- Hacking is the process of finding vulnerabilities and gain access into the network or system.
- Hacking is legal if perfomed with prior permission from business / system / network / infrastructure owners, known as Ethical Hacking and responsible person aka Ethical Hacker or White Hat Hacker or Security Expert.
- Thus, Ethical Hacking is performed in order to find and report vulnerabilities found in the network or system. So that, they can be fixed, before any Malicious Attacker aka Black Hat Hacker discover and exploit them for the intent of financial loss or other major damages.
TrueCaller Bug – Automatically Creating UPI Accounts Without Users Consent
In a nightmare for thousands of TrueCaller users in India, a so-called bug automatically created their Unified Payments Interface (UPI) accounts with the ICICI Bank without their consent, triggering panic and hacking fears. The affected users received an SMS from ICICI Bank, saying – “Your registration for UPI app has started. If it was not […]15 Sep 2019 Prasanna Sherekar
Wifiphisher – Fast Automated Phishing Attack Tool for WiFi Networks
Wifiphisher is a security tool that mounts fast automated phishing attacks against WPA networks in order to obtain the secret passphrase. It is a social engineering attack that unlike other methods it does not include any brute forcing. It is an easy way for obtaining WPA credentials. From the victim’s perspective, the attack makes use […]06 Jan 2015 Prasanna Sherekar
UK Spy Agency Hacked Reliance Cables
British intelligence hacked into two major undersea cables owned by Reliance Communications compromising millions of users, including those from the Indian government, reveal the latest scan of documents leaked by Edward Snowden, the US National Security Agency (NSA) contractor-turned-whistleblower. This security breach took place sometime between 2009 and 2011. A private company, bought by telecom […]05 Dec 2014 Prasanna Sherekar
"There is no security on this earth, There is only opportunity"
"Social engineering bypasses all technologies, including firewalls"
"The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards"