SMiShing – On My (An)droid
Many times we receive SMS’s on our cell phones displaying messages like the one shown below: Typically a phone number to call or a website […]
Many times we receive SMS’s on our cell phones displaying messages like the one shown below: Typically a phone number to call or a website […]
Scope: This article demonstrates logging techniques in MySQL to uncover and analyze any mischief attempts done by (outside or inside) user focusing on specific areas […]
Over the past few years, we have completed a number of social engineering tests as part of advanced penetration testing at various organizations. Coincidentally, I […]
This post is a complete switch over from my previous post on phishing modus operandi. A little background on the hack. I was doing an […]
Phishing sounds similar to fishing. Fishes are to the volume of internet users today much like fishermen are to phishers. Zillions of fishes falling prey […]
by Toufiq Ali, NII Consulting Before you read further make sure you back up all the original settings of the registry or set create a […]