March 2011

priyanshuit's picture

Google Launches New Group Messaging App “Disco”..!!

priyanshuit's picture

MySQL.com compromised by SQL injection attack..!!


MySQL.com has been hacked and a part of the database containing member and employee email addresses, usernames and passwords has been published by the hackers on Pastebin.com.

priyanshuit's picture

Teenage hackers shut down a PHP cloud hosting firm..!!


A COUPLE of 16-year old hackers had their wicked way exploiting a security vulnerability recently that allowed one of them to steal and publish a PHP cloud hosting firm's proprietary source code on Twitter.

priyanshuit's picture

Twitter tests XSS attack prevention on its mobile website..!!


Twitter has been testing and has now implemented Content Security Policy - a new standard developed by Mozilla to block cross site scripting (XSS) attacks - on its mobile website.

priyanshuit's picture

Rogue SSL certificates issued for Google, Yahoo, Skype..!!


A Comodo affiliate Registration Authority (RA) has been compromised and the incident resulted in the issue of nine rogue SSL certificates for seven popular domains, reported Comodo today.

priyanshuit's picture

Mac OS X 10.6.7 fixes security vulnerabilities..!!



Apple today released Mac OS X 10.6.7 which increases the stability, compatibility, and security of your Mac.

AirPort

priyanshuit's picture

ANONYMOUS -OPERATION BLING- A Call To Action..!!


Anonymous People send me a video for publish it. They gives a message with help of this video just watch it.
Message:

Dear citizens of the internet,

We are ANONYMOUS.

We are

priyanshuit's picture

Phoenix exploit kit 2.5 leaked..!!


Phoenix exploit kit 2.5 has been leaked http://www.megaupload.com/?d=SX4GTE20

priyanshuit's picture

Female Celebrities Hacked; Some Had Nude Photos..!!


(WASHINGTON) -- FBI agents are reportedly closing in on a ring of
hackers thought to be responsible for stealing nude photos and videos
from at least 50 female celebrities.

priyanshuit's picture

PHP 5.3.6 fixes security issues..!!


PHP 5.3.6 focuses on improving the stability of the PHP 5.3.x branch with over 60 bug fixes, some of which are security related.

Security enhancements and fixes

priyanshuit's picture

Google extends SSL to developer facing APIs..!!


Firesheep's authors can be the satisfied with the gradual migration towards SSL that most of the biggest social networks, search engines, online shops and others have embarked upon since its advent.

priyanshuit's picture

Rustock botnet downed by Microsoft..!!


As many security companies and experts noted in the last few days, the activities of the Rustock botnet came to a standstill.

priyanshuit's picture

Twitter offers encryption to beat hackers..!!


Twitter is offering users better protection from hackers with a new option to always use an encrypted connection to access its microblogging service.

priyanshuit's picture

Denial-of-service attacks top web attack list..!!


Denial-of-service attacks surged to the top of the list of web incidents, outpacing SQL injection and cross-site scripting, according to a survey of publicly disclosed attacks.

priyanshuit's picture

Twitter gives user always-on HTTPS option..!!


Little by little, Twitter is heading towards a full HTTPS experience for its users by adding a user setting that, when selected, makes all the activities on your Twitter account encrypted by default.

Cyber Professionals of the Month

Cyber Professionals of the Month

Nominations

Nominations for being Cyber Professional at Cyber India

Corporate Training

Corporate Training

Cyber Professionals

Cyber Professionals

priyanshuit's picture

Online searches on Japan quake may lead to malware..!!


Internet users looking for information related to the 8.9-magnitude earthquake in Japan are being led to fake anti-virus programs created by cybercriminals eager to pounce on the massive interest of people on the disaster

priyanshuit's picture

Apple Safari, Microsoft IE 8 Hijacked by Hackers at Pwn2Own Contest..!!


Pwnd! Safari on MacOS X and Internet Explorer 8 on Windows 7 fell on the first day of the Pwn2Own hacking contest at CanSecWest.

priyanshuit's picture

Free, open source exploit kit offered online..!!


Among the various exploit kits for sale out there it seems there is one that aspiring cyber crooks can use for free.

priyanshuit's picture

Multiple vulnerabilities in Google Chrome..!!


Multiple vulnerabilities have been reported in Google Chorme, according to Secunia.

priyanshuit's picture

Apple iOS 4.3 fixes security issues


The iOS 4.3 update contains new features, improvements, security and bug fixes.

