Author: Manindra Simhadri
-
How OWASP Top 10 Will Protect Web Application
When you look in the requirements of any information security analyst OWASP top ten will be there for sure. Firm knowledge on OWASP top 10 OWASP stands for Open Web Application Security Project. This is a non-profit organization with the mission to make web securely visible. Web is made to be available not secure so…
-
How to access Dark Web or Deep Web for noobs
You might be hearing these two words dark web and deep web quite for a while. Both are almost same but not same, just almost. You cannot access dark web from a normal browser you are using like from google chrome or Firefox. Here in this tutorial I am going to share you how to…
-
What is Supply Chain Attack: The Attack That Keeps Every WordPress Site Vulnerable
There are many attacks that are happening on the internet. Each attack belongs to some type of attack family. One of my friend works in PayPal and he said PayPal alone gets 3000 attacks per second and imagine how many attacks are carried out worldwide. In this article I am going to explain to you…
-
How to find IP address of anyone
To attack anyone the first thing you must know is to find the IP address of the target. There are many tools that help to find IP address but here in this tutorial I will help you with the tool called IP puller or IP logger. IP logger grabs the IP address of the victim…
-
Good and Bad about high RAM usage of Antivirus
For any PC antivirus is one of the programs you must install as soon as your operating system installation is done. It gives you high security that needed from different threats and malwares, but it doesn’t mean that antivirus will stop each threat that’s there in space.
-
What is Exploit? Everything ethical hacker needs to know about
If you are some guy that’s working in IT or the one who is interested in programming or information security, you might be hearing this exploit word hell lot of times and in this for the last time let’s clear it like the way never. By the end of this article you will understand what…
-
Hackers using Facebook messenger to mine cryptocurrency
With the increase of interest in cryptocurrency, there is also increase in the malware that is spreading to earn that digital money. Recently Trend Micro discovered a virus more precisely a bot which is spreading through Facebook messenger. Even though this is observed in korea as it is one of the most using instant messenger…
-
Hackers using wordpress websites to mine cryptocurrency
Everyone is behind cryptocurrency. It doesn’t matter on which coin you are investing, all cryptocurrencies values are getting skyrocketed. There are people buying them and investing in them but some nerds, geeks are into different ways to earn those cryptocurrencies. Recently website administrators used javascript to use client computing power to mine bitcoins and some…
-
Captcha Plugin Installs Backdoor in 3 Lakh wordpress websites
WordPress is the most using Content Management System in the world. 75% of the web is made up of wordpress. One of the reason for its huge success is the support of plugins which takes simple wordpress website to complex web application. Recently Captcha plugin got removed from their wordpress repository for its backdoor fraud.…
-
Everything you need to know about Block Chain Technology
In this glorious 2017 everyone is talking about bitcoins, digital currency, crypto-currency, block chain and many more things and these are some of the terms that are one of the more searched in the internet. Without due let’s jump into the topic What is Block Chain? Block chain is a distributed de-centralized system. Just understand…