What is Two Factor Authentication
An extra layer of security that is known as "multi factor authentication" In today's world of increasing digital crime and internet fraud...
Finding a Zero-Day Exploit
Zero-days are found in exactly the same ways as any other kind of hole. What makes a security hole a "zero day" relies exclusively on who...
SLOWLORIS: HTTP DOS(Denial Of Service)attack and prevention
A DDOS(Distributed Denial of Service) attack is one of the major problem, that organizations are dealing with today. Such a kind of...
Instagram's Biggest Security Flaw
Stevie Graham, a security researcher who reported an authentication flaw in Instagram’s iOS software a few days ago, was denied a bug...
Hacking with Armitage into a Network
The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA) incryptography and computer security is a form of active...
Security Checklist: Have you been hacked?
Action List Take your website offline (We recommend the htaccess method) Scan all machines with FTP, super admin, and admin access for...