Posts

Showing posts from January, 2017

Your Chrome, Safari, And Opera Browsers Might Be Leaking Your Private Information

Image
Your Chrome, Safari, And Opera Browsers Might Be Leaking Your Private Information The “helpful” autofill feature of your web browser also poses a big risk to your online security. A security researcher has uncovered a simple exploit that uses form fields hidden from the user to steal the personal information. While Chrome, Opera, and Safari are affected by this issue, Firefox remains immune. The users are advised to disable the autofill settings in their web browsers. We often praise the autofill features of our web browsers for saving us from all the troubles of typing the details like email address, passwords, address, phone numbers, etc. But, these features come along with some serious security risks too. A web developer and hacker named Viljami Kuosmanen  has found a flaw   that’s affecting different browsers and plugins. According to his revelation, web browsers like Google Chrome, Apple Safari, and Opera, and plugins like LastPass can be exploited to lea

How Do Cyber Criminals Steal Your Money?

Image
Today is the world where people worry less about getting mugged on street and more on the internet. With the cyber security scams popping out daily, it clearly indicates the route modern thieves have taken. Not at a gun point or knife, your money is now being stolen with utter subtlety, where you don’t even recognize the theft until it is done. The security of even big commercial banks like J.P. Morgan and numerous financial institutions has been breached and millions of business and individual accounts have been compromised. It seems no armor can provide protection from these Cyber Attacks. What are Cyber Attacks? Am I vulnerable to Cyber Attacks? Cyber Attacks are the offensive gimmicks whose goal is to extract the personal or classified information from the targeted computer systems or networks. This information is later used to either steal or alter the specified data. On a larger scale, the attacks have the potential to become a threat to national security. These attacks could

C and c++ complete cheat tricks

Image
libraries #include input and output functions #include string related functions #include memory allocation, rand, and other functions #include math functions #include time related functions functions returnType functionName( input1Type input1Name, input2Type input2Name, …. ) { // do something return value; // value must be of type returnType } comments // one line comments this is a C++ style one line comment /* multiple line this is a traditional C style comment block comment */ variable types char holds a character, or a number from -128 to 127 (1 byte) bool holds a boolean value, either true or false (1 byte) int hold an integer (a positive or negative number with NO decimal, 4 bytes) float holds a real number (a positive or negative number with a decimal, 4 bytes) void no type, raw binary data conditionals A == B if A is equal to B, this is true; otherwise, it’s false A != B if A is NOT equal to B, this is true; otherwise, it’s false A < B if A

Common Terms Of Hacking World:

Image
Common Terms Of Hacking World: 1#DDoS: DDoS  means Distributed Denial of Service. This is a type of DOS attack in which multiple compromised systems are used and these systems are often infected with a Trojan. All these infected systems select a target and cause a Denial of Service (DoS) attack. 2# VPS: It stands for Virtual private server (VPS) . It is a virtual machine that is sold as a service by an Internet hosting service. A VPS generally runs its own copy of an operating system, and the customers have superuser-level access to that operating system instance, so they can install almost any software that runs on that OS. 3# SE: Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. 4# HTTP: The Hypertext Transfer Protocol (HTTP) is an application protocol for  collaborative, distributed, hypermedia information systems. HTTP is the basis of data communication for the World W

Scary Gmail phishing attack

Image
The Smartest Gmail Phishing Attack You’ll Ever Encounter   Gmail phishing is one of most common methods used by hackers to compromise the online security of naive users. But, a recent Gmail phishing attack, uncovered by Wordfence, mimics your past conversations and attachments, succeeding in fooling even the tech-savvy netizens. To counter this attack, users should make sure to verify the https:// protocol and hostname in the address bar.  for many of us, getting our Gmail accounts hacked would mean the endgame. It’s the path that helps the hackers to gain the ultimate access to our digital lives. By doing so, one can access our personal identifying information, take control of our online accounts, and whatnot. That’s why, at Fossbytes, we try to explain such security risks often in a very simple language to reach out to the maximum number of users. Today, I’m going to tell you about a Gmail phishing technique that’s being used by the cyber criminals with high e