General security

Risk associated with cookies

The Internet is surely the best resource to gather any kind of information about products, shops, customer complaints, user experience, etc. Companies are tr

Tunnelling SSH Traffic

Overview Security plays an important role in our internet world. As the number of users on the internet increases, it's necessary to have secure communicati

Top Links of Tools Compilation for Pentesting, Forensics, Security, and Hacking

Are you still looking for a suite of tools that may complete your day-to-day activities, or are you just looking for new tools that you can try or play with?

Modern Online Banking Cyber Crime

Introduction In recent years, cyber crime has grown by leaps and bounds. Cyber crime revenue grew to levels comparable to that of a state, and major security

Phishing Counter-Measures Unleashed

In this article, I have done my best to gather and explain all the possible ways by which phishing can be avoided. Here I am going to explain phishing counte

Identity Management and Access Control in a Single Sign-on Environment

In this article you will learn the following information: How businesses manage electronic identities and provide access control to their employees, custome

Hacktivism: Means and motivations … what else?

The term "hacktivism," derived by combining hack and activism, refers to the use of computers and any other IT system and network to debate and sustain a pol

Peeping the Social media

1. Synopsis Nowadays it is hard to find a person who doesn't sign in to any social medium at least once a week by using gadgets like a smartphone, tablet, or

XKeyscore: NSA’s Surveillance Program

Introduction The former contractor for NSA, Edward Snowden, became famous for revealing PRISM, a confidential mass surveillance program run by the U.S. agen

PsyOps and Socialbots

Introduction Social media are the principal aggregation "places" in cyberspace; billions of connected people are using it for a wide variety of purposes from