Beware atm frauds in india

NEW DELHI:  Delhi Police has arrested a man, involved in more than 100 cases of ATM fraud in Delhi and surrounding areas, from south Delhi’s Mahipalpur area, police said today. Imran alias Bali (25), a native of Haryana, has been arrested by Delhi Police’s Crime Branch, Joint Commissioner of Police (Crime) Ravindra Yadav said. During interrogation, “the accused Read more about Beware atm frauds in india[…]

use sessions for hacking

Different Session Hijacking methods: Session stealing is achieved by following methods 1. Session fixation:  In this method, the Hacker sets a user’s session id to known victim. For example, Hacker will send email to known victim  with a link that contains a particular session id. If the victim followed that link, the hacker can use that Read more about use sessions for hacking[…]

India under cyber attack from China

The sustained assault almost coincides with the history of the present political disquiet between the two countries. According to senior government officials, these attacks are not isolated incidents of something so generic or basic as “hacking” — they are far more sophisticated and complete — and there is a method behind the madness. Publicly, senior Read more about India under cyber attack from China[…]

Online bank account scams

According to http://indianexpress.com/Another case of cyber crime in March has come to light and the victim is again a woman, like the previous case that reportedly took place the same month. According to the woman who has filed a complaint with police, online transfer of money was carried out without her knowledge. Police have booked Read more about Online bank account scams[…]

online dating scams

online dating scams Never Reply to such messages from the unknown person.   “Hello, How are you,hope you are doing well, i am Kathica a lovely girl, and i drop at your profile, and i love what i saw there, i believe we can get aquainted, so if it interests you, please reach me back Read more about online dating scams[…]

website vulnerability

This article looks at five common Web application attacks, primarily for PHP applications, and then presents a case study of a vulnerable Website that was found through Google and easily exploited. Each of the attacks we’ll cover are part of a wide field of study, and readers are advised to follow the references listed in Read more about website vulnerability[…]