Continuing “Google search tricks”, this article will include some more advanced keywords for searching your query. As we all want specific and filtered search results while searching anything over google.
And these are:
1.Want to search within a particular website, type keyword site:url OR site:url keyword, for example type "social engineering site:wikipedia.com" OR "site:wik
Google is the most used search engine on the World Wide Web and we can get answer of our almost every query on it.
So here I am going to share most efficient way to use google search bar. These tricks help to narrow down search results of user preference and any one can easily filter and find out their exact required information.
The incidents of cyber-crimes in the district this year have risen by 265%. The Centre for Cyber Crime Investigation (CCCI) in Noida received 1,482 cases of cyber-crimes till September this year against 560 complaints in 2016, officials said.
While financial frauds related to stealing of credit and debit card data took prime spot both the years, use of abusive/aggressive language on social me
One of the world's "big four" accountancy firms has fallen victim to a sophisticated cyber-attack.
Global tax and auditing firm Deloitte has confirmed the company had suffered a cyber-attack that resulted in the theft of confidential information, including the private emails and documents of some of its clients.
Deloitte is one of the largest private accounting firms in the U.S. which off
If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website, then pay attention—your computer has been compromised.
CCleaner is a popular application with over 2 billion downloads, created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance perf
The Locky ransomware attack is similar in nature to Wannacry. Although it has been in existence since more than a year now, the attacks are becoming prevalent since August 9 this year. A new version of Locky is now being spread via spam emails which is said to be more lethal in nature. As per Appriver, a cybersecurity firm, the Locky ransomware has been spread throug
A couple of weeks ago an IT professional in West Bengal received an anonymous phone call. The speaker said he was making some online registration and had entered the phone number of the techie by mistake since the two numbers were similar. The caller further urged the IT professional to share the code received on the IT professional’s phone received so that he (the caller) could complete th
LinkedIn and Wells Fargo have found themselves once again at the center of a cyber-issue, but this time hackers are using the business-oriented social media site to send phishing InMails posing as a Wells Fargo document.
Malwarebytes senior researcher Jerome Segura wrote in a blog that the current crop of phishing attacks use previously hacked LinkedIn Premium accounts as a starting point. Th
According to Kaspersky India ranks fourth in the list of hacked servers available for sale via xDedic marketplace, which listed 3,488 Indian servers for sale as of May 2016.
A computer or user got attacked via Virus, Trojan, Malware, Hacking and so on. Computer, keyboard and mouse used as a weapon to commit real world crimes over cyber world like thefts, threatening, cyber terrorism, credit c
• Google was founded in 1998 by Sergey Brin and Larry Page
• Google started in January 1996 as a research project by Sergey Brin and Larry Page when they were PhD students at Stanford University • In initial days they nicknamed their new search engine "BackRub". • The name Google originated from a misspelling of the word "googol" a mathematical term w
I will complete my Bachelor's from Computer Science in august 2018 and I have little command over computer language [c/c++, Java, python] and now I have started learning network in which I am getting great interest.
I have interest in hacking and also like investigations of mobile and PC. Which way to go please suggest or both are same??
Smart developers are making mobile phones or laptops smarter by adding up new features but smart attackers are also working in parallel to exploit or attack over these devices to gain information or to destroy.
Today Update to Stay Safe:
From past few years, attackers are attacking by sending malicious URL or file, building malicious applications, building malicious software or exploiti
• A recent report by EY on ' Cyber-crime Incidents in India' tells how hackers are making use of social media, turning into one of the biggest risk zones for cyber-attacks.
• As per cyber-crime experts and forensic consultants, posting your workplace details on social media could be a step towards compromising your digital security. Hackers and cyber criminals can send you ph
Gmail is most used service for mailing and there is lots of interesting things that you might not aware. Preview pane feature in outlook is most liked feature and the same feature is also available for Gmail, preview pane takes an additional pane in your inbox so that you can view your email right in the inbox. Follow below mentioned steps for enabling preview pane.
• A city student hacked into the admin pages of a cyber forensics center at University of Madras to showcase his skills to the authorities and convince them to admit him to a course offered by the center. • The authorities said that the student later appeared for an entrance exam conducted by the center, but had failed to cle
As we know that many users and co-orparete have a generalize idea that working on linux is secure, so they opt for Linux than Windows Operating System. Is this true? What could be the ways you can suggest to secure a Linux System.
The biggest myth in the whole world regarding security is, with respect to the normal internet user:
I have installed a good anti-virus!! & Why hacker will target me??
Firstly, never think that your PC machine will never be targeted by any hacker as you are a normal internet user who visits social media accounts. Hacker especially targets such machines as sometimes they need your persona
The printer in your office comes with lightning-fast scanning capabilities, solid print qualities, fast printing speeds and remote printing and scanning capabilities come with PC-style hard drives that store digital copies of every document that has been scanned, copied, emailed to and printed on them.
From confidential employee records, to credit card numbers, patient's health records and o
According to a report released by cyber security firm Darktrace.
• The hackers attempted to acquire data from a North American casino by using an Internet-connected fish tank. • The fish tank had sensors connected to a PC that regulated the temperature, food and cleanliness of the tank. • Somebody got into the fish tank and used it to move around into other areas
It has been reported that a new wave of spam mails are circulating with common subject lines to spread variants of Locky ransomware. Reports indicate that over 23 million messages have been sent in this campaign. The messages contain common subjects like "please print", "documents", "photo", "Images", "scans" and "pictures".
f the system is infected by Locky all files are encrypted and strin
The lifestyle is becoming very smart now a day and definitely living standard will become smarter in future. Money and fortune are the necessary components for increasing anyone's living standard for which they work in reputed firms to earn or gain more profit.
As we all know, working for biggest giants MNC's like Google, Porsche, 5 or 7 Star Hotels (The Centaurus, Hilton, Burj Al Arab, Leela
I want to sell my laptop that I was using from last few years. I have studied over some informative sites that deleted information after formatting also get recovered by some tools available in this advanced growing world.
Please tell me some tools or procedure to completely delete information from laptop so no one can retrieve my personal data back?