All topics
45


Yes No
Hide topic messages
Yes No
Enable infinite scrolling


There is terrible news for all OnePlus lovers.

Your OnePlus handset, running OxygenOS—the company's custom version of the Android operating system, is collecting way more data on its users than it requires.

A recent blog post published by security researcher Christopher Moore on his website detailed the data collection practice by the Shenzhen-based Chinese smartphone maker, re
59e5f39d6b100.png
0replies
21views
Continuing “Google search tricks”, this article will include some more advanced keywords for searching your query. As we all want specific and filtered search results while searching anything over google.

And these are:

1.Want to search within a particular website, type keyword site:url OR site:url keyword, for example type "social engineering site:wikipedia.com" OR "site:wik
59d5c78714ecf.png
0replies
63views
Aradhna Bhagat posted Sep 29 at 11:36 am
Google is the most used search engine on the World Wide Web and we can get answer of our almost every query on it.

So here I am going to share most efficient way to use google search bar. These tricks help to narrow down search results of user preference and any one can easily filter and find out their exact required information.

And these are:

1.If you want to search for an exact ph
59cde02179afd.png
0replies
26views
The incidents of cyber-crimes in the district this year have risen by 265%. The Centre for Cyber Crime Investigation (CCCI) in Noida received 1,482 cases of cyber-crimes till September this year against 560 complaints in 2016, officials said.

While financial frauds related to stealing of credit and debit card data took prime spot both the years, use of abusive/aggressive language on social me
59cc7b8c269f9.png
0replies
19views
One of the world's "big four" accountancy firms has fallen victim to a sophisticated cyber-attack.

Global tax and auditing firm Deloitte has confirmed the company had suffered a cyber-attack that resulted in the theft of confidential information, including the private emails and documents of some of its clients.

Deloitte is one of the largest private accounting firms in the U.S. which off
59ca104ae7d9a.png
0replies
15views
If you have downloaded or updated CCleaner application on your computer between August 15 and September 12 of this year from its official website, then pay attention—your computer has been compromised.

CCleaner is a popular application with over 2 billion downloads, created by Piriform and recently acquired by Avast that allows users to clean up their system to optimize and enhance perf
59c09cedba39b.png
2replies
61views
recent by admin  ·  Sep 25 at 4:28 pm
What is Locky Ransomware?

The Locky ransomware attack is similar in nature to Wannacry. Although it has been in existence since more than a year now, the attacks are becoming prevalent since August 9 this year. A new version of Locky is now being spread via spam emails which is said to be more lethal in nature. As per Appriver, a cybersecurity firm, the Locky ransomware has been spread throug
5replies
95views
recent by admin  ·  Sep 25 at 4:21 pm
Aradhna Bhagat posted Sep 9 at 12:23 pm
A couple of weeks ago an IT professional in West Bengal received an anonymous phone call. The speaker said he was making some online registration and had entered the phone number of the techie by mistake since the two numbers were similar. The caller further urged the IT professional to share the code received on the IT professional’s phone received so that he (the caller) could complete th
2replies
75views
recent by Aradhna Bhagat  ·  Sep 21 at 3:39 pm
Gmail is most used service for mailing which plays an important role in our day to day communication. Gmail holds sensitive and confidential data so it requires maximum protection against attacks.

Although google takes all the essential steps from the server side, but also provides various options and features for users to keep their data safe and secure in Gmail account.

Here we will go
59c0e5528a787.png
1replies
36views
recent by Gentlemandt  ·  Sep 19 at 5:00 pm
LinkedIn and Wells Fargo have found themselves once again at the center of a cyber-issue, but this time hackers are using the business-oriented social media site to send phishing InMails posing as a Wells Fargo document.

Malwarebytes senior researcher Jerome Segura wrote in a blog that the current crop of phishing attacks use previously hacked LinkedIn Premium accounts as a starting point. Th
59bf4d380bb69.png
0replies
23views
According to Kaspersky India ranks fourth in the list of hacked servers available for sale via xDedic marketplace, which listed 3,488 Indian servers for sale as of May 2016.

A computer or user got attacked via Virus, Trojan, Malware, Hacking and so on. Computer, keyboard and mouse used as a weapon to commit real world crimes over cyber world like thefts, threatening, cyber terrorism, credit c
0replies
50views
• Google was founded in 1998 by Sergey Brin and Larry Page


• Google started in January 1996 as a research project by Sergey Brin and Larry Page when they were PhD students at Stanford University
• In initial days they nicknamed their new search engine "BackRub".
• The name Google originated from a misspelling of the word "googol" a mathematical term w
59b25f6526699.png
0replies
38views
I will complete my Bachelor's from Computer Science in august 2018 and I have little command over computer language [c/c++, Java, python] and now I have started learning network in which I am getting great interest.

I have interest in hacking and also like investigations of mobile and PC. Which way to go please suggest or both are same??

