Certain websites included in phishing emails successfully lure users up to45 percent
92% Indian youths share personal info online: Says McAfee
As a “risky behaviour”, more than half of Indian teens meet people in real life whom they found online, security …
Not too fast: PM Modi’s office using an average internet speed of 34Mbps
The Prime Minister’s Office (PMO) is running on a speedy internet connection,
FBI Arrested CEO of ‘StealthGenie’ for Selling Mobile Spyware Apps
The Federal Bureau of Investigation (FBI) has arrested the CEO of a
Privacy-focused Tails 1.1.2 Operating System Released
Tails, a Linux-based highly secure Operating System specially designed and optimized to preserve users’ anonymity and privacy, has launched its …
Kali Linux “NetHunter” — Turn Your Android Device into Hacking Weapons
The developers of one of the most advance open source operating system for penetration testing, ‘KALI Linux‘
The Pirate Bay Runs on 21 “Raid-Proof” Virtual Machines To Avoids Detection
The Pirate Bay is the world’s largest torrent tracker site which handles requests from millions
Once More Celebs Nude Photos Leaked : Kim Kardashian and Many More Targeted
So far people have not forgotten about the recent celebrity iCloud hacking scandal, a new wave of nude photographs of …
Yahoo Quickly Fixes SQL Injection Vulnerability Escalated to Remote Code Execution
Yahoo! was recently impacted by a critical web application vulnerabilities which left website’s database and server vulnerable to hackers.
How to Detect SQL Injection Attacks
SQL Injection (SQLi) attacks have been around for over a decade. You might wonder why they are still so prevalent.