An Indian security researcher Bipin bragged a bounty of $31k from the tech giants facebook after the admitted that there was a blind SSRF in the internal systems.
Maze Ransomware not only encrypts the files, but it also adds another way to extort victims who are unwilling to pay. To have more leverage over the victim, Maze also sends the data to the attacker.
An Indian hacker/security researcher name Bhavuk Jain has earned $100,000 (around Rs.75.3 lakh) from Apple for finding and reporting a bug in the “Sign in with Apple account authentication”. It was one of the major zero-day exploit submitted to Apple in recent years.
IPv4 vs IPv6: Where did IPv5 go?
Every time you see some network settings, there is IPv4 or IPv6. As you can guess, the previous versions are long in the past (TCP/IP v1,v2, and v3). But why is it IPv4 vs IPv6 instead of the 5th version vs the 6th? How is that the IPv4 from the 80s is still around? Let’s find out!
There’s no fixed way to start hacking, and you need not be of a computer science background to learn this. But there are some basic knowledge and things you need to know in order to become one.
Here are 3 main things every Beginner Hacker should know about. These tips will get you started and are very important.
TCP vs UDP: Unfolded
Before jumping to TCP vs UDP we must understand what TCP and UDP are. TCP and UDP are protocols that are a part of the transport layer in the OSI model. Both of these protocols are used for sending packets over the internet. They are built over the Internet Protocol(IP).
Unacademy-one of the India’s largest Education-technology based startup backed by investors facebook,blume ventures got hacked and its data being sold on dark web at $2000. Data of nearly 22 million users have been said to be leaked in this hacked.
As this global pandemic spreads fear among everyone, more and more companies are having virtual conferences to continue their business’. More often than not, these are using the Zoom Video Communication, or more commonly Zoom app for this. You might have used Zoom for your online classes or such a conference. But how secure is this infamous application? Keep reading to learn more.
Who is a Hacker? Types of Hackers
Complete information about a hacker with their skills, how to be one of them, their capabilities, there day to day duties and the types and the categories of hackers. A hacker is someone who has all the knowledge of how a program, software, application, database, server is constructed and he knows how to take our flaws from it.
OSI Model is used to understand how data is transferred from one computer to another in a computer network. To accomplish successful communication between computers or networks of different architecture 7 Layer of OSI Model was defined consisting of Application, Presentation, Session, Transport, Datalink, and Physical layer.