsapp hacking remotely and you will not be aware of it. Black hat hackers are always  one step

Read More

Top 5 hacking software

Top 5 hacking software – Be a Hacker Top 5 hacking software which are available for free.  You can use them without paying a single rupee. These hacking software’s are used all over the  globe. IT security professionals do use them. There are many paid and licensed version hacking software used by MNCs but it

Read More
Icloud hacking

Man Hacked Apple iCloud & Gmail accounts of 30 celebrities in Loss Angeles.

Email Phishing scam does the trick for the Hacker. Email phishing is a very old technique used by hackers to get the log in credentials of the victim. On September 23rd 2016 a man hacked into iCloud and Gmail accounts of 30 celebrities in Loss Angeles.  As per the report the hacker conducted the email

Read More
android ransomware

Android Ransomware Attack the new terror

ANDROID RANSOMWARE USING PSEUDORANDOM PASSCODE Android Ransomware is not new to the world and it had infected many android devices in the recent past but a new version of Ransomware is much more powerful. Attacks on android devices had increased heavily as more sensitive data is now stored in the small portable device which is

Read More
us election

FBI confirms hacking attempts on U.S election system

Hackers targeting the election system of United States US Election system is under contentious scanning an efforts of the hackers to hack into it as per FBI. Over the last one month the voter registration database of states of US is under cyber attack. Mr. Comey (Director FBI)  did not say whether those hacking attempts

Read More
website hacked

Armenian hackers hacks into Banks and Military data of Azerbaijani

Armenian hackers leaked personal data of government officials and  also defaced embassy sites to celebrate 25 years of independence Armenian Hackers from MMCA – Montel  Melkonian Cyber Army claim to have hacked into Azerbaijani banks, military and police servers. They have leaked several confidential data and made it public just to celebrate their 25th independence.

Read More

Phishing scam targets Godaddy customers

 Phishing scam targets Godaddy customers Phishing scam to steal user’s personal data or financial credentials Phishing scam to steal user’s personal data or financial credentials is nothing new and this time GoDaddy users are the victim of it. With each day the cyber scammers are coming up with more inventive and compelling ways to out

Read More

ATM Hacking in Thai Banks

ATM Hacking in Thai Banks ATM Hacking in Thai Banks!!!! A staggering 12.29 million Baht ($350,000) stolen. So after Japan, it’s Thailand. The hacking spree continues. Just a couple of months back cyber criminals had successfully stolen 1.44 billion Yen ($13million) from more than 1400 ATMs in just over 2 hours and fled from the

Read More
Unreal Tournement Hacked

Unreal tournament gaming hacked, Epic gaming forum hacked

Unreal tournament gaming hacked Unreal tournament gaming hacked, Epic gaming forum hacked!!!! Till now the gamers have ‘hacked’ their way through the game but now the gamers themselves have been compromised by a real band of hackers. It seems that more than 8, 00,000 forum accounts of Unreal Engine and its creators Epic Games’ forum

Read More

Locky Ransomware threat in Healthcare Industry

Locky Ransomware threat in Healthcare Industry Locky Ransomware, as it is called is causing great adversities for health centres and hospitals in the United States. Yes, malicious actors and scammers are employing the highly advanced Locky Ransomware there which penetrates infecting the entire system in a very short span of time by using the file

Read More

Volkswagen Vulnerability found in VW Cars

Volkswagen Vulnerability found in VW Cars Volkswagen vulnerability this time!! Even cars of the standard and stature of Volkswagen cannot evade vulnerability from hacking these days. Such is the susceptible cyber security scenario in the world at the moment. These kind of hacks along with system compromise, data breaches and other form of cyber crimes

Read More
Android Devices

Android devices vulnerable to Linux Kernel flaw

Android devices vulnerable to Linux Kernel flaw Android devices running Android 4.4 KitKat and higher are vulnerable to a recently disclosed Linux Kernel flaw and guess what even the latest, updated and improved technology of Android Nougat Preview also seem to have not been able to evade it. This vulnerability is estimated to be present on

Read More

Dota 2 Forum Hacked

Dota 2 Forum Hacked Dota 2’s (Defense of the Ancients 2) official forum has suffered a serious setback with close to 2 million registered user’s personal information being stolen. Dota 2 is a multi-player online battle arena video game. E-mail and IP addresses, usernames, user identifiers and hashed passwords were accessed and stolen. This massive

Read More
Android Security

Push notification enhances android security

Push Notification Enhances Android Security Push notification is Google’s next endeavour in keeping its security as tight as possible in Android phones. After the recent announcement of already implementing some vital security features in the next Android OS version Android Nougat it is now on its way to bring to the table a new feature

Read More

Israeli Hacker Hacks Again

Israeli Hacker Hacks Iranian ISP ‘Daba’ Israeli Hacker does it again, Iranians exposed to privacy breaches, yet once more!! The login credentials of thousands of online registered users of an Iranian Internet Service Provider (ISP) called Daba have been leaked earlier today by a hacker operating by the name of Zurael_sTz after who was able

Read More
ransomware

Combating Ransomware

Combating Ransomware Attack – Europol takes initiative to fight back Ransomware has been something that has been bothering and affecting individuals and companies very badly for quite some time now. It’s a type of malicious software that is designed to block access to a computer system until a sum of money is paid as deemed

Read More
Gmail security

gmail hacking

Gmail Hacking and Security Tips Gmail hacking is very common and this is how many underworld hacking communities are gaining access to millions of gmail accounts. Google had taken many steps but it seems that hackers are always one step ahead of them. Due to lack of awareness many high ranked government officials and high

Read More
Android Nougat Security review

Android Nougat

  Android Nougat-Will it be ‘sweeter’ than Marshmallow Google is raising the bar with the latest version of its mobile operating system named Android Nougat after so many names were suggested for the same from all over the tech world and social networking sites following the trend of keeping its name after a sweet which

Read More

Web Application Firewall Testing

Test your Web Application Firewall NOW before its too late   A form of firewall covering the control of input/output & access from, to, or by an application or service is called application firewall or in full term web application firewall (abbreviated as WAF). They are of two types i) Network based and ii) Application

Read More

Do not leave it to your assumption

Show Buttons
Hide Buttons