Home Home   Welcome: Forum [Blog]

Internet Security and Ethical Hacking

Ethical Hacker
  • Hacking is the process of finding vulnerabilities and gain access into the network or system.

  • Hacking is legal if perfomed with prior permission from business / system / network / infrastructure owners, known as Ethical Hacking and responsible person aka Ethical Hacker or White Hat Hacker or Security Expert.

  • Thus, Ethical Hacking is performed in order to find and report vulnerabilities found in the network or system. So that, they can be fixed, before any Malicious Attacker aka Black Hat Hacker discover and exploit them for the intent of financial loss or other major damages.
-: Welcome to the complete resource of Internet Security and Ethical Hacking :-

Recent Blog Posts
Sun, 15 Sep 2019 04:41:46 +0000
TrueCaller Bug – Automatically Creating UPI Accounts Without Users Consent
In a nightmare for thousands of TrueCaller users in India, a so-called bug automatically created their Unified Payments Interface (UPI) accounts with the ICICI Bank without their consent, triggering panic and hacking fears. The affected users received an SMS from ICICI Bank, saying – “Your registration for UPI app has started. If it was not […]

Tue, 06 Jan 2015 18:18:36 +0000
Wifiphisher – Fast Automated Phishing Attack Tool for WiFi Networks
Wifiphisher is a security tool that mounts fast automated phishing attacks against WPA networks in order to obtain the secret passphrase. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining WPA credentials. From the victim’s perspective, the attack makes use […]

Fri, 05 Dec 2014 10:37:04 +0000
UK Spy Agency Hacked Reliance Cables
British intelligence hacked into two major undersea cables owned by Reliance Communications compromising millions of users, including those from the Indian government, reveal the latest scan of documents leaked by Edward Snowden, the US National Security Agency (NSA) contractor-turned-whistleblower. This security breach took place sometime between 2009 and 2011. A private company, bought by telecom […]


© 2019 Insecure Lab, India                               Affiliates | Contact