How to detect Malicious code in nulled or Free WordPress Themes and Plugins.

Apart from Official WordPress repository there are hundreds and thousands of websites which provides free WordPress themes and Plugins but the problem is you can not trust them always. Yes, Most of them add a malicious code to themes and plugins which Continue reading How to detect Malicious code in nulled or Free WordPress Themes and Plugins.

How do Hackers Look Like and What They Think?

How do Hackers Look Like and What They Think? EDUCATIONAL PROFILE: Almost all hackers finished college or reached that level by self-education. Self-educated hacker is  more respected in hackers community because you really need to have passion to become professional hacker. The Continue reading How do Hackers Look Like and What They Think?

The 25 Most Popular Passwords of 2015: We’re All Such Idiots

The 25 Most Popular Passwords of 2015: We’re All Such Idiots It’s 2016 and you may have thought we’d all be a little older and wiser than this time last year. But as you read this list of 2015’s most Continue reading The 25 Most Popular Passwords of 2015: We’re All Such Idiots

Twitch ’s latest insane adventure: Installing Linux

Twitch’s latest insane adventure: Installing Linux Twitch playing Pokémon was easy mode. Tomorrow, Twitch viewers will be invited to do something altogether more challenging: install Arch Linux. Using the same Twitch chat-driven concept as the collaborative Pokémon playthrough, anyone will Continue reading Twitch ’s latest insane adventure: Installing Linux

Government Grade Malware: a Look at HackingTeam ’s RAT

Government Grade Malware: a Look at HackingTeam’s RAT Security researchers the world over have been digging through themassiveHackingTeam dump for the past five days, and what we’ve foundhas been surprising. I’ve heard this situation called many things, and there’s one description that Continue reading Government Grade Malware: a Look at HackingTeam ’s RAT

Cross Site Request Forgery (CSRF) [HOW-TO]

Cross-Site Request Forgery (CSRF) is an attack outlined in the OWASP Top 10 whereby a malicious website will send a request to a web application that a user is already authenticated against from a different website. This way an attacker can Continue reading Cross Site Request Forgery (CSRF) [HOW-TO]