twitter

Twitter Unrestricted File Upload Vulnerability

Security expert Ebrahim Hegazy, Cyber Security Analyst Consultant at Q-CERT, has found a serious vulnerability in Twitter. The Twitter Unrestricted File Upload Vulnerability allows an attacker to upload files of any extension including PHP. When an application does not validate or improperly validates file types before uploading files to the system, called Unrestricted File upload vulnerability.…


cnn website hacked by sea

CNN’s Twitter, Facebook and website hacked by Syrian Electronic Army

A well-known CNN’s Twitter, Facebook and website hacked by Syrian Electronic Army hacker group,aligned with President Bashar al-Assad, who successfully attacked The New York Times, Huffington Post, and Twitter, BBC, National Public Radio, Al-Jazeera, Microsoft, Xbox, Skype and responsible for cyber-attacks against various other U.S media companies in the past. The affected accounts included CNN’s main Facebook…


hire a hacker

CBI arrests Indian mastermind behind Hire a Hacker service on FBI tip-off

For the first time in history, Indian Law Enforcement Agency ‘Central Bureau of Investigation’ (CBI) has arrested a Cyber criminal behind Hire a Hacker service after getting a tip-off from the US Federal Bureau of Investigation (FBI). 33-Year-old Amit Vikram Tiwari, son of an Indian Army colonel and an engineering dropout, who allegedly ran two websites…


ethical hacking

Ethical Hacking

Due to growing of IT hacking activity worldwide, people are becoming more and more concerned about their security system failures. Throughout your business or everyday life you probably came across with such issues as hacking, system security, data protection etc. The ‘cancer’ of modern technology, hacking, is having rapid development and expanding its targets absorbing…


product key recovery

Product Key Recovery

Changes, operating systems, network environments and user expectations usually make programs obsolete much faster than expected. We have inadvertently deleted files or even formatted disk drives and later discovered that critical data was unintentionally erased. Here a Product Key Recovery Program comes to help designed to read and decrypt and/or de-obfuscate the key to its original state.…


encryption

Encryption

The long process of Encryption has had its start since ancient times where no computers and other modern computing facilities were available and our ancestors used this for only character substitution. The process of deciphering was a long and tedious process. In earlier decades when people didn’t have the problem of protecting information of their…