In my continuous effort to educate the administrators, on the nuances of WebSecurity, I will be writing about a few tools which makes life easy for the hacker and a nightmare for the administrator. The first step towards any hack is the recon. R... Read more
A few hours ago Anonymous has started a new revolution on Internet called #OpPayPal in retaliation with the arrest of few Internet users who allegedly allowed their resources to be used for the LOIC – DDOS attack on PayPal a few months bac... Read more
Be it the most wanted terrorist, Osama Bin Laden’s death, news of Casey Anthony was acquitted, singer Amy Winehouse’s death or the horrific events in Norway… Hackers and scammers can simply be called opportunist. Tough to believe, but that’s the... Read more
This blog has been inspired by Rebecca Herold’s blog post. In a Gist: A computer user, we shall say the intended victim – receives a call and is asked to verify certain facts about the computer system they own and based on the type o... Read more
This is a quick post about vulnerabilities exposed by a Lebanese hacker who goes by the handle Idhac. According to Idhac, there exist two vulnerabilities in apple.com 1: IFrame Injection (https://consultants.apple.com) 2: Blind SQL Injection (ht... Read more