Tuesday, November 7, 2017

Facebook | Whatsapp Hacking

CONTENT REMO...

Internet Security – Cookies

Cookies are files, generally from the visited webpages, which are stored on a user's computer. They hold a small amount of data, specific to a particular client and website, and can be accessed either by the web server or the client computer which can be usernames, password, session token, etc. This allows the server to deliver a page personalized to a particular user, or the page itself can contain some script which is aware of the data in the cookie and so is able to carry information from one visit to that website. Types of Cookies There are...

Internet Security

With the usage of Internet, a number of activities take place in your computer which can be for good or bad and varies from identity thefts to people who hack into computers and steal private passwords, documents and files. The fact is that everything is online and opens us to these frauds and makes us victims, unless you have taken the necessary steps to protect your computer. It is quite strange that till date, a lot of people don’t give much importance to Internet Security. They think that their computers are invisible, but as soon as they start...

Computer Security

Why Security? Cyberspace (internet, work environment, intranet) is becoming a dangerous place for all organizations and individuals to protect their sensitive data or reputation. This is because of the numerous people and machines accessing it. It is important to mention that the recent studies have shown a big danger is coming from internal threats or from disappointed employees like the Edward Snowden case, another internal threat is that information material can be easy accessible over the intranet. One important indicator is the IT skills...

SCOPE OF THE SECURITY VULNERABILITY

•Requires Internet explorer 4.0 and Windows 95 or later Google Zeitgeist (http://www.google.com/press/zeitgeist.html) shows that more than 90% of the Google requests come from Windows –Internet Explorer •Requires DLL registration An executable must be run once with “Power user” privileges Many privilege escalation and code execution from a webpage without user intervention have been discovered •As you will see through this presentation, the attack is extremely generic and can lead to a lot of malicious scenari...