Password Alert Chrome Extension to Protect your Google Account from Phishers

As cybercriminals have started using sophisticated phishing techniques in an attempt to hijack online users’ account, Google on Wednesday launched a new Chrome Extension to fight against Phishing. The search engine giant has launched a new Password Alert Chrome extension that will alert you whenever you accidentally enter your Google password on a carefully crafted phishing website that Source: Hacker […]

» Read more

Microsoft Edge: The Windows 10 Web Browser

Meet Microsoft’s replacement to its old web browser Internet Explorer. The Project Spartan Web browser for Windows 10 has now an official name — Microsoft Edge. Yes, Microsoft’s new web browser shipping on all Windows 10 devices, from computers to smartphones and tablets, is dubbed Microsoft Edge. The company just announced in its Build developer conference that Edge is going […]

» Read more

8 Best Android Apps To Improve Privacy and Security in 2015

Just to have a good anti-virus protection app in your smartphone doesn’t mean a complete Security. As Mobile Device Security is comprised of security of different features, such as: Data privacy and security features Permission restrictions for snoopy apps A blacklist for undesired calls An excellent backup capability, in case your smartphone gets deteriorated. As well as encryption Source: Hacker […]

» Read more

The Great… Great… Firewall of China Hijacks Facebook Connect Plugin

From past few days, Internet Users in China are dealing with a weird redirection of traffic nationwide while accessing any website that makes use of connect.facebook.net resource. Great Firewall of China, which is infamous for the Internet censorship by Chinese government, believes to be intercepting the JavaScript module used by Facebook Connect Login, which is meant to allow third-party Source: […]

» Read more

[Video] PayPal Remote Code Execution Vulnerability Demonstrated by Hacker

A critical remote code execution vulnerability has been reported in the eBay owned global e-commerce business PayPal that could be exploited by an attacker to execute arbitrary code on the PayPal’s Marketing online-service web-application server. The remote code execution flaw, discovered by an independent security researcher, Milan A Solanki, has been rated Critical by Vulnerability Lab Source: Hacker News

» Read more

Crazy! Hacker Implants NFC Chip In His Hand To Hack Android Phones

There is a very sleek line between hacking and security. The security used to protect the public could be misused by hackers against the public itself, and one shouldn’t forget that with the advance in technology, the techniques used by cyber criminals also improves. Today, What hackers need to conduct a successful cyber attack? Maybe just a computing device injected […]

» Read more

WordPress Blog Brute Force Flood Underway !!

Recently we have seen on-going global attack on WordPress installations across every web host in existence. This attack is well organized and specially targets the file wp-login.php. Some of the ramifications of this attacks  are 1) Sites are loading extremely slow.2) Unable to login to WordPress Admin Panel.3) Website could even intermittently go down for undisclosed periods of time. So […]

» Read more

Setup HAProxy on CentOS !!!

HAProxy stands for High Availability Proxy, for the High Performance TCP/HTTP load balancing. Installation Steps : # yum -y install wget gcc gcc-c++ autoconf automake make # wget http://haproxy.1wt.eu/download/1.4/src/haproxy-1.4.20.tar.gz /download # tar -zxf haproxy-1.4.20.tar.gz # cd haproxy-1.4.20 # make TARGET=centos # cp haproxy /usr/sbin/haproxy Now take configuration files : # wget http://layer1.rack911.com/haproxy/haproxy-standard.cfg -O /etc/haproxy.cfg # wget http://layer1.rack911.com/haproxy/haproxy.init -O /etc/init.d/haproxy ================================================Sample […]

» Read more
1 2 3 4 5 6 8