Skip to main content

How to become a Hacker

How to become a Hacker

A hacker is any skilled computer expert that uses their technical knowledge to overcome a problem. While “hacker” can refer to any computer programmer, the term has become associated in popular culture with a “security hacker”, someone who, with their technical knowledge, uses bugs or exploits to break into computer systems. Start with the Linux/UNIX […]

Spyware: Origin, Symptoms, Prevention, Removal

Spyware: Origin, Symptoms, Prevention, Removal

Spyware is a computer threat, which is categorized under malware that is likely installed on the user’s computer without their knowledge. Spyware is generally a type of software. Sometimes such software are installed for tracking the users activity in corporate world, which is a requirement and there it is no longer a threat or parents […]

Whats is Clickjacking and tips to protect from Clickjacking

Clickjacking and tips to protect from Clickjacking

Clickjacking is a malicious exploit in which user is lured to click on some clickable entity on the web page, which seems to be legitimate but the malicious code resides behind the clickable entity. Clickjacking is also known as User Interface redress attack, UI redress attack, UI redressing. The malicious code is executed without the […]

7 Tweaks to Boost Mozilla Firefox

Tweaks to Boost Mozilla Firefox

Browsers: the software bundle that everyone uses to surf over the internet. There are lots of browser software bundle available to choose from. Few of the most popular browsers are Mozilla Firefox, Google Chrome, IE and Opera. User seeks speed and instant browsing features without any performance degrade in the browser. Well, in every browser […]

What is Phishing attack and tips to prevent phishing attacks

Phishing attack and tips to prevent phishing attacks

Phishing is the homophone of fishing. In fishing, fishes are lured and tricked with food likewise in phishing; end users are tricked by the cyber criminals to click on the malicious links or the link contain in spam emails. Phishing attack also lead to the end user in installation of malware on the victim machine. […]

7 Best security tips to protect your website from Hackers

Best security tips to protect your website from Hackers

In the world of internet, owning a blog, website or any web based resource is like an ATM machine. It’s open for everyone. It’s straight forward for the users those who are only intended to withdraw money but worst circumstances arise when someone with malicious intents enters in. If desired evil intention succeed than it […]

Hackers can Sniff your Keystrokes via Wi-Fi Signals

Hackers can Sniff your Keystrokes via Wi-Fi Signals

Now you should not be in wrong belief that only keyloggers can record your keystrokes on your computer. Other than keylogger, Wi-Fi signals could also be use to monitor your keystrokes hit via keyboard. Monitoring your keystrokes from any medium could lead to a great loss of personal and important information like username & passwords, […]

Tools & Software used by ISIS to stay Anonymous Online

Tools & Software used by ISIS to stay Anonymous Online

In last couple of years, cyber crime is increasing rapidly. With the increase in technology and enhanced security, cyber criminals are fond of finding ways to penetrate and crack into the security. Emerging social media has become the major platform for terrorists to trap and recruit the newbie to join their terrorist network. So, here […]