CALL US

+91 9116117170

Category: Hackings

Flaws In Contactless Visa Card, Hacker Can Bypass It’s Spending Limits

By Mohammed Tahir 0 Comment August 5, 2019

Researchers have discovered a technique for exploiting Visa card frauds. The contactless Visa card vulnerability can allow the attacker to bypass payment limit checks. that requires a user’s verification. The attackers can exploit the flaw via man-in-the-middle attacks to conduct large-scale fraud. As mentioned in a blog post, researchers of Positive Technologies, tested the exploit […]

Bjp Website Hacked

BJP website hacked, Narendra Modi memes added with Bohemian Rhapsody

By Prempal Singh 0 Comment March 12, 2019

BJP website hacked | BJP Official website bjp.org hacked by hackers. Screenshots of the hacked home page showed an unflattering meme of Prime Minister Narendra Modi, captioned with language containing abusive terms. HIGHLIGHTS Brothers and sisters, I’ve fooled you: Caption on hacked page We’ve fooled all of you, more to come, says caption A meme […]

RFID attacks

New Generation Hacking: RFID Attacks

By Chandan Singh 0 Comment February 1, 2019

A little about RFID technology RFID (Radio Frequency IDentification) is an automatic identification technology in which data is read and written by radio signals. Data is stored in a so-called RFID tag. The RFID system consists of a reader and a tag.  RFID tags are classified by operating frequency, memory type, and power source. Readers are stationary and […]

Useful sites and services in the TOR network

By Chandan Singh 0 Comment October 16, 2018

In simple words, TOR is a network where the user completely retains his anonymity on the Internet. It does not really matter what he will do – to visit sites, keep his own blog, send messages. Anonymity of traffic is possible due to the use of a server network distributed throughout the world with redirection to […]

How to Exploit a Network Service through Buffer Overflow

By Chandan Singh 0 Comment October 6, 2018

We had a great time exploiting the vulnerabilities of the buffer overflow of Protostar virtual machine, but now it’s time to move on and search for more complex tasks. We had a great time exploiting the vulnerabilities of the Protostar virtual machine , but now it’s time to move on and search for more complex tasks. And such […]

error: Content is protected by Cyberops !!