Skip to main content

OutlookPasswordDecryptor – New Tool to R

OutlookPasswordDecryptor – New Tool to Recover Outlook Passwords

OutlookPasswordDecryptor is the FREE tool to instantly recover lost password for all versions of Outlook Application.Different versions of Outlook store the password at different locations using different mechanism. OutlookPasswordDecryptor can decrypt all these passwords within fraction of second. It can not only recover the passwords of the current Outlook version but also from any earlier […]

Book of the Month – SQL Injection Attack

Book of the Month – SQL Injection Attacks and Defense

SQL Injection is one of the most popular web attacks that the security world has ever witnessed since the evolution of Internet. Till date it remains one of the less understood vulnerability from web security perspective as indicated by growing number of SQL injection attacks. In this direction, this book is set to clear apart […]

Google Offer Rewards for Chrome Hackers

Google Offer Rewards for Chrome Hackers

Here comes the Google’s turn to offer bounty for hackers finding bugs in Chrome. As per the latest post “Encouraging More Chromium Security Research” on its official blog of Chrome,  Google has decided to follow the practice of Microsoft and other organizations to reward the security researchers. For every Security vulnerability found in Chrome,  Google […]

Social Engineering Made Easy by SET

“Man without tools is animal and with tools he is everything”. Till today the quote applies to every field man has set his footprints in. Man has created tools for everything to make every small job easier & quicker. Now we have tool for Social Engineering too. This new tool is called Social-Engineering Toolkit (in […]

Operation Aurora – Google Got Hacked thr

Operation Aurora – The well targeted attack under which top companies including Google got hacked through the zero day vulnerability. Google has released separate statement recently illustrating nature of the attack vectors and motives of the attacker. In this attack which believed to be originated from China, the zero day (not publicly known) vulnerability in […]