whatsapp forensics

The maximum number of users of smartphones use the free mobile messaging app WhatsApp. But what frequent WhatsApp chatters might not know is that there is an app out there that is designed to specifically steal the private chat conversations of users and that it can be a serious security threat to mobile phones. Which Read more about whatsapp forensics[…]


What is XOR DDoS? XOR DDoS is a Trojan malware that infects Linux systems, instructing them to launch DDoS attacks on demand by a remote attacker. Initially, attackers gain access by brute force attacks to discover the password to Secure Shell services on a Linux machine. Once login has been acquired, the attackers use root Read more about XOR DDoS[…]

What is botnet??

Botnet also Known as the zombie army What is Botnet?? The word Botnet is formed from the words ‘robot’ and ‘network’. Cybercriminals use special Trojan viruses to breach the security of several users’ computers, take control of each computer, and organize all of the infected machines into a network of ‘bots’ that the criminal can Read more about What is botnet??[…]


Cloud Computing

What is Cloud Computing? Cloud computing is defined as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files on any computer with internet access. This technology allows Read more about Cloud Computing[…]


A distributed denial-of-service (DDoS) attack is one in which multiple of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. The Difference Between Read more about WHAT IS DDOS?[…]