Category: Information Security

The Frustrated Youth > Blogs > Information Security

Reliance is Bringing Its Own CryptoCurrency JioCoin

As the price of cryptocurrencies skyrocketing Every Day ,India’s largest corporate Reliance is planning Its Own cryptocurrency JioCoin based on the same Blockchain Technology. The jioCoin Project is being led by mukesh Ambani’s Eldest son Akash Ambani with team of 50 members which will be working on the blockchain technology. Even After 12 years of […]

Top 10 Torrent sites to Download Movies for Free in 2018

We are about to enter the next calendar year in less than a week’s time. The chances are high that the loyal members of the BitTorrent community have already started to look for the best torrent sites for 2018. The rise in legal actions against many torrent websites can be thought of as one significant reason […]

Best WIFI Hacking Software and Analysis Tools To use in 2018

Security analysis and penetration testing is an integral part of creating any kind of secure network. This brings us to the WiFi hacking software that could be used for ethically testing a wireless network and make amends. In the past, we’ve already covered the top wireless security apps for Android and now it’s the turn […]

FCC Killed Net Neutrality ? How to Save It

Net neutrality is DEAD—3 out of 5 federal regulators voted Thursday to hand control of the future of the Internet to cable and telecommunication companies, giving them powers to speed up service for websites they favor or slow down others. What is Net Neutrality and Why Is It Important? Net Neutrality is simply Internet Freedom—Free, […]

The DUHK Attack -Recovering Encryption Key Used In VPN

DUHK — Don’t Use Hard-coded Keys — is a new ‘non-trivial’ cryptographic implementation vulnerability that could allow attackers to recover encryption keys that secure VPN connections and web browsing sessions. DUHK is the third crypto-related vulnerability reported this month after KRACK Wi-Fi attack and ROCA factorization attack. The vulnerability affects products from dozens of vendors, including Fortinet, Cisco, TechGuard, […]

ROCA Attack – Return Of 5 years old RSA Factorization Attack

Microsoft, Google, Lenovo, HP and Fujitsu are warning their customers of a potentially serious vulnerability in widely used RSA cryptographic library produced by German semiconductor manufacturer Infineon Technologies. It’s noteworthy that this crypto-related vulnerability (CVE-2017-15361) doesn’t affect elliptic-curve cryptography and the encryption standard itself, rather it resides in the implementation of RSA key pair generation […]

What Is KRACK Attack -Attack Against WPA 2 Wifi Protocol

ecurity researchers have discovered several key management vulnerabilities in the core of Wi-Fi Protected Access II (WPA2) protocol that could allow an attacker to hack into your Wi-Fi network and eavesdrop on the Internet communications. WPA2 is a 13-year-old WiFi authentication scheme widely used to secure WiFi connections, but the standard has been compromised, impacting […]

What Is Bad Rabbit Ransomware ! How To Protect Yourself

A new widespread ransomware attack is spreading like wildfire around Europe and has already affected over 200 major organisations, primarily in Russia, Ukraine, Turkey and Germany, in the past few hours. Dubbed “Bad Rabbit,” is reportedly a new Petya-like targeted ransomware attack against corporate networks, demanding 0.05 bitcoin (~ $285) as ransom from victims to […]

ATM malware Which Can Infect any ATM to spill out Cash is on sale for only $5000

Researchers have discovered malware crafted to compromise ATMs available for sale in the underbelly of the internet. On Tuesday, cybersecurity firm Kaspersky Labs said that anyone can buy such malware for only $5000 through darknet markets. With the rise of prolific cyberattacks, data breaches, and information theft, ATMs have become victims of cybercriminal operations in […]

atm malware for $5000 -the frustrated youth

10 Social Engineering Attack You Should Be Aware Of !

Our life is completely influenced by multiple Social networks day in day out.Hackers are taking advantage of this a inventing new ways to exploit end users.Here we are listing most common social engineering attacks. Stay informed and keep yourself protected from these online frauds. 1. Vishing End users are so focused on looking for fraudulent […]

Social engineering attack -The frustrated youth
error: Content is protected !!