Archive for 2015
3 Reasons Security Certifications Matter

You know the No. 1 attribute of people claiming security certifications don’t matter? They don’t have any. In my years of experience placing security pros in good jobs, it’s that simple. Having the right certifications matters, and here's why.
1..
Tuesday, 29 December 2015
Posted by Sivapriya
What are Watering-Hole Attacks ?

First detected in 2013, watering-hole attacks are one of the newest (and arguably most sophisticated) security threats facing organisations.
By exploiting undetected vulnerabilities in websites and software applications, hackers can lie in wait.
What is Penetration Testing and Why is It Important?

Penetration testing (otherwise known as pen testing, or the more general security testing) is the process of testing your applications for vulnerabilities, and answering a simple question: "What could a hacker do to harm my application, or organisation,.
Ranganathaswamy Temple's Website Hacked.
Hours after the start of 20-day Vaikunda Ekadasi festival, unidentified persons hacked the official website of Sri Ranganathaswamy Temple, Srirangam, in the early hours on Saturday.
The hacking came to light when devotees were trying to get information.
World’s Fastest Password Cracking Tool Hashcat Is Now Open Source

The world’s fastest cracking tool Hashcat is now open source. The company has called it a very important step and listed out the reasons that inspired them to take this step.
If you are into password cracking, you might be aware of the fact.
Google Is Powering A New Search Engine That Digs Internet’s Dirty Secrets

Ever heard of Shodan and ‘appreciated’ its capabilities? Here, you are going to read about another similar, but a smarter hacker’s search engine. This search engine is called Censys and powered by Google’s infrastructure. Read more to know how.
Spear phishing is a type of targeted email scam.

Even as organisations improve their security, and begin to filter out the huge amounts of spam emails they receive each and every day, the security landscape is changing.
Phishing attacks have evolved, have a much bigger problem to contend with: Spear.
Tuesday, 1 December 2015
Posted by Sivapriya
Ethical Hacking Training and Workshop in Vellore

About :
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience.
Friday, 27 November 2015
Posted by Sivapriya
CCNA Training in vellore

About :
Cisco Certified Network Associate (CCNA) validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including implementation and verification of connections to remote sites in a WAN.
Skills.
MCITP Training in Vellore

About :
The MCITP Server Administrator certification will help you develop and demonstrate your knowledge and skills in working with Server 2008 and prepare you for several different roles.The MCITP certification builds on a combination of MCTS.
Hardware and Networking Training in Vellore

About :
Computer hardware professionals take care of the maintenance of computer hardware, while networking involves connecting a group of 2 or more computer systems for sharing data and information. The professionals engaged in R&D of computer.
Five of the biggest hacks

1. Operation Shady RAT
Last year security firm McAfee revealed details of Operation Shady RAT (RAT is an acronym for Remote Access Tool), a hacking campaign that took place over several years. The networks of 72 organisations across the world were.
A zero-day exploit : An advanced Cyber Attack defined

A zero-day vulnerability, at its core, is a flaw. It is an unknown exploit in the wild that exposes a vulnerability in software or hardware which can create complicated problems well before anyone realizes something is wrong. In fact, a zero-day exploit.
Tips for Improving Router Security

With the recent news of router vulnerabilities, we thought it would be an excellent time to provide a few tips for improving your router security. While nothing is hack-proof in the world we live in, you can take many steps to deter attackers from.
WhatsApp Found Collecting Data on Calls and Phone Numbers

WhatsApp, one of the most popular online calling apps, has been exposed by a group of researchers who identified how app’s internal protocol is storing call duration and personal information of the participants.
Though, WhatsApp has never claimed.