Slide 1 Title

Add some text here.. Read More

Slide 2 Title

Add some text here.. Read More

Slide 3 Title

Add some text here..

Slide 4 Title

Add some text here.. Read More

Slide 5 Title

Add some text here.. Read More

Monday 14 November 2016

Your WiFi Could Betray Your Passwords, Pins & Keystrokes

Post comment!
The way user moves his fingers across a phone's touchscreen alters the WiFi signals transmitted by a mobile phone, causing interruptions that an attacker can intercept, analyze, and reverse engineer to guess what the user has typed on his phone or in password input fields.


Thursday 23 June 2016

Google prompt makes Two-factor Authentication Easier

Post comment!


Two-factor authentication is an effective way to secure online accounts, but many users avoid enabling this feature to save themselves from irritation of receiving and typing a 6-digit code that takes a few more seconds.


Wednesday 22 June 2016

Setting Up A Pentest Lab with Firewall in Virtual box

Post comment!


Penetration testing requirements often force penetration testers to do both external as well as internal assessments. This article covers the concepts that are required to setup a pentest lab in virtual box, which looks like a real network for a small-scale organization. This can be used as a base for setting up more advanced labs to practice penetration testing concepts in a legal environment.


 
Google+