What is Two Factor Authentication
An extra layer of security that is known as "multi factor authentication" In today's world of increasing digital crime and internet fraud many people will be highly familiar with the importance of online security, logins, usernames and passwords but if you ask them the question "What is Two Factor Authentication?" the likelihood is they will not know what it is or how it works, even though they may use it every single day. With standard security procedures (especially online)

Finding a Zero-Day Exploit
Zero-days are found in exactly the same ways as any other kind of hole. What makes a security hole a "zero day" relies exclusively on who is aware of the existence of the hole, not on any other technical characteristic. Holes are found, usually, by inquisitive people who notice a funky behaviour, or imagine a possible bug and then try out to see if the programmer fell for it. For instance, I can imagine that any code which handles string contents and strives to be impervious
SLOWLORIS: HTTP DOS(Denial Of Service)attack and prevention
A DDOS(Distributed Denial of Service) attack is one of the major problem, that organizations are dealing with today. Such a kind of attack is very difficult to mitigate, especially for small organizations with small infrastructure. The main difficulty in dealing with DDOS attack is the fact that, traditional firewall filtering rules does not play well. The main reason behind this problem is that, most of the time the attacking machines(machine's that take part in a DDOS attac

Instagram's Biggest Security Flaw
Stevie Graham, a security researcher who reported an authentication flaw in Instagram’s iOS software a few days ago, was denied a bug bounty by Facebook. Presumably, that’s because the flaw isn’t new, rather than because it isn’t serious. (Indeed, we first wrote about this problem in 2012.) So Graham has gone public with instructions on how to hack other people’s Instagram accounts. All you need is shared Wi-Fi, a packet sniffer, and the willingness to break the law to violat
Hacking with Armitage into a Network
The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA) incryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the


Security Checklist: Have you been hacked?
Action List Take your website offline (We recommend the htaccess method) Scan all machines with FTP, super admin, and admin access for malware, virus, trojans, spyware, etc. (see Local Security below) Notify your host and work with them to clean up the site, and to make sure there are no back doors to your site. See if you have any vulnerable extensions and deal with them. A clue to any extensions being targeted is your logs file. Here is an example of what to look for. //adm