An Idiot-Proof Guide to be Safe On the Internet

Are we really secure? (Part-5) - Browse Clean and Safe

You must’ve heard about tech giants not taking the protection of their user’s data seriously at all, yet again. And various news articles are already doing the rounds of my news feeds, yet again. From Quora to Facebook (well no surprises there), and even TRAI’s Chairman R.S. Sharma’s personal details were posted online after he openly challenged the Internet to do so. On 21 December 2018, The Ministry of Home Affairs issued an order authorizing 10 Central agencies to intercept, monitor, and decrypt “any information generated, transmitted, received or stored in any computer. [Read More]

A Brief Guide to Various Techniques in Hacking

Understanding Hacking Techniques and Kali Linux Toolkit Overview

Introduction To be a Hacker, one has to be a master of multiple disciplines ranging from Operating Systems to Networking, and of course programming. They need to know everything about everything, from latest server technologies like Node.js to old programming languages like BASIC and C. They know almost every web framework, operating system, wireless technology, encryption that there is, in and out. If you are finding weakness and loopholes in a system and gaining access or exploiting it then you are termed as a Hacker. [Read More]

Introduction to the Dark Web

Understanding the dark web, for beginners

Introduction You hear about data leaks all the time in the media. Have you ever wondered where that data is leaked? You might’ve heard about the WannaCry ransomware attack last year. It is a program targeting Windows operating system as it installs and hijacks computers and demanding huge ransom, even ATM machines, personal computers as well as servers were not secure. It bought the US Healthcare System and French car maker, Renault to their knees. [Read More]

Bugs and Vulnerabilities

Are we really secure? (Part-4) - Understanding bugs and vulnerabilities

No matter how much time is devoted to developing an app or a website, or under how many eyes it passes through during its development stages, they still have vulnerabilities. Some have more so than others and some are just unusable. Every vendor on this planet has a security issue with their product. It has now become a fact of modern-day life. Take Microsoft for instance. CVE Details, a site that chronicles publicly disclosed vulnerabilities shows that in the 10 years starting with 2006 the company has disclosed an astonishing 3,157 security flaws. [Read More]