Ever thought of how hackers steal your critical data or credentials via social engineering or phishing scam? Let’s see in this tutorial how hackers can steal your valuable data via a phishing scam. The first question that pops in mind is, what is phishing?
All the information related to the new Nvidia’s RTX 30 series GPU alongwith the RTX 3060 leaks and rumours.
Java is the most commonly used programming language with most of the devices using it. These are the most commonly asked interview questions on java you should know.
The most important algorithms which are must to know for every computer programmer or software engineer especially when they are going for an interview
So this weekend, I participated in a CTF challenge that was organized by GirlScript Goa. It was among the beginner level CTFs, so I was able to solve all but one problem. Nonetheless, I came in 3rd in this and here is my writeup for the solutions of the challenges that I solved. Miscellaneous Challenges […]
Don’t let ANYONE else use your charger. Researchers at Tencent lab has found malware and named it BadPower than can potentially melt or blast your phone by just charging.
The second phase of ethical hacking and penetration testing involves two terms that are Vulnerability Scanning and Enumeration. Scanning involves taking the knowledge discovered during reconnaissance and using it to look at the network
Twitter accounts of top profiles like Bill Gates, Jeff Bezos, Elon Musk and many others got compromised due to a massive security breach and made people to lose over couple of thousand dollars in the form of bitcoin
An undetectable malware with capability to steal SMS to bypass OTP and buy premium service subscription and drain the victim’s wallet. 17k such apps removed so far.
Google has released an Open Source Web Vulnerability Scanner “Tsunami” which automates a lot of tasks for networks with thousands of devices.