Session Hijacking – VAPT Vulnerability Detection & Prevention After the development of a web application for a client, I had requested our security experts group to carry out...
[Thunderbird ver78]: Cannot sendmail: Peer using unsupported version of security protocol One of our client who used Thunderbird as their email client suddenly complained of cannot send emails. with the below...
WordPress Injected With Spam Links? Diagnose & Protect your site Today my client sent an email stating that his WordPress site has been hacked. After spending few hours in diagnosing...
How to Check if Bash has Shellshock Vulnerability? Shellshock vulnerability was found during the late 2014 (to be precise, the impact was posted on CVE-2014-6271 on 24 September...
50 Things To do After Installing WordPress! [A Comprehensive Guide] WordPress is an amazing platform to build your website or a blog. It’s powerful, easy to install, loaded with features,...
Why Changing WordPress Admin URL is a Better Idea! Without a doubt WordPress is the most widely used CMS out there. Well, the fact does not stop there – according...
A browsing site with ‘white’ standards-WhiteHat Aviator is a new honest chap on the block I am just like you. I am no Loreal India’s brand ambassador trying to dupe you by claiming so. I...
Knock knock, I know who’s there – Introducing Peeple! CES 2015 has presented us with a lot of new innovations. For enhancing security, here’s Peeple, your own smart peephole....
Burn and churn out a new number – Burner for Android and i OS In all your phone owning life, “Where did you find my number?” is a staple question which might have crossed...
This blog post will self-destruct in 5..4..3.. or at least if it was powered by Digify And Mr. Hunt, the next time you go on holiday, please be good enough to let us know where you’re...
Are you being stalked in the name of advertisements? Facebook is keeping an eye out on you- Beware! Any lexicon would define Stalking as an act of pursuing or approaching someone or something stealthily. Stalking is a crime...
How to Identify and Protect Your device against Malicious Android apps? Its exploitation all around and this did not stop with system software, browser extensions, online forms etc. Now, the malware...
SSLPatch fixes iOS 7’s SSL/TLS security bug – Need not upgrade to iOS 7.0.6! By now, everyone who owns iPhone might be aware of the SSL/TLS security bug in iOS 7. At the same...
Be Alert, Browser extensions are Spying you! – Act now! Are you using too many browser extensions? Then you must go ahead and read this article. Last week, Internet was...
Microsoft launches safety app ‘Guardian’ for Windows Phone users in India With the wake of conscious on security issues for women in India, the government recently planned on ‘panic buttons’ in...
Firefox 26 is available for your Android Phone! Download now! Firefox is a web browser that was intended for Windows Desktops and Laptops. But in recent years, it is becoming...
Adblock Plus can be used to block even more, not just ads! Would you not be happy if you get tailored results? Suppose you want to buy a laptop and search the...
[Linux] :Top 12 security features to Enable in SSH server ! A couple of ways you can find to access a shell (command line) remotely on most Linux/Unix systems. One of...
[Linux]: How to Hash Known Hosts Files of ~/.ssh/ directory During connecting to a SSH server, the client stores the few details like Server’s Hostname, IP Address and Host key...
[Linux] : How to stop automated bot based SSH attacks ? I’ve seen many a times in my LogWatch report about “Refused incoming connections” from a number of IP’s. These are may be...