CoreGraphics

priyanshuit's picture

Cyberattack targets France’s G20 plans..!!


PARIS France’s finance ministry was subject to a cyberattack in December targeting information related to its presidency of the Group of 20 nations, officials said on Monday.  

priyanshuit's picture

Is Indian Cyber Law (IT ACT) Good Enough To Tackle Cyber Crimes ?

* Yes * No * I Will Put My Views In Comments
priyanshuit's picture

Google confirms it pulled malicious Android apps..!!


After several days of silence on the issue, Google has confirmed that it removed several malicious apps from its Android Market earlier this week and said that it would remove the apps from users' devices as well.

priyanshuit's picture

Anonymous Planning Media War in Support of Manning..!!


Anonymous is apparently planning an all-out media campaign in support jailed WikiLeaks source Bradley Manning.

priyanshuit's picture

Botnet, Trojan Activity Increased in February..!!


Trojan-based attacks continue to be the biggest malware threat in February, but PDF exploits aren’t far behind, according to several security reports.

Workshops & Seminars

Workshops & Seminars

E-mail Security

E-mail Security

knowledge base

knowledge base

Report a case / incident

Report a case / incident

Case Studies

Case Studies

Web Security

Web Security

Investigation

Investigation

Vulnerability Assessment and Penetration Testing (VA-PT)

Vulnerability Assessment and Penetration Testing (VA-PT)

Recources

Recources

Trainings

Trainings

Webinars

Webinars

Audit

Audit..

Shareware

Shareware Tools

priyanshuit's picture

Virus experts warn next big threat is to mobile phones..!!


Virus experts are warning that the next big security threat is on mobile phones and that the attacks have begun in earnest.

priyanshuit's picture

Trojans attack still top malware threat..!!


Continuing a trend observed since last summer, the same types of Trojan horse programs have persistently dominated the threat landscape through February, according to GFI Software.

priyanshuit's picture

Turkey bans Google Blogger over pirated football feeds.!!


A court has banned Google's Blogger service in Turkey over a row about pirated football feeds.

Privacy Policies

Privacy Policies

Terms & Conditions

Terms & Conditions

Join Cyber India

Join Cyber India -- Be a part of it !!

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ)

About Cyber India

Cyber India is..

Tools

Useful Tools

Community

Cyber India Community

Services

Services we provide..

priyanshuit's picture

Monthly Malware Statistics, February 2011..!!


February in figures

The following statistics were compiled in February using data from computers running Kaspersky Lab products:

priyanshuit's picture

WordPress DDoS Attack Adds to Growing Cyber Wars..!!


Popular open source content management system WordPress was targeted by a massive distributed denial of service (DDoS) attack today, TechCrunch reports.

priyanshuit's picture

Phishers target university students paying fees online..!!



A few days ago, we wrote about a bogus university website stealing photos and content from the website of a legitimate Oregon college in order to collect application fees from aspiring students.

priyanshuit's picture

SpyEye botnet activity surges..!!


Fortinet announced its February 2011 Threat Landscape report, which details five zero-day vulnerabilities found in Cisco (FGA-2011-03), Adobe (FGA-2011-06) and Microsoft (FGA-2011-04) products.

priyanshuit's picture

PDF-Pro multiple vulnerabilities..!!


Several vulnerabilities in PDF-Pro can be exploited by malicious people to compromise a user's system, according to Secunia.

priyanshuit's picture

Rootcager Trojan found on the official Android market..!!


Free Android applications bundled up with malware have spilled over into the official Android marketplace.

priyanshuit's picture

Workers expose businesses to malware and data loss..!!


Organizations are at risk of malware as 76% of workers plug unknown USB flash drives into company PCs, potentially compromising corporate network security, according to BlockMaster.

priyanshuit's picture

whatismyipaddress.com Got Attacked..!!


A website whatismyip who gives the information of
    * My IP
    * IP Lookup
    * Blacklist Check
    * Trace Email
    * Speed Test

priyanshuit's picture

Cisco Firewall Services Module DoS vulnerability..!!


A vulnerability exists in the Cisco Firewall Services Module (FWSM) for
Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers that

priyanshuit's picture

Net Tools 5.0


Net Tools is a comprehensive set of host monitoring, network scanning,
security, administration tools and much more, all with a highly
intuitive user interface. It's an ideal tool for those who work in the