Technology has submerged our lives so much that most of our daily activities are dependent on it. And with so many people using it as part of their lives, it has also emerged as a means for criminal
You want be a HACKER? Then
NATIONAL SECURITY AGENCY National Security Agency (NSA), an independent agency within the U.S. Dept. of Defense. Founded by presidential order in 1952, its primary functions are to collect and analyze communications intelligence information and
As a Forensics Investigator one must know what is REGISTRY ? How it will work? How an attacker will use these Registry for illegal activities?
Launched in March, Amazon WorkSpaces is a cloud-based managed desktop service that can be utilized to create virtual desktops that allow end-users to access documents, applications and other resources from their laptops and tablets. Organizations that want to make use of the multi-factor authentication
Today Microsoft has released its Advance Notification for the month of August 2014 Patch Tuesday updates releasing a total of nine security Bulletins, which will address several vulnerabilities in its products, out of which
$10,000 #Bounty for hacking Google Server using XXE!
An interesting toolkit for the Forensics Investigators out there, Facebook Forensics Toolkit is out…
Happy to use online banking? Then be more happy to give away your username and pin number!!!“KRONOS” a new banking trojan released from Russian underground.
Microsoft confirmed a new Zero Day critical vulnerability in its browser Internet Explorer. Flaw affects all versions of Internet Explorer, starting with IE version 6 and including IE version 11. In a Security Advisory (2963983) released yesterday, Microsoft acknowledges a zero-day Internet Explorer vulnerability (CVE-2014-1776) is being used in targeted attacks by APT groups, but the currently active attack campaigns are targeting IE9, IE10 and IE11. read more at thehackernews