Thank you

4replies
61views
recent by manshu  ·  Sep 8 at 1:06 pm
Smart developers are making mobile phones or laptops smarter by adding up new features but smart attackers are also working in parallel to exploit or attack over these devices to gain information or to destroy.

Today Update to Stay Safe:

From past few years, attackers are attacking by sending malicious URL or file, building malicious applications, building malicious software or exploiti
0replies
31views
• A recent report by EY on ' Cyber-crime Incidents in India' tells how hackers are making use of social media, turning into one of the biggest risk zones for cyber-attacks.

• As per cyber-crime experts and forensic consultants, posting your workplace details on social media could be a step towards compromising your digital security. Hackers and cyber criminals can send you ph
59b22ad1157e3.png
0replies
25views
Today YouTube needs no introduction, world is watching videos, latest trends and channels, uploading contents, sharing with friends and using for many more things.

Here I am with the simple and interesting tricks and shortcut keys of YouTube which will make it more interesting so follow below mentioned steps:

How to make GIF from YouTube video

Then further
59b0dcde73117.png
0replies
39views
Aradhna Bhagat posted Sep 5 at 5:46 pm
Gmail is most used service for mailing and there is lots of interesting things that you might not aware.
Preview pane feature in outlook is most liked feature and the same feature is also available for Gmail, preview pane takes an additional pane in your inbox so that you can view your email right in the inbox.
Follow below mentioned steps for enabling preview pane.





59ae952c7d9c5.png
2replies
47views
recent by Astra  ·  Sep 7 at 11:12 am
According to a report released by Times of India

• A city student hacked into the admin pages of a cyber forensics center at University of Madras to showcase his skills to the authorities and convince them to admit him to a course offered by the center.
• The authorities said that the student later appeared for an entrance exam conducted by the center, but had failed to cle
59b0ce4bd269e.png
0replies
18views
The biggest myth in the whole world regarding security is, with respect to the normal internet user:

I have installed a good anti-virus!! & Why hacker will target me??
Firstly, never think that your PC machine will never be targeted by any hacker as you are a normal internet user who visits social media accounts. Hacker especially targets such machines as sometimes they need your persona
1replies
42views
recent by ashwani  ·  Sep 6 at 12:55 pm
The printer in your office comes with lightning-fast scanning capabilities, solid print qualities, fast printing speeds and remote printing and scanning capabilities come with PC-style hard drives that store digital copies of every document that has been scanned, copied, emailed to and printed on them.

From confidential employee records, to credit card numbers, patient's health records and o
0replies
15views
According to a report released by cyber security firm Darktrace.

• The hackers attempted to acquire data from a North American casino by using an Internet-connected fish tank.
• The fish tank had sensors connected to a PC that regulated the temperature, food and cleanliness of the tank.
• Somebody got into the fish tank and used it to move around into other areas
59af7d5390e9c.png
0replies
18views
It has been reported that a new wave of spam mails are circulating with common subject lines to spread variants of Locky ransomware. Reports indicate that over 23 million messages have been sent in this campaign. The messages contain common subjects like "please print", "documents", "photo", "Images", "scans" and "pictures".

f the system is infected by Locky all files are encrypted and strin
0replies
13views


http://timesofindia.indiatimes.com/city/mumbai/bandra-man-loses-rs-2-cr-online-cops-find-108-fake-bank-accounts/articleshow/60050708.cms

• The 72-year-old bandra resident was duped by a Facebook "friend from the US" with the promise of lucrative profit in an investment scheme in Afghanistan.

• During interrogations, police found the gang had opened fake accounts in va
59ae2ba60bd61.png
0replies
21views
The lifestyle is becoming very smart now a day and definitely living standard will become smarter in future. Money and fortune are the necessary components for increasing anyone's living standard for which they work in reputed firms to earn or gain more profit.

As we all know, working for biggest giants MNC's like Google, Porsche, 5 or 7 Star Hotels (The Centaurus, Hilton, Burj Al Arab, Leela
2replies
42views
recent by Aradhna Bhagat  ·  Sep 4 at 3:43 pm
Pacemaker: A small electronic device used boosting up/down Heart Beat according to health issue.

Researchers had developed new pacemaker which will use the Radio Frequency instead of low-power electrical pulses used in old pacemaker, but this advancement resulted in Human Health Hack.

Details: https://thehackernews.com/2017/08/pacemakers-hacking.html

1replies
20views
recent by admin  ·  Sep 4 at 10:15 am
I want to sell my laptop that I was using from last few years. I have studied over some informative sites that deleted information after formatting also get recovered by some tools available in this advanced growing world.

Please tell me some tools or procedure to completely delete information from laptop so no one can retrieve my personal data back?

2replies
46views
recent by Astra  ·  Aug 31 at 2:44 pm
Load more
All posts under this topic will be deleted ?
With selected deselect topics
Pending draft ... Click to resume editing
Discard draft