877.791.9571 |

About the Author:

Bhavesh is a Certified Ethical Hacker and Security + certified. Currently, he is pursuing Final year BSc in Information Technology. The upcoming goal for him is CISSP. He is interested in cyber forensics, pentesting, information security. He wishes to do his Masters in Information Security in upcoming years.
WebBugs11252013

Tracking User Activities Using Web Bugs

,

Introduction:

We live in a world where we’re connected to each other by a mouse click and a few keystrokes. It’s a revolution that changed the way we live our […]

XKeyscore09092013

XKeyscore: NSA’s Surveillance Program

Introduction

The former contractor for NSA, Edward Snowden, became famous for revealing PRISM, a confidential mass surveillance program run by the U.S. agencies to eavesdrop on any electronic media. The […]

ContentSpoofing08022013

Content Spoofing

According to WhiteHat Security’s annual study of about 15,000 websites, 86% had at least one serious hole that hackers could exploit, and content spoofing is one such prevalent vulnerability, […]

VirtualThreat06122013

Security Threats in Virtual World

What are virtual worlds?

A virtual world is an online world that simulates the real world in which the ‘residents’ can interact. Residents can participate in the creation of a […]

ussd-attack-feature

QR Code: USSD attack

The QR code or Quick Response code was originally designed for industrial applications, and has quickly gained popularity in the advertising industry. With the huge popularity and sales in […]

B.A.T.M.A.N.

B.A.T.M.A.N

Welcome techies, I am sure that you landed up on this page because the title is the name of a famous superhero.

I am not going to write an article […]

qr_code-03212013

What is behind that QR code?

With the huge popularity in mobile devices like the smartphone and tablets, two dimensional barcodes, or the so-called QR codes are beloved by marketers. QR codes or Quick Response […]

Port-Scanner-03052013

PHP: Build Your Own Mini Port Scanner

We all have used a port scanner some day or the other while performing reconnaissance and information gathering regarding a target host. We listed out various port scanners and […]

whatsapp-02192013

Android: WhatsApp chat forensic analysis

We all love messaging and using IMs on our smartphones to stay in touch with our friends and family. We use various mobile apps like WhatsApp to IM without […]