Blog

Power Of Social Engineering: Uber Hack 2022
Power Of Social Engineering: Uber Hack 2022
Power Of Social Engineering: Uber Hack 2022
Power Of Social Engineering: Uber Hack 2022

Power Of Social Engineering: Uber Hack 2022

Hello World! They say security is never enough, no matter how well-protected your systems are! Despite the best efforts, no system is totally immune to attacks. There have been so many cases across the world when tech giants had stunning end-to-end security solutions but still failed to prevent attacks. This time, it was Uber. There

Getting Started Into Android Security Part 2

Previously we discussed Android Basics, Reversing APK & LAB Setup for Android Security Testing. We are considering that you are aware of all the previous concepts. If you haven’t read it, check it out now, click here and get back to this. Introduction Static analysis is a process of testing applications without executing them; only the code is

Log4j – A Billion Device Vulnerability

Could you imagine that something very dangerous has been present in billions of devices since 2013 that can potentially take over more than 3.5 billion devices? That seems like chaos! Right? In Christmas time, on Thursday December 9th The Apache Software Foundation released details on a critical vulnerability in Log4j, a logging library used in

Getting Started into the Network Security

The recent years have emphasised the importance of cyber security in a data-driven world where everyone, regardless of their size or mission, is cultivating their online presence to reap the numerous benefits. Attacks have become more commonplace, and the misuse of stolen data has also become the standard, requiring individuals and businesses that use data