URL Redirection attack
A URL Redirection is to bring the browser from one URL to another URL. For example, if a link at
URL Redirection attack Read More »
A URL Redirection is to bring the browser from one URL to another URL. For example, if a link at
URL Redirection attack Read More »
Bluesnarfing is the theft of information from the target device or the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, and laptops. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs) and other devices. This
Israel’s foremost cyber intelligence bureau, the Israel National Cyber Directorate (INCD) has put out a warning to the world at large. Apparently, there’s a new type of cyber attack against corporates on the rise, that makes use of artificial intelligence. INCD found a new type of phishing attack which uses AI(Artificial Intelligence) based voice system.
New AI based voice phishing attack: Warning by Israel Read More »
Petya is a type of Ransomware attack. It has affected Windows OS. Petya is a family of encryption ransomware that was first discovered. It finds all of your files and encrypts them and then leaves you a message. If you want to decrypt them, you have to pay. The ransomware encrypts data on the computer using an
What is Petya Ransomware and How to Avoid Petya attack? Read More »
In computer software, a time bomb is part of a computer program that has been written so that it will start or stop functioning after a predetermined date or time is reached. A malicious program that is programmed to “detonate” at a specific time and release a virus onto the computer system or network. The