FN SECURE: 10/01/2011 - 11/01/2011

Cyber Security

Call Us For Workshops Or Seminars.. In Your University, Colleges, or Schools.
Email Us At : vicky@globallyunique.in

Save as PDF

Tor 0.2.2.34 Released with fixes of anonymity vulnerability

Tor 0.2.2.34 fixes a critical anonymity vulnerability where an attacker can de-anonymize Tor users. Everybody should upgrade. Clients should upgrade so they are no longer recognizable by the TLS certs they present. Relays should upgrade so they no longer allow a remote attacker to

Read more

How to bypass/hack a Firewall

Firewall is a basic and main component for securing a network . The basic purpose of a firewall is to isolate one network from another network so that networks can't make effect on each other.Hackers often bypass Antiviruses and Anti-spywares by some methods Like Crypting,Hexing, File-pumping etc,but

Read more

How to use proxy easily in Backtrack 5

Hey guys how u been ??? hope u enjoying , huh !!!There are a lot of ways to hide your identity , either by single proxy or by multiple proxies like TOR which Xeo Hacker explained in a recent post.But if u have BackTrack then nothing to worry about you can use proxy very easily and u can use multilple

Read more

Preview YouTube ‘Like Bar’ On Video Thumbnail

We normally click on a YouTube video thinking that it is interesting because of the thumbnail preview and it turned out to be either boring or useless and just a waste of time.That's why YouTube has a like bar which tells the users whether the video is good or bad but the problem is

Read more

Most advanced and dangerous malware for Apple products - Why you should be concerned !

Indian security researcher from MalCon has created an advanced and dangerous malware for Apple products which can not only compromize your privacy but also steal important data and let hackers control your device by simple text messages.If you are using any Apple product such as iPhone, iPad or

Read more

Anonymous DDOS Oakland police site after violence

Cyber activists associated with Anonymous have targeted the Oakland Police Department (OPD) and other law enforcement agencies that participated in a controversial crackdown against OccupyOakland protestors. A DDOS (distributed denial-of-service) attack against the department's websitewww.oaklandpolice.com is

Read more

How to Beat Evil Governments When Your Internet Turned Off ?

Bruce Sutherland explain at DefCon 19 Conference that "How To Get Your Message Out When Your Government Turns Off The Internet" . Bruce Sutherland  is a network systems architect and software developer with Domex Computer Services Inc, based in Melbourne Beach, FL.How would you communicate

Read more

Malware for xbox Kinect created by 15 years old Indian researchers

Indian researchers from MalCon have created a malware that utlizes Microsoft Kinect to secretly capture pictures and upload to a picasa account. A 15year old Indian security researcher 'Shantanu Gawde' from MalCon Research has created a malware that utilizes the Microsoft xbox kinect controller. Kinect

Read more

Save this Page

Download as PDF