Thursday, May 16, 2024

Bipin Choudhary

110 POSTS1 COMMENTS
https://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

What is Key Logger ? How does it process ?

A key logger is an actively malicious computer program that can record everything you type on the keyboard and learns the keystroke pattern including...

DDos Attacks- Affect During the Corona virus Pandemic

DDoS means Denial of service attacks which cause a machine or service to be inaccessible to a legitimate user. Every New Day you heard...

Hackers Control the Traffic Signals, Just like in Movies

SWARCO is developed to maintain the traffic light and the Data Security experts found Vulnerabilities during transmitting the signals. If the attackers know how...

Cisco IOS router Under threat due some critical Flaw

As Report published theta the Cisco router’s are under threat and the company has announced that they fixed the vulnerabilities in Cisco IOS Routers....

Whats app Phone Number Exposed on Google Search result-How ?

A researcher discovered that the Phone Number which is tied with the Whats app account are indexed publicly found on Google search that may...

13,000 Mobile phones IMEI Number are same in India

The report published by the Meerut police (India) has uncovered a security breach in the mobile phone company. They found 13,500 Mobile phones which...

Zee5 Hacked-150GB Data leaked from Video On demand Platform

Hackers are on their work and this time they hit an Indian Video On-demand platform ZEE5. ZEE5 data hacked and threatened to sell the...

Popular Cyber Security APIs for 2020 | What are benefits ?

The latest technology changed the world and the thought process of every single individual which is being for some Good reason. The Most used...

Zoom Chat let the hacker’s victimize the user

If you are using the Zoom - especially in this lockdown session - get aware of all Vulnerabilities that may happen during the video...

Ransomware target Windows and Linux again.

Another target campaign is running by the cyber attacker which affects the windows and Linux systems in which they again use the ransomware methodology...

TOP AUTHORS

Most Read

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...