Google Hacking Secrets: The Hidden Codes Of Google
No need for an introduction, Google is quite possibly the more powerful search engine used today, even used sometimes to check our connectivity; except that the power of the single search bar on the top of Google has become a source of concern for many, and if not they should…
Category : Security 09-04-2020 by Janeth Kent
How to find everything you need on the Deep Web and the Dark Web
The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines we usually use. It will not appear in Google, Bing or Yahoo but these search engines will only show you results from the superficial part…
Category : Security 29-03-2020 by Silvia Mazzetta
How to enable DoH in Chrome, Firefox, and Edge to prevent your ISP from knowing which sites you visit
Maybe you haven't heard of DoH, the new security standard in Firefox, Chrome and other browsers that prevents your Internet provider from spying on the sites you visit. Let's see what DoH is, and how you can activate it in Firefox, Edge or Chrome. Everyone accesses the Internet through the servers…
Category : Security 02-03-2020 by Silvia Mazzetta
How to see the websites visited during the incognito mode and delete them
One of the features of any browser's incognito mode is that it does not store visited web pages in history. However, there is a method for displaying the last sites you accessed with your browser, regardless of whether or not you set it to incognito mode. They will all appear in…
Category : Security 21-02-2020 by Silvia Mazzetta
Best Web Proxies for Safer and Anonymous Surfing
Privacy is increasingly demanded in the context of global society. Contributing to this are the notorious cases of massive infiltration and security breaches that have ended up filtering users' private data. But there is also a widespread suspicion that someone is "watching" everything we do. For that reason, the use…
Category : Security 11-01-2020 by Silvia Mazzetta
Is It Risky to Share Data While Surfing Online?
The internet is a fantastic place to learn, engage, and connect with people across the globe. From browsing social media to performing critical work tasks, the internet has become a regular, important part of our everyday lives. The average person spends almost 7 hours a day online. That's around half…
Category : Security 30-12-2019 by Janeth Kent
How they can hack you while navigating
When we connect to the Internet we can be victims of many types of attacks. It is a reality that there are many threats in the form of malware that affect all types of systems and devices. However, it is at the time of using the browser where more problems…
Category : Security 02-12-2019 by Silvia Mazzetta
10 Open source tools for security operations (SOC)
As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and…
Category : Security 29-11-2019 by Janeth Kent
80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems
It’s hard work monitoring and debugging Linux performance problems, but it’s easier with the right tools at the right time. Finding a Linux Network Monitor tool or Software package for your Critical servers and services that are running on those systems in one of the most (if not the most)…
Category : Security 23-10-2018 by Janeth Kent
SQLMAP installation and usage in Ubuntu and Kali linux
Let's talk about the penetration testing using one of the KALI linux tool called SQLMAP. What is SQLMAP? sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It is a open source tool to use sql injection…
Category : Security 13-08-2016 by Janeth Kent
What is a DDOS attack and tools used
What Is a Denial of Service Attack or DOS? A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able…
Category : Security 19-04-2016 by Janeth Kent
Protect Ubuntu Servers With Fail2Ban
Servers do not exist in isolation, and those virtual private servers with only the most basic SSH configuration can be vulnerable to brute force attacks. fail2ban provides a way to automatically protect virtual servers from malicious behavior. The program works by scanning through log files and reacting to offending actions…
Category : Security 17-02-2015 by Janeth Kent
How to detect r57 and c99 Shells in your server
When malicious intruders compromise a web server, there's an excellent chance a famous Russian PHP script, r57shell, will follow. The r57 and C99 shell PHP script gives the intruder a number of capabilities, including, but not limited to: downloading files, uploading files, creating backdoors, setting up a spam relay, forging…
Category : Security 26-07-2013 by Janeth Kent
Who is immune to cyber-crime?
Every company is a target. No industry is safe, or immune to cyber-crime, and although technology in IT security has come a long way, the number of data hacking is growing. Knowing your potential attacker is essential to being prepared to defend your company from hackers and to protect your data. According to…
Category : Security 15-07-2013 by Janeth Kent
Mobile Malware Targets Android Phones: new Kaspersky Lab report
Are you a loyal Android fan as we are? Yes? Therefore, we have to accepted that malware targeting mobile devices is rapidly growing in both the number of variants found in the wild and in their complexity and sophistication, but the platform being actively targeted is Google's Android, which researchers now say is resembling Windows…
Category : Security 23-05-2013 by Janeth Kent
Don't become a victim of identity theft
Identity theft has always been a concern, but with more and more details of our private lives openly accessible on the Internet, it's easier than ever for cybercriminals to steal somebody's identity — which is worth $5,000. Criminals are also getting more sophisticated and tech savvy, but sometimes, we do most…
Category : Security 15-05-2013 by Janeth Kent
Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users
One of the most sophisticated web server backdoors ever seen has spread fast and is now sitting on hundreds of webservers running some of the most popular websites in the world, researchers have warned. One expert told TechWeekEurope the Cdorked backdoor, brought to light in April, is almost as smart as Stuxnet, the malware which disrupted…
Category : Security 09-05-2013 by Janeth Kent
How to improve security in Firefox, Chrome, and IE
Malware is most likely to reach your computer via your browser, according to the most recent Microsoft Security Intelligence Report. (Credit: Microsoft Security Intelligence Report, Vol. 14) Like their counterparts in the real world, computer criminals are always looking for vulnerabilities they can exploit. Instead of an open window or unattended wallet,…
Category : Security 07-05-2013 by Janeth Kent
8 Things That Anonymous, The Hacker 'Terrorist' Group, Has Done For Good
It's easy to think of the hacking group Anonymous as a group of punk troublemakers, raising hell online. Some have even debated whether their extra-legal protests should be labeled terrorist acts. But that would overlook some of the genuinely good deeds the group — whose members identify themselves with the Vendetta mask — has done. Whether it's retaliating…
Category : Security 29-04-2013 by Janeth Kent
Shodan: The scariest search engine on the Internet
"When people don't see stuff on Google, they think no one can find it. That's not true." That's according to John Matherly, creator of Shodan, the scariest search engine on the Internet. Unlike Google, which crawls the Web looking for websites, Shodan navigates the Internet's back channels. It's a kind of "dark" Google,…
Category : Security 11-04-2013 by Janeth Kent