98% of SSL enabled websites still using SHA-1 based weak Digital Certificates

98% of SSL enabled websites still using SHA-1 based weak Digital Certificates

February 06, 2014Mohit Kumar
The National Institute of Standards and Technology (NIST) had published a document on Jan 2011 that the SHA-1 algorithm will be risky and ...
More details about alleged 17-year-old Russian BlackPOS Malware Author released

More details about alleged 17-year-old Russian BlackPOS Malware Author released

January 20, 2014Mohit Kumar
Security experts at IntelCrawler provided a new interesting update on BlackPOS malware author , that he forgot to delete his Social netwo...
Cyber criminals targeting another cryptocurrency 'Primecoin' with malicious miners

Cyber criminals targeting another cryptocurrency 'Primecoin' with malicious miners

January 16, 2014Mohit Kumar
Like Bitcoin, There are numerous other cryptocurrency similar in nature, including  MasterCoin , ProtoShares, Litecoin, Peercoin, BitBar and...
Hackers behind TARGET data breach looking for Pro-cracker to decrypt Credit card PINs

Hackers behind TARGET data breach looking for Pro-cracker to decrypt Credit card PINs

January 10, 2014Mohit Kumar
I think you haven’t forgotten the massive data breach occurred at TARGET , the third-largest U.S. Retailer during last Christmas Holidays. P...
Hacking Wireless DSL routers via Administrative password Reset Vulnerability

Hacking Wireless DSL routers via Administrative password Reset Vulnerability

January 03, 2014Mohit Kumar
If you want to hack a Netgear and Linkys Wireless Routers , there is a quick backdoor entry available, that allow an attacker to reset the ...
World War C report - Motives behind State Sponsored Cyber Attacks

World War C report - Motives behind State Sponsored Cyber Attacks

October 03, 2013Mohit Kumar
Nation-state driven cyber attacks are routinely conducted on a global scale to defend national sovereignty and project national power. We ar...