How to detect Malicious code in nulled or Free WordPress Themes and Plugins.

Apart from Official WordPress repository there are hundreds and thousands of websites which provides free WordPress themes and Plugins but the problem is you can not trust them always. Yes, Most of them add a malicious code to themes and plugins which Continue reading How to detect Malicious code in nulled or Free WordPress Themes and Plugins.

How do Hackers Look Like and What They Think?

How do Hackers Look Like and What They Think? EDUCATIONAL PROFILE: Almost all hackers finished college or reached that level by self-education. Self-educated hacker is  more respected in hackers community because you really need to have passion to become professional hacker. The Continue reading How do Hackers Look Like and What They Think?

How to upgrade your ordinary router with functionality of a high cost one with Tomato firmware

Here is how to install Tomato firmware on your cheap Wi-Fi router to attain functionality of a high cost router. What if you could simply enhance your router’s functionalities just by some software alteration. well, Few people understand why some Continue reading How to upgrade your ordinary router with functionality of a high cost one with Tomato firmware

Microsoft will Inform You If Government is Spying on You

Following in the footsteps of Twitter, Facebook and Google, Microsoft promises to notify users of its e-mail (Outlook) and cloud storage (OneDrive) services if government hackers may have targeted their accounts. The company already notifies users if an unauthorized person Continue reading Microsoft will Inform You If Government is Spying on You

Government Grade Malware: a Look at HackingTeam ’s RAT

Government Grade Malware: a Look at HackingTeam’s RAT Security researchers the world over have been digging through themassiveHackingTeam dump for the past five days, and what we’ve foundhas been surprising. I’ve heard this situation called many things, and there’s one description that Continue reading Government Grade Malware: a Look at HackingTeam ’s RAT

Cross Site Request Forgery (CSRF) [HOW-TO]

Cross-Site Request Forgery (CSRF) is an attack outlined in the OWASP Top 10 whereby a malicious website will send a request to a web application that a user is already authenticated against from a different website. This way an attacker can Continue reading Cross Site Request Forgery (CSRF) [HOW-TO]