Tag #thecyberdelta
How to Know if Your Phone is Under A Malicious Control
Summary: In this article, we’ll learn, how to tell that your phone’s been hacked. If your phone is hacked, you’ll notice, that your battery draining a lot faster, your phone’s performance rate has gone down, too much of your data…
Chatbot Issues : Secure Your Chats
Chatbot are the thing that act as bridge between user to user or user to a organization for communication. When face to face interaction is not possible we use our technology to communicate with others. Auto technology of speech recognition…
Password Security – The Most Important Thing in the 21st Century
Passwords are the first line of defense that fights against unauthorized access to your computer and your personal data. No other users can read, delete or change your data without knowing your password. But why is password security required? As…
OPERATING SYSTEM
What is an Operating System? The recent advancements in technologies, where every gadget is considered a smart device has really revolutionized the world. Almost everyone has access to this devices be it mobile phones, tablets, laptops, smart watches or even…
Zphisher 2.2 : Phishing Attack on LinkedIn
Phishing Attack is a type of attack where the attacker pretends a be from the legitimate organization and sends fraudulent emails or texts subjective to their attack therefore tricking the victim into revealing sensitive, personal information in the hand of…
BeEF Framework 1.0
Disclaimer – Firstly, I would like to make something clear. If you intend to hack someone you’ve come to the wrong place. It is absolutely contemptible if you want to hack someone without their consent and with the tools available,…
ARTIFICIAL INTELLIGENCE -EMERGING IN HEALTHCARE SECTOR
As we all know how much Artificial Intelligence is impacting us in our day to day life. Healthcare is major sector to deploy AI. It generates millions of gigabyte of data, large amounts of money are spent on it for…
SQL Map: tool 2001
SQL map is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection faults and hacking databases. What Is SQL Injection? SQL Injection is a code injection technique where an attacker executes malicious SQL queries…
WHIRLPOOL ALGORITHM- For Cryptography 010101
Whirlpool is a cryptographical hash function designed after the discovery of Square block cipher, and it is considered to be part in family of block cipher functions. Whirlpool is a construction based on a substantially modified Advanced Encryption Standard (AES).The…
Arch VS Ubuntu: Which Linux Distribution is the Better One?
Arch Linux and Ubuntu are two major Linux distributions that get a lot of attention and have dedicated fanbases. They are used as base distributions for other systems that are forked off of them… But, how they are doing things is quite different, and a…
The Invisible Browser in the Browser
In this Article we will learn about an advanced phishing technique called Browser in the Browser or in-short BitB Attack. Introduction A penetration tester and security researcher known as “mr.d0x” recently exposed a phishing technique. Phishing is a cybercrime in…
Burp Suite : Application Security Testing Software
If you are worried about the security testing of your website, then have a look at the Burp Suite that can test your website security efficiently. Here I am giving all the information needed for the use of Burp Suite.…
IP Address (IPV4 and IPV6)
What is an IP Address? IP Address stands for Internet Protocol Address. This is a logical address assigned to a system so that it can be identified in different networks. It is said logical as the IP address is not…
Using code to Track Phone & Computers on the Internet: A Complete 101
How to find the exact location of a phone or a target computer using the internet? Steps to achieve the tracking: Creating HTML page The main goal is to give the target a URL to a website and when that…