15 May 2017
By now I am sure you have already heard something about the WannaCry ransomware, and are wondering what's going on, who is doing this, and whether your computer is secure from this insanely fast-spreading threat that has already hacked nearly 200,000 Windows PCs over the weekend. The only positive thing about this attack is that...
23 Feb 2017
Ethical hacking is the perfect career choice for those interested in problem solving, communication and IT security. Here's what it takes to become a white hat hacker. An essential guide to becoming an ethical hacker I receive lots of mails asking for guidance on how to become an ethical hacker. Most requests are on how...
29 Jan 2017

What’s the worst that could happen when a Ransomware hits a Hotel? Recently, hundreds of guests of a luxurious hotel in Austria were locked in or out of their rooms when ransomware hit the hotel’s IT system, and the hotel had no choice left except paying the attackers. Today, we are living in a digital…

09 Jan 2017

The ransomware attacks on poorly secured MongoDB installations have doubled in just a day. A hacker going by the handle Harak1r1 is accessing, copying and deleting unpatched or badly-configured MongoDB databases and then threatening administrators to ransom in exchange of the lost data. It all started on Monday when security researcher Victor Gevers identified nearly…

20 Dec 2016
Ransomware has risen dramatically since last few years, so rapidly that it might have already hit you or someone you know. With hundred of thousands of ransomware variants emerging every day, it is quite difficult for traditional signature-based antivirus tools to keep their signature database up-to-date. So, if signature-based techniques are not enough to detect...
30 Nov 2016

For those of you who do not know what the connectors or connections on the back of your computer are called or where they are located… We have created a number of Computer Port Charts and other computer peripheral charts to help you identify the common connectors and ports on the back of your desktop…

25 Nov 2016

You operate a number of online accounts in your internet life. As time proceeds, you even forget their names. Deseat.me is a website where you can delete all the online accounts associated with your Google account. Sometimes, you feel the need of committing a digital suicide i.e. deleting yourself from the internet. For instance, before shifting…

18 Nov 2016

Kali Linux commands cheat sheet. All basic commands from A to Z in Kali Linux has been listed below. A apropos : Search Help manual pages (man -k) apt-get : Search for and install software packages (Debian/Ubuntu) aptitude : Search for and install software packages (Debian/Ubuntu) aspell : Spell Checker awk : Find and Replace…

15 Nov 2016

Very often we share login credentials of our Windows PCs with others, just to let them access it for a limited period of time or due to some other unavoidable reason–and forget to change the password. Without a doubt, it’s a very poor security practice. This also makes us wonder how can we know if…

01 Nov 2016

Linux is quite possibly the only open-source project that has managed to change the world at a very large scale. It is on your phones as Android, it is on the millions of servers that run the internet itself and also it is even on your home router. Hence a source used by millions can be…