Posts

SIM JACKING

Image
SIM JACKING   A new kind of hacking threat targeting SIM cards of smartphones is on the rise. Cybersecurity officials say there is still no method to detect this threat. The attack called ‘ Simjacker’ , discovered by UK-based Adaptive Mobile Security ( AMS), happens when a spyware code is sent to a mobile phone which then hacks the SIM card, and ‘takes over’ the mobile phone. Explaining the vulnerability to Express, Global Cyber Security Forum’s chairman Sai Krishna said, “With this attack, anybody can get into anyone’s mobile, read messages, listen to the conversation and track real-time locations.” Krishna added, “This attack happens, as there is a vulnerability in the SIM application Tool Kit (STK), which hackers exploit, by sending malicious code to it. The problem becomes serious as STK software either comes embedded with the phone or from the telecom provider.” Unlike Google Play or iStore apps over which a user has controls, the STK software comes pre-in...

CHIPSEC--> Security Framework for PC's

Image
CHIPSEC--> Security Framework for PC's OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US HERE: EMAIL: info@careertechnology.co.in PHONE: +91 86521 24550

M-KAVACH SECURITY SOLUTION FOR ANDROID PHONES

Image
M-KAVACH SECURITY SOLUTION FOR ANDROID The Government of India has launched a new desktop and mobile security solution named "Cyber Swachhta Kendra", through its Computer Emergency Response Team (CERT-in) . The government also launched an app named "M-KAVACH" security solution for Android phones. This app currently supports 4.4,5.0 and 6.0   android version. The CERT-in Team is currently working on the other versions for Android phones. The main work of this app is to restrict access to critical applications such as Social medias app, Mobile wallets, and other apps containing personal information. Further, the app "M-KAVACH" can be used for more functions such as blocking unnecessary SMS and CALLS, it can BACKUP your DATA and also RESTORE also. Also, the app can be used to do a complete factory reset if the phone is lost, user can erase the call logs as well as the contact list in emergency. On top of it also provide Hardware secu...

WEPATTACK--> Hacking Tool for WLAN WEP Keys

Image
WEPATTACK--> Hacking Tool for WLAN WEP Keys OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US HERE: EMAIL: info@careertechnology.co.in PHONE: +91 86521 24550

AI subject for CBSE Student

Image
AI Training started in CBSC School In its efforts to create an AI ecosystem in the schools, CBSE had introduced AI as a skill subject for children stud7ying in grade VIII and IX in March 2019.\ While 883 schools applied to start this subject in their schools, eight schools such as Delhi Public School, Dwarka; Royale Concorde International School, Bangalore, Salwan Public School, Gurgaon, among others, were selected on a fast track mode to study the impact well in advance. The 2-year curriculum for which CBSE has collaborated with IIntel's AI4Youth initiative was covered in six months as part of the pilot in which 100 students learned the ropes of machine Learning. STUDENTS CREATED DIFFERENT PROJECTS: RIDER RATER CYBER DETECTIVE HAPPINESS GURU For more detail report click here: CLICK HERE

GERIX--> WIFI CRACKER

Image
GERIX--> WIFI CRACKER Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking tool with GUI. It recently Updated in 2018.1 kali Linux. OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US HERE: EMAIL: info@careertechnology.co.in PHONE: +91 86521 24550

ADVANCE KEYLOGGER FREE DOWNLOAD

Image
KEYLOGGER Technically a keylogger is defined as "e Keylogger as a software program to secretly monitor & log all keystrokes in a computer system". HOW IT WORKS? 1. Install the keylogger on your target device. 2. keylogger is a very small program which runs in the background without knowing the users(targets) knowledge. 3. It sends the credentials to the server if you provided the email and linked to online else another way they store the file in an hidden from the user(targets) knowledge. you can go and access the file when you visit the target. Example: Suppose you want to surf facebook on your PC and keylogger is added by someone. when you browse www.facebook.com in your browser you need to enter an email ID and password. The movement you entered into your browser and stared typing the keylogger is sending every keystroke to the hacker and owner of your keylogger. Want to see practically howe key logger works: 1. Visit the below link and downloa...