How to Use Two-Factor Authentication in 2021 with Ease

While many people are somewhat confused about “2-factor authentication (2FA)”, which is also known as 2-factor verification, it’s a really easy concept to understand. Think of your bank’s debit card:…

5 Basic Steps To Protect Your Personal Data Online

Even though news about another celebrity’s hacked cloud storage – from Jennifer Lawrence to Hilary Clinton – appear regularly, many people think their personal information is not attractive to cyber…

OWASP – API Security – Top 10

OWASP API security (https://www.owasp.org/index.php/OWASP_API_Security_Project) is an open source project which is aimed at preventing organizations from deploying potentially vulnerable APIs. APIs expose micro services to consumers, making it important to…

[Metasploit] Upgrading Normal Command Shell to Meterpreter Shell

The Metasploit Framework contains a suite of tools that you can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection. One of the best feature of Metasploit…

4 Ways To Protect Your MyBB Forums

MyBB is one of the most widely used open source, intuitive, extensible, and incredibly Forum software out there. The software is recognized for its security as well as it is…

Generate Random Password in Linux – Command Line

There are plenty of ways to make your password secure, but most people just don’t bother. It is much easier to set a password that is easy to remember, but…

The Top Security Vulnerabilities

Unvalidated data Never trust anything you get from a Web browser. The browser is completely outside of your control, and it’s easy to fake values like the HTTP referrer. It’s…

Top 5 Vulnerability Research Websites – #CyberSecurity

1) National Vulnerability Database https://nvd.nist.gov/ NVD i.e. National Vulnerability Database is a product of NIST (National Institute of Standards and Technology) Computer Security Division which is sponsored by DHS(Dept. of…

Hack Android using Metasploit without Port Forwarding over Internet – 2017

Today we’ll discuss about the post exploitation attack using metasploit framework to hack any Android Device without any port forwarding. Generally you can get easily reverse TCP connection with Meterpreter…

10 Tips for securing the wireless network

1. Always Use the max key size supported by AP for encryption – If the key size is large enough, then it takes more time to crack the key by…

About Banking Malwares and its Prevention – 2016 Guide

Today we’ll discuss about the hijack method used in banking sector i.e. botnets to steal money or some sensitive information from the user. What are these botnets used for? They…

Secure yourself in just 10 seconds in Cyber Cafes.

As we all knows, Security is the most discussing topic in today’s time and is obviously everyone’s need. Everyone has so many bank accounts, credit cards, paypal account, social accounts…