Attacks from China

A bloody face-off between Indian and Chinese troops in Galwan Valley of eastern Ladakh led to the martyrdom of 20 Indian soldiers late on Monday night. “Indian and Chinese troops have disengaged at the Galwan area where they had earlier clashed on the night of 15/16 June 2020. 17 Indian troops who were critically injured […]

Network Attacks

We have already learned about types of threats, actors, etc. Network attack is an attack in which intruder takes an unauthorized control over a company’s network using different techniques. This can cause heavy loss both at privacy levels and financially. We will now look more about them. DNS Cache Poisoning We know what DNS servers […]

Malware circulating- Alert by Google

Source: Techradar.com Fraudsters are using black SEO, Google Sites and spam pages to push fake data breach notifications impersonating big name companies in an effort to distribute malware and scams. As reported by BleepingComputer, Google Alerts help to spread these fake notifications as the service monitors search results looking for user-defined keywords. To spread their malware, […]

Search Engine Optimization (SEO)

I have seen some meme, “If you want to bury a dead body, do it on the third search result page of Google. No one visits it!” (not intended to offend) When we search on a search engine, say on Google, we will get most relevant results on the first page. Even there are numerous […]

Transmission Modes in Networking

We have learnt about the cables earlier. Once these cables are connected to the devices, they carry electric charge. We are also aware that the data is transmitted in the form of binary numbers, ones and zeroes. These ones and zeroes are sent through a process called Modulation. Modulation is the way altering the voltage […]

Networking devices

We have read about cables that provide point-to-point connection. If not, you can find it here! But these are networks where only a single device can operate on each end. But with some billion computer devices today, cables cannot be of much use. Inorder to overcome this, many network devices are invented that allow multiple […]

Cables in Networking

Networking devices or networking hardware are the equipment essential for the communication and interaction among the devices over a network. Computer Networking is a huge part of the day to day role of many IT Specialists, and knowing how to differentiate different network devices will be more essential. Now, we shall look into different networking devices. Cables […]

Book of Facebook Identities on Dark web

One of the threat actors have dropped an online bomb by dropping the identities of 267 Million Facebook Users for 500 Euros — the details include their EMAIL, FNAME, LNAME, PHONE, FACEBOOK ID, LAST CONNECTION, STATUS, AGE. Cyble researchers executed the sale and were able to download and verify the data. The impacted users will be able to […]

LinkedIn linked to dark web

LinkedIn began in co-founder Reid Hoffman’s living room in 2002 and was officially launched on May 5, 2003. Today, LinkedIn leads a diversified business with revenues from membership subscriptions, advertising sales and recruitment solutions under the leadership of Ryan Roslansky. In December 2016, Microsoft completed its acquisition of LinkedIn, bringing together the world’s leading professional cloud and the […]

Yatra’s voyage to dark web

Yatra Online Pvt Ltd based in Gurgaon India, is one of India’s leading online travel companies and operates the website Yatra.com. The company provides information, pricing, availability, and booking facility for domestic and international air travel, domestic and international hotel bookings, holiday packages, buses, trains, in city activities, inter-city and point-to-point cabs, homestays and cruises. As […]

80K Credit Cards for sale on dark market!

Cyble’s researchers came across a data leak that involved detailed information of over 80,000 credit cards put up for sale on the darkweb market on May 28. This dump of credit cards consists of credit card details of various countries. According to their research team the split of credit cards as per the country is […]

Indian’s Truecaller records leaked!

The Swedish caller identity app, Truecaller, is popular among the Indian users. The app provides a set of features to smartphone users including call-blocking, flash-messaging, caller-identification, call-recording, and Chat & Voice services. Cybersecurity research firm Cyble reported that unknown hackers are selling personal information of 47.5 million Indian users of Truecaller, on May 26, a […]